Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Nexus-Executor.exe

Overview

General Information

Sample name:Nexus-Executor.exe
Analysis ID:1570764
MD5:1d5119509128d468dd629fff653a096a
SHA1:0715e35d06c94694373a199ac21f66535180a9b0
SHA256:9f1f4b08d76117c87c2002659333897e28dd90bad5fd1179ae4f16cb01b3f63c
Tags:exeuser-aachum
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
PE file contains section with special chars
Tries to harvest and steal browser information (history, passwords, etc)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Nexus-Executor.exe (PID: 1488 cmdline: "C:\Users\user\Desktop\Nexus-Executor.exe" MD5: 1D5119509128D468DD629FFF653A096A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: Nexus-Executor.exe PID: 1488JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.Nexus-Executor.exe.1f78419f1d0.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-08T02:10:58.062907+010028032742Potentially Bad Traffic192.168.2.549704104.26.9.59443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Nexus-Executor.exeAvira: detected
        Source: Nexus-Executor.exeReversingLabs: Detection: 39%
        Source: Nexus-Executor.exeVirustotal: Detection: 28%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: Nexus-Executor.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F784117750 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,CryptUnprotectData,0_2_000001F784117750
        Source: unknownHTTPS traffic detected: 104.26.9.59:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: Nexus-Executor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: Nexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F78407F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_000001F78407F46A
        Source: Joe Sandbox ViewIP Address: 104.26.9.59 104.26.9.59
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 104.26.9.59:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: global trafficDNS traffic detected: DNS query: api.myip.com
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://https/:://websocketpp.processorGeneric
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000003.2071030448.000001F784542000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.4473521839.000001F783F86000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2098071917.000001F784542000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.4475106509.000001F784542000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/Russia
        Source: Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
        Source: Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage
        Source: Nexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold
        Source: Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
        Source: Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
        Source: Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
        Source: unknownHTTPS traffic detected: 104.26.9.59:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AB1C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF762AB1C20
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AB1D70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF762AB1D70
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AB1C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF762AB1C20
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AE0330 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF762AE0330
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AE0D02 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF762AE0D02

        System Summary

        barindex
        Source: Nexus-Executor.exeStatic PE information: section name: "hR
        Source: Nexus-Executor.exeStatic PE information: section name: b)b
        Source: C:\Users\user\Desktop\Nexus-Executor.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AE3B90 PostQuitMessage,GetWindowRect,SetWindowPos,NtdllDefWindowProc_A,0_2_00007FF762AE3B90
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AE03300_2_00007FF762AE0330
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AE43200_2_00007FF762AE4320
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADFCE00_2_00007FF762ADFCE0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADF2F00_2_00007FF762ADF2F0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADEA600_2_00007FF762ADEA60
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AC6BC00_2_00007FF762AC6BC0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762A9FBB00_2_00007FF762A9FBB0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ABDB500_2_00007FF762ABDB50
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADCB400_2_00007FF762ADCB40
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762A973900_2_00007FF762A97390
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADA3700_2_00007FF762ADA370
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762A96CB00_2_00007FF762A96CB0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ABBD100_2_00007FF762ABBD10
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AE0D020_2_00007FF762AE0D02
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AB54F00_2_00007FF762AB54F0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AC7CE00_2_00007FF762AC7CE0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AB6C900_2_00007FF762AB6C90
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AAE1C00_2_00007FF762AAE1C0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AAFA000_2_00007FF762AAFA00
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AD2A000_2_00007FF762AD2A00
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AC59E00_2_00007FF762AC59E0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ABB1E00_2_00007FF762ABB1E0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ACF9E00_2_00007FF762ACF9E0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADC3100_2_00007FF762ADC310
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AAC2500_2_00007FF762AAC250
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AAF2500_2_00007FF762AAF250
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AA5A300_2_00007FF762AA5A30
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADBA800_2_00007FF762ADBA80
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ABC2700_2_00007FF762ABC270
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ABBFC00_2_00007FF762ABBFC0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762A9DFB00_2_00007FF762A9DFB0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AC97F00_2_00007FF762AC97F0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762A997300_2_00007FF762A99730
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AD60900_2_00007FF762AD6090
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ACCDD00_2_00007FF762ACCDD0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADE5B00_2_00007FF762ADE5B0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762A99E100_2_00007FF762A99E10
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AC25F00_2_00007FF762AC25F0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AD0DE00_2_00007FF762AD0DE0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ABAD400_2_00007FF762ABAD40
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ACD5300_2_00007FF762ACD530
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762A95D900_2_00007FF762A95D90
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AA6EC00_2_00007FF762AA6EC0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AB96B00_2_00007FF762AB96B0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AA46F00_2_00007FF762AA46F0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AB7EF00_2_00007FF762AB7EF0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AA46200_2_00007FF762AA4620
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AAD6200_2_00007FF762AAD620
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F7841427200_2_000001F784142720
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F7840A38410_2_000001F7840A3841
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F78406BA300_2_000001F78406BA30
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: String function: 00007FF762AB1F40 appears 40 times
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: String function: 00007FF762AA85B0 appears 36 times
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: String function: 00007FF762AED440 appears 867 times
        Source: Nexus-Executor.exeStatic PE information: Resource name: None type: DOS executable (COM)
        Source: Nexus-Executor.exeStatic PE information: Resource name: None type: COM executable for DOS
        Source: Nexus-Executor.exeStatic PE information: Section: bbbb ZLIB complexity 0.999211485373886
        Source: classification engineClassification label: mal84.spyw.evad.winEXE@1/0@1/1
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F7841610E0 CreateToolhelp32Snapshot,Process32NextW,Concurrency::details::WorkQueue::IsStructuredEmpty,Concurrency::details::WorkQueue::IsStructuredEmpty,Process32NextW,0_2_000001F7841610E0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Z5NK383E.htmJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: Nexus-Executor.exe, 00000000.00000003.2948614208.000001F785FFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE segments (id INTEGER PRIMARY KEY,name VARCHAR,url_id INTEGER NON NULL)ue BLOB);
        Source: Nexus-Executor.exe, 00000000.00000003.2074176431.000001F7860C7000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899108132.000001F785EBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: Nexus-Executor.exeReversingLabs: Detection: 39%
        Source: Nexus-Executor.exeVirustotal: Detection: 28%
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: d3d9.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: msvcp140.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: d3d10warp.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: resourcepolicyclient.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: dxcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: xinput1_4.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: inputhost.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: Nexus-Executor.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: Nexus-Executor.exeStatic file information: File size 1393194 > 1048576
        Source: Nexus-Executor.exeStatic PE information: Raw size of bbbb is bigger than: 0x100000 < 0x142a00
        Source: Nexus-Executor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: Nexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\Nexus-Executor.exeUnpacked PE file: 0.2.Nexus-Executor.exe.7ff762a90000.1.unpack "hR:EW;bbbb:EW;Unknown_Section2:W; vs "hR:ER;bbbb:ER;Unknown_Section2:W;
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADF7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF762ADF7A0
        Source: initial sampleStatic PE information: section where entry point is pointing to: bbbb
        Source: Nexus-Executor.exeStatic PE information: section name: "hR
        Source: Nexus-Executor.exeStatic PE information: section name: bbbb
        Source: Nexus-Executor.exeStatic PE information: section name: b)b
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F784094970 push es; ret 0_2_000001F78409497F
        Source: Nexus-Executor.exeStatic PE information: section name: bbbb entropy: 7.999837452913593
        Source: C:\Users\user\Desktop\Nexus-Executor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeWindow / User API: threadDelayed 5644Jump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeWindow / User API: foregroundWindowGot 1645Jump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_000001F78407F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_000001F78407F46A
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsdvboxserviceu
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayx64dbgh
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
        Source: Nexus-Executor.exe, 00000000.00000002.4473521839.000001F783FB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0`
        Source: Nexus-Executor.exe, 00000000.00000002.4473521839.000001F783FC7000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000002.4473521839.000001F78401A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-gaVGAuthServicevmwaretrayv
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
        Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
        Source: Nexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: wiresharkvmwareuseri
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
        Source: Nexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: uuuYqeMuuqMuup_vuuuuuuuuuuuuuuuuuuuvuuuuuuuueuuuuuuWwSuu~L
        Source: Nexus-Executor.exe, 00000000.00000003.2194689343.000001F785FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
        Source: C:\Users\user\Desktop\Nexus-Executor.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AEC0F8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF762AEC0F8
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762ADF7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF762ADF7A0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AEC0F8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF762AEC0F8
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF762ADF7A0
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: GetKeyboardLayout,GetLocaleInfoA,0_2_00007FF762AE105B
        Source: C:\Users\user\Desktop\Nexus-Executor.exeCode function: 0_2_00007FF762AEC388 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF762AEC388

        Stealing of Sensitive Information

        barindex
        Source: Nexus-Executor.exeString found in binary or memory: Electrum
        Source: Nexus-Executor.exeString found in binary or memory: ElectronCash
        Source: Nexus-Executor.exeString found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
        Source: Nexus-Executor.exeString found in binary or memory: \Exodus\exodus.wallet
        Source: Nexus-Executor.exeString found in binary or memory: \Ethereum\keystore
        Source: Nexus-Executor.exeString found in binary or memory: Exodus
        Source: Nexus-Executor.exeString found in binary or memory: Ethereum
        Source: Nexus-Executor.exeString found in binary or memory: \Coinomi\Coinomi\wallets
        Source: Nexus-Executor.exeString found in binary or memory: \Ethereum\keystore
        Source: Nexus-Executor.exe, 00000000.00000003.2173839625.000001F785E8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\Nexus-Executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: Yara matchFile source: 0.2.Nexus-Executor.exe.1f78419f1d0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Nexus-Executor.exe PID: 1488, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Input Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Deobfuscate/Decode Files or Information
        1
        Input Capture
        1
        Query Registry
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
        Obfuscated Files or Information
        Security Account Manager11
        Security Software Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
        Software Packing
        NTDS2
        Process Discovery
        Distributed Component Object Model3
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Nexus-Executor.exe39%ReversingLabsWin64.Trojan.Generic
        Nexus-Executor.exe28%VirustotalBrowse
        Nexus-Executor.exe100%AviraHEUR/AGEN.1314582
        Nexus-Executor.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://https://https/:://websocketpp.processorGeneric0%Avira URL Cloudsafe
        https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg0%Avira URL Cloudsafe
        https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.myip.com
        104.26.9.59
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://api.myip.com/false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://https://https/:://websocketpp.processorGenericNexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ac.ecosia.org/autocomplete?q=Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://duckduckgo.com/chrome_newtabNexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgNexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoNexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgNexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usageNexus-Executor.exe, Nexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmpfalse
                        high
                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchNexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiNexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refNexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477Nexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://api.myip.com/RussiaNexus-Executor.exe, 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmpfalse
                                      high
                                      https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(HoldNexus-Executor.exe, 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmpfalse
                                        high
                                        https://www.ecosia.org/newtab/Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaNexus-Executor.exe, 00000000.00000003.2072386317.000001F786012000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2073645280.000001F786013000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Nexus-Executor.exe, 00000000.00000003.2544425137.000001F786078000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2499043392.000001F785FB3000.00000004.00000020.00020000.00000000.sdmp, Nexus-Executor.exe, 00000000.00000003.2899822876.000001F786117000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              104.26.9.59
                                              api.myip.comUnited States
                                              13335CLOUDFLARENETUSfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1570764
                                              Start date and time:2024-12-08 02:10:06 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 8m 14s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:4
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Sample name:Nexus-Executor.exe
                                              Detection:MAL
                                              Classification:mal84.spyw.evad.winEXE@1/0@1/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 84%
                                              • Number of executed functions: 28
                                              • Number of non-executed functions: 150
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              20:11:33API Interceptor18116473x Sleep call for process: Nexus-Executor.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              104.26.9.59Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                    file.exeGet hashmaliciousLummaC, Ailurophile Stealer, Amadey, LummaC Stealer, StealcBrowse
                                                      ZoomInstaller.exeGet hashmaliciousUnknownBrowse
                                                        ZoomInstaller.exeGet hashmaliciousUnknownBrowse
                                                          file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC StealerBrowse
                                                            eSLlhErJ0q.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                              iBO7gzlZr3.exeGet hashmaliciousLummaCBrowse
                                                                5zFCjSBLvw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  api.myip.comFortexternal.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.26.9.59
                                                                  Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.26.9.59
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.26.9.59
                                                                  file.exeGet hashmaliciousAmadey, CryptbotBrowse
                                                                  • 172.67.75.163
                                                                  file.exeGet hashmaliciousAmadey, XWormBrowse
                                                                  • 172.67.75.163
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.26.8.59
                                                                  file.exeGet hashmaliciousLummaC, Ailurophile Stealer, Amadey, LummaC Stealer, StealcBrowse
                                                                  • 104.26.9.59
                                                                  file.exeGet hashmaliciousAilurophile StealerBrowse
                                                                  • 104.26.8.59
                                                                  installer.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.67.75.163
                                                                  installer.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.67.75.163
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUSXeno Executor.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                  • 104.26.13.205
                                                                  Delta.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.16.9
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.165.166
                                                                  Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.36.51
                                                                  'Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.185.163
                                                                  Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.24.90
                                                                  Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 172.67.185.163
                                                                  meerkat.mips.elfGet hashmaliciousMiraiBrowse
                                                                  • 8.44.96.113
                                                                  file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                                                  • 172.67.165.166
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.16.9
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  37f463bf4616ecd445d4a1937da06e19Xeno Executor.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                  • 104.26.9.59
                                                                  file.exeGet hashmaliciousAmadey, CredGrabber, LummaC Stealer, Meduza Stealer, Stealc, VidarBrowse
                                                                  • 104.26.9.59
                                                                  file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                  • 104.26.9.59
                                                                  malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                                                  • 104.26.9.59
                                                                  INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.26.9.59
                                                                  Bank Swift and SOA PRN00720031415453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.26.9.59
                                                                  RFQ Order list #2667747.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.26.9.59
                                                                  Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.26.9.59
                                                                  IBAN Payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.26.9.59
                                                                  AdminAccounts.aspx.dllGet hashmaliciousMatanbuchusBrowse
                                                                  • 104.26.9.59
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Entropy (8bit):7.942923120547586
                                                                  TrID:
                                                                  • Win64 Executable GUI (202006/5) 93.51%
                                                                  • Win64 Executable (generic) (12005/4) 5.56%
                                                                  • DOS Executable Generic (2002/1) 0.93%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:Nexus-Executor.exe
                                                                  File size:1'393'194 bytes
                                                                  MD5:1d5119509128d468dd629fff653a096a
                                                                  SHA1:0715e35d06c94694373a199ac21f66535180a9b0
                                                                  SHA256:9f1f4b08d76117c87c2002659333897e28dd90bad5fd1179ae4f16cb01b3f63c
                                                                  SHA512:945c1e903b1aa399cd7818513700777b523cc3d01221306a483515b5d08e6b56f1249367c3b493b63c6e0106b4f926a5f8a6b8673b269e1a49189ea313b5cb47
                                                                  SSDEEP:24576:YZ9Piz+Jlb6Bl3W3ILsBPEUEEl5ulQYbg/leHYuYQAOKlHk:YX6yr6L3KIYCaY5gOYyak
                                                                  TLSH:2255122FB7806BA6D435C073CB9BC359B33192909136CF2B1A828D5F65A905A7717F2C
                                                                  File Content Preview:MZ......................@.0.72.UPX!._0x0020b79..........................!..L.!This program cannot be run in DOS mode....$........z...............c.......................................c................................t.............Rich...................
                                                                  Icon Hash:00928e8e8686b000
                                                                  Entrypoint:0x1406a3ca0
                                                                  Entrypoint Section:bbbb
                                                                  Digitally signed:false
                                                                  Imagebase:0x140000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x67533378 [Fri Dec 6 17:25:12 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:6
                                                                  OS Version Minor:0
                                                                  File Version Major:6
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:6
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:bd2500bb87e3a94d2777b94c3c55a684
                                                                  Instruction
                                                                  push ebx
                                                                  push esi
                                                                  push edi
                                                                  push ebp
                                                                  dec eax
                                                                  lea esi, dword ptr [FFEBE355h]
                                                                  dec eax
                                                                  lea edi, dword ptr [esi-00561000h]
                                                                  push edi
                                                                  mov eax, 006A1D9Dh
                                                                  push eax
                                                                  dec eax
                                                                  mov ecx, esp
                                                                  dec eax
                                                                  mov edx, edi
                                                                  dec eax
                                                                  mov edi, esi
                                                                  mov esi, 00141C93h
                                                                  push ebp
                                                                  dec eax
                                                                  mov ebp, esp
                                                                  inc esp
                                                                  mov ecx, dword ptr [ecx]
                                                                  dec ecx
                                                                  mov eax, edx
                                                                  dec eax
                                                                  mov edx, esi
                                                                  dec eax
                                                                  lea esi, dword ptr [edi+02h]
                                                                  push esi
                                                                  mov al, byte ptr [edi]
                                                                  dec edx
                                                                  mov cl, al
                                                                  and al, 07h
                                                                  shr cl, 00000003h
                                                                  dec eax
                                                                  mov ebx, FFFFFD00h
                                                                  dec eax
                                                                  shl ebx, cl
                                                                  mov cl, al
                                                                  dec eax
                                                                  lea ebx, dword ptr [esp+ebx*2-00000E78h]
                                                                  dec eax
                                                                  and ebx, FFFFFFC0h
                                                                  push 00000000h
                                                                  dec eax
                                                                  cmp esp, ebx
                                                                  jne 00007F3648DE433Bh
                                                                  push ebx
                                                                  dec eax
                                                                  lea edi, dword ptr [ebx+08h]
                                                                  mov cl, byte ptr [esi-01h]
                                                                  dec edx
                                                                  mov byte ptr [edi+02h], al
                                                                  mov al, cl
                                                                  shr cl, 00000004h
                                                                  mov byte ptr [edi+01h], cl
                                                                  and al, 0Fh
                                                                  mov byte ptr [edi], al
                                                                  dec eax
                                                                  lea ecx, dword ptr [edi-04h]
                                                                  push eax
                                                                  inc ecx
                                                                  push edi
                                                                  dec eax
                                                                  lea eax, dword ptr [edi+04h]
                                                                  inc ebp
                                                                  xor edi, edi
                                                                  inc ecx
                                                                  push esi
                                                                  inc ecx
                                                                  mov esi, 00000001h
                                                                  inc ecx
                                                                  push ebp
                                                                  inc ebp
                                                                  xor ebp, ebp
                                                                  inc ecx
                                                                  push esp
                                                                  push ebp
                                                                  push ebx
                                                                  dec eax
                                                                  sub esp, 48h
                                                                  dec eax
                                                                  mov dword ptr [esp+38h], ecx
                                                                  dec eax
                                                                  mov dword ptr [esp+20h], eax
                                                                  mov eax, 00000001h
                                                                  dec eax
                                                                  mov dword ptr [esp+40h], esi
                                                                  dec esp
                                                                  mov dword ptr [esp+30h], eax
                                                                  mov ebx, eax
                                                                  inc esp
                                                                  mov dword ptr [esp+2Ch], ecx
                                                                  movzx ecx, byte ptr [edi+02h]
                                                                  shl ebx, cl
                                                                  mov ecx, ebx
                                                                  Programming Language:
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  • [IMP] VS2005 build 50727
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x6b5eb00x4c0b)b
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x6a50000x10eb0b)b
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3740000x43bc"hR
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x6b63700x20b)b
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x6a48800x28bbbb
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6a48b00x140bbbb
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  "hR0x10000x5610000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  bbbb0x5620000x1430000x142a0080d84fc3e7f6b67e27be7615a2010610False0.999211485373886data7.999837452913593IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  b)b0x6a50000x120000x114000ebb83e4c065739382942bc7e69fdaf9False0.2616621376811594data3.947360720361499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  None0x6b5cec0x2edata1.108695652173913
                                                                  RT_RCDATA0x389d180x3201empty0
                                                                  RT_RCDATA0x38cf1c0x3201empty0
                                                                  RT_RCDATA0x3901200x3201empty0
                                                                  RT_RCDATA0x3933240x3201empty0
                                                                  RT_RCDATA0x3965280x3201empty0
                                                                  RT_RCDATA0x39972c0x3201empty0
                                                                  RT_RCDATA0x39c9300x3201empty0
                                                                  RT_RCDATA0x39fb340x3201empty0
                                                                  RT_RCDATA0x3a2d380x3201empty0
                                                                  RT_RCDATA0x3a5f3c0x3201empty0
                                                                  RT_RCDATA0x3a91400x3201empty0
                                                                  RT_RCDATA0x3ac3440x3201empty0
                                                                  RT_RCDATA0x3af5480x3201empty0
                                                                  RT_RCDATA0x3b274c0x3201empty0
                                                                  RT_RCDATA0x3b59500x3201empty0
                                                                  RT_RCDATA0x3b8b540x3201empty0
                                                                  RT_RCDATA0x3bbd580x3201empty0
                                                                  RT_RCDATA0x3bef5c0x3201empty0
                                                                  RT_RCDATA0x3c21600x3201empty0
                                                                  RT_RCDATA0x3c53640x3201empty0
                                                                  RT_RCDATA0x3c85680x3201empty0
                                                                  RT_RCDATA0x3cb76c0x3201empty0
                                                                  RT_RCDATA0x3ce9700x3201empty0
                                                                  RT_RCDATA0x3d1b740x22empty0
                                                                  RT_RCDATA0x3d1b980x77empty0
                                                                  RT_RCDATA0x3d1c100x3201empty0
                                                                  RT_RCDATA0x3d4e140x3201empty0
                                                                  RT_RCDATA0x3d80180x3201empty0
                                                                  RT_RCDATA0x3db21c0x3201empty0
                                                                  RT_RCDATA0x3de4200x3201empty0
                                                                  RT_RCDATA0x3e16240x3201empty0
                                                                  RT_RCDATA0x3e48280x3201empty0
                                                                  RT_RCDATA0x3e7a2c0x68bempty0
                                                                  RT_RCDATA0x3e80b80xfempty0
                                                                  RT_RCDATA0x3e80c80x3201empty0
                                                                  RT_RCDATA0x3eb2cc0x3201empty0
                                                                  RT_RCDATA0x3ee4d00xda443empty0
                                                                  RT_RCDATA0x4c89140x3201empty0
                                                                  RT_RCDATA0x4cbb180x3201empty0
                                                                  RT_RCDATA0x4ced1c0x4d8aempty0
                                                                  RT_RCDATA0x4d3aa80x3201empty0
                                                                  RT_RCDATA0x4d6cac0x3201empty0
                                                                  RT_RCDATA0x4d9eb00x3201empty0
                                                                  RT_RCDATA0x4dd0b40x3201empty0
                                                                  RT_RCDATA0x4e02b80x3201empty0
                                                                  RT_RCDATA0x4e34bc0x3201empty0
                                                                  RT_RCDATA0x4e66c00x3201empty0
                                                                  RT_RCDATA0x4e98c40x3201empty0
                                                                  RT_RCDATA0x4ecac80x55empty0
                                                                  RT_RCDATA0x4ecb200x3201empty0
                                                                  RT_RCDATA0x4efd240x9eempty0
                                                                  RT_RCDATA0x4efdc40x1f2empty0
                                                                  RT_RCDATA0x4effb80x3201empty0
                                                                  RT_RCDATA0x4f31bc0x3201empty0
                                                                  RT_RCDATA0x4f63c00x3201empty0
                                                                  RT_RCDATA0x4f95c40x3201empty0
                                                                  RT_RCDATA0x4fc7c80x3201empty0
                                                                  RT_RCDATA0x4ff9cc0x7dempty0
                                                                  RT_RCDATA0x4ffa4c0x7dempty0
                                                                  RT_RCDATA0x4ffacc0x7dempty0
                                                                  RT_RCDATA0x4ffb4c0x7dempty0
                                                                  RT_RCDATA0x4ffbcc0x7dempty0
                                                                  RT_RCDATA0x4ffc4c0x7dempty0
                                                                  RT_RCDATA0x4ffccc0x7dempty0
                                                                  RT_RCDATA0x4ffd4c0x7dempty0
                                                                  RT_RCDATA0x4ffdcc0x7dempty0
                                                                  RT_RCDATA0x4ffe4c0x7dempty0
                                                                  RT_RCDATA0x4ffecc0x7dempty0
                                                                  RT_RCDATA0x4fff4c0x7dempty0
                                                                  RT_RCDATA0x4fffcc0x7dempty0
                                                                  RT_RCDATA0x50004c0x7dempty0
                                                                  RT_RCDATA0x5000cc0x7dempty0
                                                                  RT_RCDATA0x50014c0x7dempty0
                                                                  RT_RCDATA0x5001cc0x7dempty0
                                                                  RT_RCDATA0x50024c0x7dempty0
                                                                  RT_RCDATA0x5002cc0x7dempty0
                                                                  RT_RCDATA0x50034c0x7dempty0
                                                                  RT_RCDATA0x5003cc0x7dempty0
                                                                  RT_RCDATA0x50044c0x3201empty0
                                                                  RT_RCDATA0x5036500x3201empty0
                                                                  RT_RCDATA0x5068540x3201empty0
                                                                  RT_RCDATA0x509a580x3201empty0
                                                                  RT_RCDATA0x50cc5c0x3201empty0
                                                                  RT_RCDATA0x50fe600x3201empty0
                                                                  RT_RCDATA0x5130640x3201empty0
                                                                  RT_RCDATA0x5162680x3201empty0
                                                                  RT_RCDATA0x51946c0x3201empty0
                                                                  RT_RCDATA0x51c6700x3201empty0
                                                                  RT_RCDATA0x51f8740x3201empty0
                                                                  RT_RCDATA0x522a780x3201empty0
                                                                  RT_RCDATA0x525c7c0x3201empty0
                                                                  RT_RCDATA0x528e800x3201empty0
                                                                  RT_RCDATA0x52c0840x3201empty0
                                                                  RT_RCDATA0x52f2880x3201empty0
                                                                  RT_RCDATA0x53248c0x3201empty0
                                                                  RT_RCDATA0x5356900x3201empty0
                                                                  RT_RCDATA0x5388940x3201empty0
                                                                  RT_RCDATA0x53ba980x3201empty0
                                                                  RT_RCDATA0x53ec9c0x3201empty0
                                                                  RT_RCDATA0x541ea00x3201empty0
                                                                  RT_RCDATA0x5450a40x3201empty0
                                                                  RT_RCDATA0x5482a80x3201empty0
                                                                  RT_RCDATA0x54b4ac0x3201empty0
                                                                  RT_RCDATA0x54e6b00x3201empty0
                                                                  RT_RCDATA0x5518b40x3201empty0
                                                                  RT_RCDATA0x554ab80x3201empty0
                                                                  RT_RCDATA0x557cbc0x3201empty0
                                                                  RT_RCDATA0x55aec00x3201empty0
                                                                  RT_RCDATA0x55e0c40x3201empty0
                                                                  RT_RCDATA0x5612c80x3201empty0
                                                                  RT_RCDATA0x5644cc0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5676d00x3201data1.0008593078665728
                                                                  RT_RCDATA0x56a8d40x3201data1.0008593078665728
                                                                  RT_RCDATA0x56dad80x3201data1.0008593078665728
                                                                  RT_RCDATA0x570cdc0x3201data1.0008593078665728
                                                                  RT_RCDATA0x573ee00x3201data1.0008593078665728
                                                                  RT_RCDATA0x5770e40x3201data1.0008593078665728
                                                                  RT_RCDATA0x57a2e80x3201data1.0008593078665728
                                                                  RT_RCDATA0x57d4ec0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5806f00x3201data1.0008593078665728
                                                                  RT_RCDATA0x5838f40x3201data1.0008593078665728
                                                                  RT_RCDATA0x586af80x3201data1.0008593078665728
                                                                  RT_RCDATA0x589cfc0x3201data1.0008593078665728
                                                                  RT_RCDATA0x58cf000x3201data1.0008593078665728
                                                                  RT_RCDATA0x5901040x3201data1.0008593078665728
                                                                  RT_RCDATA0x5933080x3201data1.0008593078665728
                                                                  RT_RCDATA0x59650c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5997100x3201data1.0008593078665728
                                                                  RT_RCDATA0x59c9140x3201Dyalog APL external workspace version -15.-681.0008593078665728
                                                                  RT_RCDATA0x59fb180x3201OpenPGP Public Key1.0008593078665728
                                                                  RT_RCDATA0x5a2d1c0x3201Novell LANalyzer capture file1.0008593078665728
                                                                  RT_RCDATA0x5a5f200x3201data1.0008593078665728
                                                                  RT_RCDATA0x5a91240x3201data1.0008593078665728
                                                                  RT_RCDATA0x5ac3280x3201data1.0008593078665728
                                                                  RT_RCDATA0x5af52c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5b27300x3201data1.0008593078665728
                                                                  RT_RCDATA0x5b59340x3201OpenPGP Public Key1.0008593078665728
                                                                  RT_RCDATA0x5b8b380x3201data1.0008593078665728
                                                                  RT_RCDATA0x5bbd3c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5bef400x3201data1.0008593078665728
                                                                  RT_RCDATA0x5c21440x3201data1.0008593078665728
                                                                  RT_RCDATA0x5c53480x3201data1.0008593078665728
                                                                  RT_RCDATA0x5c854c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5cb7500x3201data1.0008593078665728
                                                                  RT_RCDATA0x5ce9540x3201data1.0008593078665728
                                                                  RT_RCDATA0x5d1b580x3201data1.0008593078665728
                                                                  RT_RCDATA0x5d4d5c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5d7f600x3201data1.0008593078665728
                                                                  RT_RCDATA0x5db1640x3201data1.0008593078665728
                                                                  RT_RCDATA0x5de3680x3201data1.0008593078665728
                                                                  RT_RCDATA0x5e156c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5e47700x3201data1.0008593078665728
                                                                  RT_RCDATA0x5e79740x3201data1.0008593078665728
                                                                  RT_RCDATA0x5eab780x3201data1.0008593078665728
                                                                  RT_RCDATA0x5edd7c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5f0f800x3201data1.0008593078665728
                                                                  RT_RCDATA0x5f41840x3201data1.0008593078665728
                                                                  RT_RCDATA0x5f73880x3201data1.0008593078665728
                                                                  RT_RCDATA0x5fa58c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x5fd7900x3201data1.0008593078665728
                                                                  RT_RCDATA0x6009940x3201data1.0008593078665728
                                                                  RT_RCDATA0x603b980x3201data1.0008593078665728
                                                                  RT_RCDATA0x606d9c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x609fa00x3201data1.0008593078665728
                                                                  RT_RCDATA0x60d1a40x3201data1.0008593078665728
                                                                  RT_RCDATA0x6103a80x3201data1.0008593078665728
                                                                  RT_RCDATA0x6135ac0x3201data1.0008593078665728
                                                                  RT_RCDATA0x6167b00x3201OpenPGP Public Key1.0008593078665728
                                                                  RT_RCDATA0x6199b40x3201data1.0008593078665728
                                                                  RT_RCDATA0x61cbb80x3201data1.0008593078665728
                                                                  RT_RCDATA0x61fdbc0x3201data1.0008593078665728
                                                                  RT_RCDATA0x622fc00x3201data1.0008593078665728
                                                                  RT_RCDATA0x6261c40x3201data1.0008593078665728
                                                                  RT_RCDATA0x6293c80x3201data1.0008593078665728
                                                                  RT_RCDATA0x62c5cc0x3201data1.0008593078665728
                                                                  RT_RCDATA0x62f7d00x3201data1.0008593078665728
                                                                  RT_RCDATA0x6329d40x3201data1.0008593078665728
                                                                  RT_RCDATA0x635bd80x3201data1.0008593078665728
                                                                  RT_RCDATA0x638ddc0x3201data1.0008593078665728
                                                                  RT_RCDATA0x63bfe00x3201data1.0008593078665728
                                                                  RT_RCDATA0x63f1e40x3201data1.0008593078665728
                                                                  RT_RCDATA0x6423e80x3201data1.0008593078665728
                                                                  RT_RCDATA0x6455ec0x3201data1.0008593078665728
                                                                  RT_RCDATA0x6487f00x3201data1.0008593078665728
                                                                  RT_RCDATA0x64b9f40x3201data1.0008593078665728
                                                                  RT_RCDATA0x64ebf80x3201data1.0008593078665728
                                                                  RT_RCDATA0x651dfc0x3201data1.0008593078665728
                                                                  RT_RCDATA0x6550000x3201data1.0008593078665728
                                                                  RT_RCDATA0x6582040x3201data1.0008593078665728
                                                                  RT_RCDATA0x65b4080x3201data1.0008593078665728
                                                                  RT_RCDATA0x65e60c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x6618100x3201data1.0008593078665728
                                                                  RT_RCDATA0x664a140x3201data1.0008593078665728
                                                                  RT_RCDATA0x667c180x3201data1.0008593078665728
                                                                  RT_RCDATA0x66ae1c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x66e0200x3201data1.0008593078665728
                                                                  RT_RCDATA0x6712240x3201data1.0008593078665728
                                                                  RT_RCDATA0x6744280x3201data1.0008593078665728
                                                                  RT_RCDATA0x67762c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x67a8300x3201data1.0008593078665728
                                                                  RT_RCDATA0x67da340x3201data1.0008593078665728
                                                                  RT_RCDATA0x680c380x3201data1.0008593078665728
                                                                  RT_RCDATA0x683e3c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x6870400x3201data1.0008593078665728
                                                                  RT_RCDATA0x68a2440x3201data1.0008593078665728
                                                                  RT_RCDATA0x68d4480x3201data1.0008593078665728
                                                                  RT_RCDATA0x69064c0x3201data1.0008593078665728
                                                                  RT_RCDATA0x6938500x3201OpenPGP Secret Key1.0008593078665728
                                                                  RT_RCDATA0x696a540x3201data1.0008593078665728
                                                                  RT_MANIFEST0x6b5d200x2data5.0
                                                                  RT_MANIFEST0x6b5d280x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                  None0x699de40x148data1.0335365853658536
                                                                  None0x699f2c0x144data1.0339506172839505
                                                                  None0x69a0700x114data1.039855072463768
                                                                  None0x69a1840xc8data1.055
                                                                  None0x69a24c0x16cdata1.0302197802197801
                                                                  None0x69a3b80x11adata1.0390070921985815
                                                                  None0x69a4d40xcedata1.0533980582524272
                                                                  None0x69a5a40xaedata1.0632183908045978
                                                                  None0x69a6540xccDOS executable (COM)1.053921568627451
                                                                  None0x69a7200xa8data1.0654761904761905
                                                                  None0x69a7c80x10adata1.0413533834586466
                                                                  None0x69a8d40xccdata1.053921568627451
                                                                  None0x69a9a00x114data1.039855072463768
                                                                  None0x69aab40x134data1.0357142857142858
                                                                  None0x69abe80xdcdata1.05
                                                                  None0x69acc40x84data1.0833333333333333
                                                                  None0x69ad480xa0data1.06875
                                                                  None0x69ade80x64COM executable for DOS1.11
                                                                  None0x69ae4c0xd2data1.0523809523809524
                                                                  None0x69af200x10cdata1.041044776119403
                                                                  None0x69b02c0x11adata1.0390070921985815
                                                                  None0x69b1480xdedata1.0495495495495495
                                                                  None0x69b2280x18adata1.0279187817258884
                                                                  None0x69b3b40xacdata1.063953488372093
                                                                  None0x69b4600x150data1.0327380952380953
                                                                  None0x69b5b00x182data1.028497409326425
                                                                  None0x69b7340x104data1.0423076923076924
                                                                  None0x69b8380xeadata1.047008547008547
                                                                  None0x69b9240xc0data1.0572916666666667
                                                                  None0x69b9e40x116data1.039568345323741
                                                                  None0x69bafc0x94OpenPGP Public Key1.0743243243243243
                                                                  None0x69bb900x180data1.0286458333333333
                                                                  None0x69bd100x16adata1.0303867403314917
                                                                  None0x69be7c0x13adata1.035031847133758
                                                                  None0x69bfb80xd2data1.0523809523809524
                                                                  None0x69c08c0x130data1.0361842105263157
                                                                  None0x69c1bc0x84data1.0833333333333333
                                                                  None0x69c2400xb2data1.0617977528089888
                                                                  None0x69c2f40xf2data1.0454545454545454
                                                                  None0x69c3e80xccdata1.053921568627451
                                                                  None0x69c4b40x96data1.0733333333333333
                                                                  None0x69c54c0x13adata1.035031847133758
                                                                  None0x69c6880x100data1.04296875
                                                                  None0x69c7880xf8data1.0443548387096775
                                                                  None0x69c8800x10adata1.0413533834586466
                                                                  None0x69c98c0xd2data1.0523809523809524
                                                                  None0x69ca600x8cdata1.0785714285714285
                                                                  None0x69caec0xbedata1.0578947368421052
                                                                  None0x69cbac0x114data1.039855072463768
                                                                  None0x69ccc00x7adata1.0901639344262295
                                                                  None0x69cd3c0x90data1.0763888888888888
                                                                  None0x69cdcc0x112data1.0401459854014599
                                                                  None0x69cee00x138data1.0352564102564104
                                                                  None0x69d0180x12cdata1.0366666666666666
                                                                  None0x69d1440x9adata1.0714285714285714
                                                                  None0x69d1e00x12cOpenPGP Secret Key1.0366666666666666
                                                                  None0x69d30c0xbedata1.0578947368421052
                                                                  None0x69d3cc0xf8data1.0443548387096775
                                                                  None0x69d4c40x56data1.127906976744186
                                                                  None0x69d51c0xe2data1.0486725663716814
                                                                  None0x69d6000x140data1.034375
                                                                  None0x69d7400xb8data1.059782608695652
                                                                  None0x69d7f80x128data1.037162162162162
                                                                  None0x69d9200xe8data1.0474137931034482
                                                                  None0x69da080x9cdata1.0705128205128205
                                                                  None0x69daa40x12edata1.0364238410596027
                                                                  None0x69dbd40xb0data1.0625
                                                                  None0x69dc840xf2data1.0454545454545454
                                                                  None0x69dd780xd4data1.0518867924528301
                                                                  None0x69de4c0xf6data1.0447154471544715
                                                                  None0x69df440x11edata1.0384615384615385
                                                                  None0x69e0640xc4data1.0561224489795917
                                                                  None0x69e1280x10adata1.0413533834586466
                                                                  None0x69e2340x90data1.0763888888888888
                                                                  None0x69e2c40xc0data1.0572916666666667
                                                                  None0x69e3840x11cdata1.0387323943661972
                                                                  None0x69e4a00x132data1.0359477124183007
                                                                  None0x69e5d40x128data1.037162162162162
                                                                  None0x69e6fc0x72data1.0964912280701755
                                                                  None0x69e7700x96data1.0733333333333333
                                                                  None0x69e8080xccdata1.053921568627451
                                                                  None0x69e8d40xfadata1.044
                                                                  None0x69e9d00xa8data1.0654761904761905
                                                                  None0x69ea780xc0data1.0572916666666667
                                                                  None0x69eb380xdedata1.0495495495495495
                                                                  None0x69ec180x10eOpenPGP Secret Key1.0407407407407407
                                                                  None0x69ed280x98data1.0723684210526316
                                                                  None0x69edc00x17adata1.029100529100529
                                                                  None0x69ef3c0xd6data1.0514018691588785
                                                                  None0x69f0140x9adata1.0714285714285714
                                                                  None0x69f0b00xf0data1.0458333333333334
                                                                  None0x69f1a00xeadata1.047008547008547
                                                                  None0x69f28c0x98data1.0723684210526316
                                                                  None0x69f3240x78data1.0916666666666666
                                                                  None0x69f39c0xf4data1.0450819672131149
                                                                  None0x69f4900x120data1.0381944444444444
                                                                  None0x69f5b00xaadata1.0647058823529412
                                                                  None0x69f65c0xc4data1.0561224489795917
                                                                  None0x69f7200xc6data1.0555555555555556
                                                                  None0x69f7e80x66data1.107843137254902
                                                                  None0x69f8500xecdata1.0466101694915255
                                                                  None0x69f93c0x134data1.0357142857142858
                                                                  None0x69fa700x5adata1.1222222222222222
                                                                  None0x69facc0x8cdata1.0785714285714285
                                                                  None0x69fb580xe4data1.0482456140350878
                                                                  None0x69fc3c0x172data1.0297297297297296
                                                                  None0x69fdb00x11adata1.0390070921985815
                                                                  None0x69fecc0xecdata1.0466101694915255
                                                                  None0x69ffb80xe6data1.0478260869565217
                                                                  None0x6a00a00xb8data1.059782608695652
                                                                  None0x6a01580x128data1.037162162162162
                                                                  None0x6a02800x114data1.039855072463768
                                                                  None0x6a03940x132data1.0359477124183007
                                                                  None0x6a04c80xfedata1.0433070866141732
                                                                  None0x6a05c80x80OpenPGP Secret Key1.0859375
                                                                  None0x6a06480xcadata1.0544554455445545
                                                                  None0x6a07140xdcdata1.05
                                                                  None0x6a07f00x154data1.0323529411764707
                                                                  DLLImport
                                                                  api-ms-win-crt-heap-l1-1-0.dllfree
                                                                  api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                                  api-ms-win-crt-math-l1-1-0.dllcosf
                                                                  api-ms-win-crt-runtime-l1-1-0.dllexit
                                                                  api-ms-win-crt-stdio-l1-1-0.dllfseek
                                                                  api-ms-win-crt-string-l1-1-0.dllstrcmp
                                                                  api-ms-win-crt-utility-l1-1-0.dllqsort
                                                                  d3d9.dllDirect3DCreate9
                                                                  IMM32.dllImmGetContext
                                                                  KeRNeL32.dlLLoadLibraryA, DeleteAtom, GetProcAddress, VirtualProtect
                                                                  MSVCP140.dll_Query_perf_counter
                                                                  OLE32.DllCoTaskMemFree
                                                                  SHELL32.dllShellExecuteA
                                                                  USER32.dllSetCursor
                                                                  VCRUNTIME140.dllmemcpy
                                                                  VCRUNTIME140_1.dll__CxxFrameHandler4
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-12-08T02:10:58.062907+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704104.26.9.59443TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 8, 2024 02:10:55.792361021 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:55.792408943 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:55.792552948 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:55.801534891 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:55.801551104 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:57.030889034 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:57.030961990 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:57.687709093 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:57.687725067 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:57.688004971 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:57.688128948 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:57.691318035 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:57.735323906 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:58.062921047 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:58.062983990 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:58.062990904 CET44349704104.26.9.59192.168.2.5
                                                                  Dec 8, 2024 02:10:58.063034058 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:58.064325094 CET49704443192.168.2.5104.26.9.59
                                                                  Dec 8, 2024 02:10:58.064341068 CET44349704104.26.9.59192.168.2.5
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 8, 2024 02:10:55.544616938 CET4922153192.168.2.51.1.1.1
                                                                  Dec 8, 2024 02:10:55.772116899 CET53492211.1.1.1192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Dec 8, 2024 02:10:55.544616938 CET192.168.2.51.1.1.10x4deStandard query (0)api.myip.comA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Dec 8, 2024 02:10:55.772116899 CET1.1.1.1192.168.2.50x4deNo error (0)api.myip.com104.26.9.59A (IP address)IN (0x0001)false
                                                                  Dec 8, 2024 02:10:55.772116899 CET1.1.1.1192.168.2.50x4deNo error (0)api.myip.com104.26.8.59A (IP address)IN (0x0001)false
                                                                  Dec 8, 2024 02:10:55.772116899 CET1.1.1.1192.168.2.50x4deNo error (0)api.myip.com172.67.75.163A (IP address)IN (0x0001)false
                                                                  • api.myip.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.549704104.26.9.594431488C:\Users\user\Desktop\Nexus-Executor.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-12-08 01:10:57 UTC182OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43
                                                                  Host: api.myip.com
                                                                  2024-12-08 01:10:58 UTC777INHTTP/1.1 200 OK
                                                                  Date: Sun, 08 Dec 2024 01:10:57 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  vary: Accept-Encoding
                                                                  CF-Cache-Status: DYNAMIC
                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=82U0AHGo07uGnJ4ghDoxCK6Xs7Z9M0O7iOR4L3oDbFX8%2BFatuRRVB7FjqfXLSihlm7jscYCr%2BjFqlX6LGxSVAzIDZTGcOsb6LST5qVvk1YjLWOfQ1koUppbtLsYD8g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                  Server: cloudflare
                                                                  CF-RAY: 8ee8e0f39f5341ac-EWR
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1741&min_rtt=1736&rtt_var=662&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=820&delivery_rate=1639528&cwnd=252&unsent_bytes=0&cid=f8393dd680f1e335&ts=1036&x=0"
                                                                  2024-12-08 01:10:58 UTC63INData Raw: 33 39 0d 0a 7b 22 69 70 22 3a 22 38 2e 34 36 2e 31 32 33 2e 32 32 38 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 63 22 3a 22 55 53 22 7d 0d 0a
                                                                  Data Ascii: 39{"ip":"8.46.123.228","country":"United States","cc":"US"}
                                                                  2024-12-08 01:10:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                  Data Ascii: 0


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:20:10:53
                                                                  Start date:07/12/2024
                                                                  Path:C:\Users\user\Desktop\Nexus-Executor.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\Nexus-Executor.exe"
                                                                  Imagebase:0x7ff762a90000
                                                                  File size:1'393'194 bytes
                                                                  MD5 hash:1D5119509128D468DD629FFF653A096A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:2.7%
                                                                    Dynamic/Decrypted Code Coverage:9%
                                                                    Signature Coverage:25.8%
                                                                    Total number of Nodes:708
                                                                    Total number of Limit Nodes:26
                                                                    execution_graph 88700 7ff762a9d4f0 88701 7ff762a9d51a 88700->88701 88703 7ff762a9d59d 88701->88703 88714 7ff762a97d10 00007FF8B9F61310 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 88701->88714 88705 7ff762a9d60b 88703->88705 88715 7ff762ab3820 00007FF8B9F61310 00007FF8B9F61310 00007FF8C610F020 88703->88715 88707 7ff762a9d717 88705->88707 88710 7ff762a9d72a 88705->88710 88706 7ff762a9d7f9 88707->88706 88717 7ff762ab3400 00007FF8B9F61310 00007FF8C610F020 88707->88717 88708 7ff762a9d790 88711 7ff762a9d7b0 88708->88711 88712 7ff762a9d79c 00007FF8B9F61310 88708->88712 88710->88708 88716 7ff762ab3400 00007FF8B9F61310 00007FF8C610F020 88710->88716 88712->88711 88714->88703 88715->88705 88716->88708 88717->88706 88718 7ff762ae3b90 88719 7ff762ae3bcd 88718->88719 88720 7ff762ae3bd2 88719->88720 88721 7ff762ae3bf2 88719->88721 88722 7ff762ae3c9a PostQuitMessage 88719->88722 88723 7ff762ae3c24 88721->88723 88724 7ff762ae3bf9 88721->88724 88722->88720 88723->88720 88732 7ff762ae3b20 88723->88732 88725 7ff762ae3cbe 88724->88725 88726 7ff762ae3c11 88724->88726 88725->88720 88729 7ff762ae3ccd GetWindowRect 88725->88729 88726->88720 88728 7ff762ae3db1 NtdllDefWindowProc_A 88726->88728 88728->88720 88729->88720 88730 7ff762ae3d51 88729->88730 88730->88720 88731 7ff762ae3d76 SetWindowPos 88730->88731 88731->88720 88734 7ff762ae3b29 88732->88734 88736 7ff762adf630 88734->88736 88737 7ff762adf640 88736->88737 88738 7ff762adf657 88736->88738 88737->88738 88740 7ff762adf2f0 88737->88740 88738->88720 88741 7ff762adf313 88740->88741 88748 7ff762ac1770 88741->88748 88743 7ff762adf583 88743->88738 88744 7ff762adf36a 88744->88743 88745 7ff762adf4b0 00007FF8B9F61310 88744->88745 88747 7ff762adf4d3 88744->88747 88745->88745 88745->88747 88746 7ff762adf57a 00007FF8C610F020 88746->88743 88747->88743 88747->88746 88749 7ff762ac190a 88748->88749 88750 7ff762ac17a6 88748->88750 88749->88744 88750->88749 88752 7ff762ac21b0 88750->88752 88753 7ff762ac21e2 88752->88753 88757 7ff762ac1ec0 88753->88757 88758 7ff762ac1f23 88757->88758 88760 7ff762ac2016 88758->88760 88765 7ff762ac73d0 00007FF8B9F61310 88758->88765 88767 7ff762ac1d00 7 API calls 88760->88767 88762 7ff762ac2191 00007FF8C610F020 88762->88749 88763 7ff762ac1fcf 88763->88760 88766 7ff762ac73d0 00007FF8B9F61310 88763->88766 88765->88763 88766->88763 88767->88762 88768 7ff762ae1b90 88771 7ff762ae1c2c 88768->88771 88769 7ff762ae1eef 88770 7ff762ae1dbb LoadLibraryA 88770->88771 88771->88769 88771->88770 88799 7ff762adf7a0 88800 7ff762adf7b6 88799->88800 88801 7ff762adf7fb QueryPerformanceFrequency 88800->88801 88802 7ff762adf811 QueryPerformanceCounter 88801->88802 88803 7ff762adfa2e 88801->88803 88802->88803 88804 7ff762adf827 88802->88804 88805 7ff762adf8cc GetKeyboardLayout GetLocaleInfoA 88804->88805 88807 7ff762adf936 88805->88807 88806 7ff762adf9c0 LoadLibraryA 88806->88807 88808 7ff762adf9ef GetProcAddress GetProcAddress 88806->88808 88807->88806 88809 7ff762adf9dc 88807->88809 88810 7ff762aebc80 88811 7ff762aebc94 88810->88811 88812 7ff762aebdcc 88811->88812 88813 7ff762aebc9c 88811->88813 88862 7ff762aec0f8 7 API calls 88812->88862 88815 7ff762aebdd6 88813->88815 88821 7ff762aebcba __scrt_release_startup_lock 88813->88821 88863 7ff762aec0f8 7 API calls 88815->88863 88817 7ff762aebcdf 88818 7ff762aebde1 88864 7ff762aec388 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 88818->88864 88820 7ff762aebdfd __scrt_common_main_seh 88821->88817 88829 7ff762aec240 88821->88829 88823 7ff762aebd6a 88832 7ff762ae6800 88823->88832 88827 7ff762aebd8d 88827->88818 88828 7ff762aebd91 88827->88828 88828->88817 88830 7ff762aec525 88829->88830 88831 7ff762aec257 GetStartupInfoW 88830->88831 88831->88823 88834 7ff762ae682f 88832->88834 88865 7ff762ae7c90 88834->88865 88835 7ff762ae6945 88869 7ff762ae3de0 7 API calls 88835->88869 88837 7ff762ae6972 88838 7ff762ae7c90 00007FF8C610F020 88837->88838 88839 7ff762ae697f 88838->88839 88840 7ff762ae7c90 00007FF8C610F020 88839->88840 88841 7ff762ae698d 88840->88841 88870 7ff762ae3f70 00007FF8A8DA5F50 88841->88870 88845 7ff762ae6998 88877 7ff762ae58d0 GetModuleFileNameA 88845->88877 88847 7ff762ae6ab4 89077 7ff762ae4120 111 API calls 88847->89077 88850 7ff762ae6ab9 89078 7ff762ae3f40 DestroyWindow UnregisterClassA 88850->89078 88854 7ff762ae6ac3 88861 7ff762aec288 GetModuleHandleW 88854->88861 88857 7ff762ae6a48 MessageBoxA 88858 7ff762ae7c90 00007FF8C610F020 88857->88858 88859 7ff762ae699d 88858->88859 88859->88847 88859->88857 88860 7ff762ae7c90 00007FF8C610F020 88859->88860 88961 7ff762ae4140 88859->88961 88970 7ff762ae4320 88859->88970 89059 7ff762ae41d0 88859->89059 89068 7ff762ae8480 88859->89068 89072 7ff762ae8810 88859->89072 88860->88859 88861->88827 88862->88815 88863->88818 88864->88820 88867 7ff762ae7cb0 Concurrency::details::ResourceManager::CreateNodeTopology 88865->88867 88866 7ff762ae7d61 88866->88835 88867->88866 89079 7ff762aeb808 88867->89079 88869->88837 88871 7ff762ae3f92 88870->88871 88872 7ff762ae40a0 88871->88872 89082 7ff762aa7c60 00007FF8C6125630 88872->89082 88874 7ff762ae40dc 89085 7ff762a95be0 88874->89085 88876 7ff762ae40e3 88876->88845 88879 7ff762ae5921 88877->88879 88878 7ff762ae7c90 00007FF8C610F020 88898 7ff762ae5a3a 88878->88898 88879->88878 88880 7ff762ae5bef 88881 7ff762ae5c98 88880->88881 88882 7ff762ae7c90 00007FF8C610F020 88880->88882 88883 7ff762ae5cb6 88881->88883 88884 7ff762ae7c90 00007FF8C610F020 88881->88884 88882->88881 88885 7ff762ae5cd4 88883->88885 88886 7ff762ae7c90 00007FF8C610F020 88883->88886 88884->88883 88887 7ff762ae5cf2 88885->88887 88888 7ff762ae7c90 00007FF8C610F020 88885->88888 88886->88885 88889 7ff762ae61c6 88887->88889 88901 7ff762ae5d00 88887->88901 88888->88887 88890 7ff762ae6411 88889->88890 88891 7ff762ae620a 88889->88891 88896 7ff762ae77a0 00007FF8C610F020 88890->88896 89115 7ff762ae7650 00007FF8B9F61310 00007FF8C610F020 88891->89115 88893 7ff762ae621e 89116 7ff762ae7650 00007FF8B9F61310 00007FF8C610F020 88893->89116 88894 7ff762ae7c90 00007FF8C610F020 88894->88880 88897 7ff762ae6494 88896->88897 88899 7ff762ae7c90 00007FF8C610F020 88897->88899 88898->88880 88898->88894 88903 7ff762ae64a1 88899->88903 88900 7ff762ae7c90 00007FF8C610F020 88904 7ff762ae5e44 88900->88904 88901->88900 88902 7ff762ae6554 89118 7ff762ae7650 00007FF8B9F61310 00007FF8C610F020 88902->89118 88903->88902 88909 7ff762ae77a0 00007FF8C610F020 88903->88909 89111 7ff762ae77a0 88904->89111 88907 7ff762ae5e79 88910 7ff762ae7c90 00007FF8C610F020 88907->88910 88908 7ff762ae6569 89119 7ff762ae7650 00007FF8B9F61310 00007FF8C610F020 88908->89119 88912 7ff762ae6547 88909->88912 88913 7ff762ae5e86 88910->88913 88914 7ff762ae7c90 00007FF8C610F020 88912->88914 88915 7ff762ae7c90 00007FF8C610F020 88913->88915 88914->88902 88934 7ff762ae5e94 88915->88934 88916 7ff762ae6232 88917 7ff762ae7c90 00007FF8C610F020 88916->88917 88918 7ff762ae6378 88917->88918 89117 7ff762ae8af0 00007FF8B9F61310 00007FF8C610F020 88918->89117 88920 7ff762ae63c6 88921 7ff762ae77a0 00007FF8C610F020 88920->88921 88922 7ff762ae63e2 88921->88922 88923 7ff762ae7c90 00007FF8C610F020 88922->88923 88924 7ff762ae63ef 88923->88924 88925 7ff762ae7c90 00007FF8C610F020 88924->88925 88926 7ff762ae63fd 88925->88926 88930 7ff762ae7c90 00007FF8C610F020 88926->88930 88927 7ff762ae7c90 00007FF8C610F020 88929 7ff762ae66c3 88927->88929 88928 7ff762ae657d 88928->88927 89120 7ff762ae8af0 00007FF8B9F61310 00007FF8C610F020 88929->89120 88932 7ff762ae640b 88930->88932 88931 7ff762ae7c90 00007FF8C610F020 88935 7ff762ae5fda 88931->88935 88937 7ff762ae7c90 00007FF8C610F020 88932->88937 88934->88931 88938 7ff762ae77a0 00007FF8C610F020 88935->88938 88936 7ff762ae6711 88939 7ff762ae77a0 00007FF8C610F020 88936->88939 88940 7ff762ae61c0 GetCurrentDirectoryA 88937->88940 88941 7ff762ae600f 88938->88941 88942 7ff762ae672d 88939->88942 88952 7ff762ae6788 88940->88952 88944 7ff762ae7c90 00007FF8C610F020 88941->88944 88945 7ff762ae7c90 00007FF8C610F020 88942->88945 88946 7ff762ae601c 88944->88946 88947 7ff762ae673a 88945->88947 88948 7ff762ae7c90 00007FF8C610F020 88946->88948 88949 7ff762ae7c90 00007FF8C610F020 88947->88949 88955 7ff762ae602a 88948->88955 88950 7ff762ae6748 88949->88950 88951 7ff762ae7c90 00007FF8C610F020 88950->88951 88951->88932 88952->88859 88952->88952 88953 7ff762ae7c90 00007FF8C610F020 88954 7ff762ae6170 88953->88954 88956 7ff762ae77a0 00007FF8C610F020 88954->88956 88955->88953 88957 7ff762ae61a5 88956->88957 88958 7ff762ae7c90 00007FF8C610F020 88957->88958 88959 7ff762ae61b2 88958->88959 88960 7ff762ae7c90 00007FF8C610F020 88959->88960 88960->88940 88962 7ff762ae4144 PeekMessageA 88961->88962 88963 7ff762ae4163 TranslateMessage DispatchMessageA 88962->88963 88964 7ff762ae41ad 88962->88964 88965 7ff762ae41ab 88963->88965 88967 7ff762ae4181 88963->88967 89121 7ff762ae0330 88964->89121 88965->88962 88967->88859 88971 7ff762ae4358 88970->88971 88973 7ff762ae4619 88971->88973 89236 7ff762ae26c0 88971->89236 88974 7ff762ae4f7c 88973->88974 88977 7ff762ae4659 88973->88977 88975 7ff762ae8480 2 API calls 88974->88975 88976 7ff762ae4fce 88975->88976 88978 7ff762ae7c90 00007FF8C610F020 88976->88978 88979 7ff762ae46c0 SHBrowseForFolder 88977->88979 88982 7ff762ae480d 88977->88982 88987 7ff762ae4fdc 88978->88987 88980 7ff762ae4722 SHGetPathFromIDList 88979->88980 88979->88982 88981 7ff762ae47fe CoTaskMemFree 88980->88981 88986 7ff762ae4740 88980->88986 88981->88982 88983 7ff762ae8480 2 API calls 88982->88983 88984 7ff762ae485f 88983->88984 88985 7ff762ae7c90 00007FF8C610F020 88984->88985 88989 7ff762ae486d 88985->88989 88986->88981 89345 7ff762ac02a0 6 API calls 88987->89345 89313 7ff762ac02a0 6 API calls 88989->89313 88991 7ff762ae5101 89346 7ff762ac02a0 6 API calls 88991->89346 88993 7ff762ae49b8 89314 7ff762ac02a0 6 API calls 88993->89314 88995 7ff762ae51d3 89347 7ff762ac02a0 6 API calls 88995->89347 88997 7ff762ae4a9d 89315 7ff762ac02a0 6 API calls 88997->89315 88999 7ff762ae52a5 89348 7ff762ac02a0 6 API calls 88999->89348 89001 7ff762ae4b6f 89316 7ff762ac02a0 6 API calls 89001->89316 89003 7ff762ae5377 89349 7ff762ac02a0 6 API calls 89003->89349 89005 7ff762ae544e 89350 7ff762acf580 8 API calls __swprintf_l 89005->89350 89007 7ff762ae4c41 89317 7ff762ac02a0 6 API calls 89007->89317 89008 7ff762ae5486 89351 7ff762aa92e0 00007FF8B9F61310 00007FF8C610F020 89008->89351 89011 7ff762ae54a0 89352 7ff762ad1520 14 API calls 89011->89352 89012 7ff762ae4d18 89318 7ff762aa92e0 00007FF8B9F61310 00007FF8C610F020 89012->89318 89015 7ff762ae54cc 89353 7ff762aa9390 46 API calls 89015->89353 89016 7ff762ae4d51 89319 7ff762acf580 8 API calls __swprintf_l 89016->89319 89019 7ff762ae4d5d 89320 7ff762aa9390 46 API calls 89019->89320 89021 7ff762ae54d2 89028 7ff762ae55b3 89021->89028 89354 7ff762a939b0 00007FF8B9F61310 00007FF8C610F020 89021->89354 89022 7ff762ae4d62 89321 7ff762aa92e0 00007FF8B9F61310 00007FF8C610F020 89022->89321 89025 7ff762ae4d9b 89322 7ff762ad32d0 61 API calls 89025->89322 89026 7ff762ae552b 89355 7ff762a939b0 00007FF8B9F61310 00007FF8C610F020 89026->89355 89027 7ff762ae5631 89032 7ff762ae5660 89027->89032 89357 7ff762a93a20 46 API calls 89027->89357 89028->89027 89031 7ff762ae5628 ExitProcess 89028->89031 89030 7ff762ae4dcc 89323 7ff762aa9390 46 API calls 89030->89323 89031->89027 89033 7ff762ae7c90 00007FF8C610F020 89032->89033 89037 7ff762ae4f76 89033->89037 89330 7ff762aa2ba0 89037->89330 89038 7ff762ae564c 89358 7ff762a93a20 46 API calls 89038->89358 89041 7ff762ae5656 89359 7ff762a93a20 46 API calls 89041->89359 89042 7ff762ae5674 89042->88859 89043 7ff762ae4dd1 89324 7ff762aa92e0 00007FF8B9F61310 00007FF8C610F020 89043->89324 89044 7ff762ae556f 89356 7ff762a939b0 00007FF8B9F61310 00007FF8C610F020 89044->89356 89048 7ff762ae4e0a 89325 7ff762aa9390 46 API calls 89048->89325 89050 7ff762ae4e0f 89051 7ff762ae4e77 RemoveDirectoryA CreateDirectoryA 89050->89051 89052 7ff762ae4f1a 89050->89052 89053 7ff762ae4ebf 89051->89053 89054 7ff762ae4e98 MessageBoxA 89051->89054 89055 7ff762ae7c90 00007FF8C610F020 89052->89055 89326 7ff762aebb34 89053->89326 89054->89052 89055->89037 89446 7ff762a9bc50 89059->89446 89063 7ff762ae4297 89499 7ff762adea60 89063->89499 89064 7ff762ae42a4 89066 7ff762ae3b20 11 API calls 89064->89066 89067 7ff762ae4312 89064->89067 89066->89067 89067->88859 89069 7ff762ae84b1 89068->89069 89069->89069 89524 7ff762aea000 89069->89524 89071 7ff762ae84f4 89071->88859 89531 7ff762ae8840 89072->89531 89074 7ff762ae8828 89534 7ff762aea2d0 89074->89534 89077->88850 89078->88854 89080 7ff762aebe08 00007FF8C610F020 89079->89080 89083 7ff762aa7c98 00007FF8C6125630 89082->89083 89084 7ff762aa7cad 89082->89084 89083->89084 89084->88874 89086 7ff762a95bfd 89085->89086 89089 7ff762a95c91 89086->89089 89103 7ff762a95d90 00007FF8C610F020 00007FF8C612A0D0 89086->89103 89091 7ff762a96cb0 89089->89091 89090 7ff762a95ca0 89090->88876 89092 7ff762a96cda 89091->89092 89104 7ff762ab26b0 89092->89104 89094 7ff762a96e3e 89095 7ff762ab26b0 2 API calls 89094->89095 89097 7ff762a96f6c 89095->89097 89096 7ff762a9722d 89100 7ff762a9728a 89096->89100 89110 7ff762ab3900 00007FF8B9F61310 00007FF8C610F020 89096->89110 89097->89096 89099 7ff762a97199 00007FF8B9F61310 89097->89099 89101 7ff762a97224 00007FF8C610F020 89099->89101 89102 7ff762a971b8 89099->89102 89100->89090 89101->89096 89102->89101 89103->89089 89105 7ff762ab26d2 89104->89105 89107 7ff762ab27ac 89104->89107 89106 7ff762ab271a 00007FF8B9F61310 89105->89106 89105->89107 89108 7ff762ab2736 89106->89108 89109 7ff762ab27a3 00007FF8C610F020 89106->89109 89107->89094 89108->89109 89109->89107 89110->89100 89112 7ff762ae77c4 89111->89112 89113 7ff762ae77cb 89111->89113 89112->88907 89114 7ff762ae7c90 00007FF8C610F020 89113->89114 89114->89112 89115->88893 89116->88916 89117->88920 89118->88908 89119->88928 89120->88936 89127 7ff762ae0344 89121->89127 89122 7ff762ae039b GetClientRect QueryPerformanceCounter 89123 7ff762ae0445 GetForegroundWindow 89122->89123 89124 7ff762ae042b 89122->89124 89125 7ff762ae04df 89123->89125 89126 7ff762ae0457 89123->89126 89124->89123 89130 7ff762ae0526 89125->89130 89134 7ff762ae04f8 GetKeyState 89125->89134 89128 7ff762ae0460 ClientToScreen 89126->89128 89129 7ff762ae0495 89126->89129 89127->89122 89128->89129 89132 7ff762ae0487 SetCursorPos 89128->89132 89129->89125 89133 7ff762ae04a4 GetCursorPos 89129->89133 89131 7ff762ae056d 89130->89131 89135 7ff762ae053f GetKeyState 89130->89135 89139 7ff762ae0586 GetKeyState 89131->89139 89141 7ff762ae05b4 89131->89141 89132->89129 89133->89125 89136 7ff762ae04b3 ScreenToClient 89133->89136 89134->89130 89137 7ff762ae050a 89134->89137 89135->89131 89138 7ff762ae0551 89135->89138 89136->89125 89140 7ff762ae04c5 89136->89140 89137->89130 89207 7ff762a91f90 00007FF8C610F020 89137->89207 89138->89131 89208 7ff762a91f90 00007FF8C610F020 89138->89208 89139->89141 89143 7ff762ae0598 89139->89143 89206 7ff762a92260 00007FF8C610F020 89140->89206 89145 7ff762ae05cd GetKeyState 89141->89145 89149 7ff762ae05fb 89141->89149 89143->89141 89209 7ff762a91f90 00007FF8C610F020 89143->89209 89146 7ff762ae05df 89145->89146 89145->89149 89146->89149 89210 7ff762a91f90 00007FF8C610F020 89146->89210 89148 7ff762ae0625 89156 7ff762adfce0 89148->89156 89149->89148 89211 7ff762adfb70 LoadCursorA SetCursor SetCursor 89149->89211 89155 7ff762a99e10 75 API calls 89155->88967 89158 7ff762adfd07 89156->89158 89157 7ff762ae0301 89157->89155 89158->89157 89160 7ff762adfdd3 89158->89160 89212 7ff762a91f90 00007FF8C610F020 89158->89212 89161 7ff762adfe0a 89160->89161 89213 7ff762a91f90 00007FF8C610F020 89160->89213 89164 7ff762adfe41 89161->89164 89214 7ff762a91f90 00007FF8C610F020 89161->89214 89166 7ff762adfe79 89164->89166 89215 7ff762a91f90 00007FF8C610F020 89164->89215 89167 7ff762adfeae 89166->89167 89216 7ff762a91f90 00007FF8C610F020 89166->89216 89170 7ff762adfee6 89167->89170 89217 7ff762a91f90 00007FF8C610F020 89167->89217 89171 7ff762adff1c 89170->89171 89218 7ff762a91f90 00007FF8C610F020 89170->89218 89174 7ff762adff53 89171->89174 89219 7ff762a91f90 00007FF8C610F020 89171->89219 89175 7ff762adff86 89174->89175 89220 7ff762a91f90 00007FF8C610F020 89174->89220 89179 7ff762adffbc 89175->89179 89221 7ff762a91f90 00007FF8C610F020 89175->89221 89177 7ff762ae0025 89224 7ff762a91f90 00007FF8C610F020 89177->89224 89181 7ff762adfff8 89179->89181 89222 7ff762a91f90 00007FF8C610F020 89179->89222 89181->89177 89223 7ff762a91f90 00007FF8C610F020 89181->89223 89184 7ff762ae0070 89225 7ff762a91f90 00007FF8C610F020 89184->89225 89186 7ff762ae010d 89228 7ff762a91f90 00007FF8C610F020 89186->89228 89187 7ff762ae00a9 89189 7ff762ae00dd 89187->89189 89226 7ff762a91f90 00007FF8C610F020 89187->89226 89189->89186 89227 7ff762a91f90 00007FF8C610F020 89189->89227 89192 7ff762ae0151 89229 7ff762a91f90 00007FF8C610F020 89192->89229 89194 7ff762ae0195 89230 7ff762a91f90 00007FF8C610F020 89194->89230 89196 7ff762ae01d0 89231 7ff762a91f90 00007FF8C610F020 89196->89231 89198 7ff762ae020b 89232 7ff762a91f90 00007FF8C610F020 89198->89232 89200 7ff762ae0246 89233 7ff762a91f90 00007FF8C610F020 89200->89233 89202 7ff762ae0281 89234 7ff762a91f90 00007FF8C610F020 89202->89234 89204 7ff762ae02c2 89235 7ff762a91f90 00007FF8C610F020 89204->89235 89206->89125 89207->89130 89208->89131 89209->89141 89210->89149 89211->89148 89212->89160 89213->89161 89214->89164 89215->89166 89216->89167 89217->89170 89218->89171 89219->89174 89220->89175 89221->89179 89222->89181 89223->89177 89224->89184 89225->89187 89226->89189 89227->89186 89228->89192 89229->89194 89230->89196 89231->89198 89232->89200 89233->89202 89234->89204 89235->89157 89237 7ff762ae26e5 89236->89237 89312 7ff762ae26de 89236->89312 89360 7ff762ae32e0 89237->89360 89239 7ff762ae27a4 89364 7ff762ae31c0 89239->89364 89241 7ff762ae27db 89242 7ff762ae2805 GetModuleHandleA 89241->89242 89243 7ff762ae2865 89242->89243 89244 7ff762ae2831 89242->89244 89247 7ff762ae2872 GetProcAddress 89243->89247 89245 7ff762ae7c90 00007FF8C610F020 89244->89245 89246 7ff762ae2847 89245->89246 89248 7ff762ae7c90 00007FF8C610F020 89246->89248 89249 7ff762ae7c90 00007FF8C610F020 89247->89249 89253 7ff762ae2852 89248->89253 89250 7ff762ae28b5 89249->89250 89251 7ff762ae7c90 00007FF8C610F020 89250->89251 89252 7ff762ae28c0 89251->89252 89252->89253 89368 7ff762ae2150 89253->89368 89256 7ff762ae7c90 00007FF8C610F020 89257 7ff762ae298a VirtualAlloc 89256->89257 89259 7ff762ae2b4c 89257->89259 89260 7ff762ae2b69 89257->89260 89261 7ff762ae7b60 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 89259->89261 89382 7ff762ae3520 89260->89382 89261->89312 89263 7ff762ae2bc9 89386 7ff762ae3400 89263->89386 89265 7ff762ae2c03 89266 7ff762ae2c33 GetModuleHandleA 89265->89266 89267 7ff762ae2c5f 89266->89267 89268 7ff762ae2c99 89266->89268 89269 7ff762ae7c90 00007FF8C610F020 89267->89269 89270 7ff762ae2ca9 GetProcAddress 89268->89270 89271 7ff762ae2c78 89269->89271 89272 7ff762ae7c90 00007FF8C610F020 89270->89272 89273 7ff762ae7c90 00007FF8C610F020 89271->89273 89275 7ff762ae2cef 89272->89275 89274 7ff762ae2c86 89273->89274 89390 7ff762ae3760 89274->89390 89276 7ff762ae7c90 00007FF8C610F020 89275->89276 89277 7ff762ae2cfd 89276->89277 89277->89274 89279 7ff762ae2d6a 89394 7ff762ae3640 89279->89394 89281 7ff762ae2da4 89282 7ff762ae2dd4 GetModuleHandleA 89281->89282 89283 7ff762ae2e00 89282->89283 89284 7ff762ae2e3a 89282->89284 89285 7ff762ae7c90 00007FF8C610F020 89283->89285 89287 7ff762ae2e4a GetProcAddress 89284->89287 89286 7ff762ae2e19 89285->89286 89288 7ff762ae7c90 00007FF8C610F020 89286->89288 89289 7ff762ae7c90 00007FF8C610F020 89287->89289 89293 7ff762ae2e27 89288->89293 89290 7ff762ae2e90 89289->89290 89291 7ff762ae7c90 00007FF8C610F020 89290->89291 89292 7ff762ae2e9e 89291->89292 89292->89293 89398 7ff762ae39b0 89293->89398 89295 7ff762ae3014 89402 7ff762ae3890 89295->89402 89297 7ff762ae304e 89298 7ff762ae307e GetModuleHandleA 89297->89298 89299 7ff762ae30e4 89298->89299 89300 7ff762ae30aa 89298->89300 89302 7ff762ae30f4 GetProcAddress 89299->89302 89301 7ff762ae7c90 00007FF8C610F020 89300->89301 89303 7ff762ae30c3 89301->89303 89304 7ff762ae7c90 00007FF8C610F020 89302->89304 89305 7ff762ae7c90 00007FF8C610F020 89303->89305 89306 7ff762ae313a 89304->89306 89307 7ff762ae30d1 89305->89307 89308 7ff762ae7c90 00007FF8C610F020 89306->89308 89309 7ff762ae3159 CreateThread 89307->89309 89310 7ff762ae3148 89308->89310 89406 7ff762ae7b60 89309->89406 89310->89309 89312->88973 89313->88993 89314->88997 89315->89001 89316->89007 89317->89012 89318->89016 89319->89019 89320->89022 89321->89025 89322->89030 89323->89043 89324->89048 89325->89050 89327 7ff762aebb3f Concurrency::cancel_current_task 89326->89327 89328 7ff762ae4ed0 89327->89328 89329 7ff762aeb808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 89327->89329 89328->89052 89344 7ff762aea100 00007FF8C610F020 89328->89344 89329->89328 89331 7ff762aa2bc3 89330->89331 89335 7ff762aa2bd8 89330->89335 89331->89335 89440 7ff762aa85b0 46 API calls 89331->89440 89332 7ff762aa2c6a 89334 7ff762aa2ca0 89332->89334 89442 7ff762ace910 46 API calls 89332->89442 89443 7ff762aa4290 46 API calls 89334->89443 89335->89332 89343 7ff762aa2e24 89335->89343 89441 7ff762aa85b0 46 API calls 89335->89441 89340 7ff762aa2cb3 89341 7ff762aa2d12 89340->89341 89444 7ff762ab0d50 00007FF8B9F61310 00007FF8C610F020 89340->89444 89341->89343 89445 7ff762aa80d0 46 API calls 89341->89445 89343->89042 89344->89052 89345->88991 89346->88995 89347->88999 89348->89003 89349->89005 89350->89008 89351->89011 89352->89015 89353->89021 89354->89026 89355->89044 89356->89028 89357->89038 89358->89041 89359->89032 89361 7ff762ae335f 89360->89361 89363 7ff762ae336b 89360->89363 89410 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89361->89410 89363->89239 89365 7ff762ae323f 89364->89365 89367 7ff762ae324b 89364->89367 89411 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89365->89411 89367->89241 89372 7ff762ae21bb Concurrency::details::ResourceManager::CreateNodeTopology 89368->89372 89369 7ff762ae7c90 00007FF8C610F020 89370 7ff762ae22d7 89369->89370 89371 7ff762ae77a0 00007FF8C610F020 89370->89371 89373 7ff762ae230c 89371->89373 89372->89369 89374 7ff762ae7c90 00007FF8C610F020 89373->89374 89380 7ff762ae2319 89374->89380 89375 7ff762ae2674 89376 7ff762ae7b60 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 89375->89376 89378 7ff762ae26a1 89376->89378 89377 7ff762ae252c 89377->89375 89379 7ff762ae8c80 2 API calls 89377->89379 89378->89256 89379->89377 89380->89377 89412 7ff762ae8c80 89380->89412 89383 7ff762ae359f 89382->89383 89385 7ff762ae35ab 89382->89385 89434 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89383->89434 89385->89263 89387 7ff762ae347f 89386->89387 89389 7ff762ae348b 89386->89389 89435 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89387->89435 89389->89265 89391 7ff762ae37e9 89390->89391 89393 7ff762ae37f5 89390->89393 89436 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89391->89436 89393->89279 89395 7ff762ae36bf 89394->89395 89397 7ff762ae36cb 89394->89397 89437 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89395->89437 89397->89281 89399 7ff762ae3a2f 89398->89399 89401 7ff762ae3a3b 89398->89401 89438 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89399->89438 89401->89295 89403 7ff762ae390f 89402->89403 89405 7ff762ae391b 89402->89405 89439 7ff762aeb87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89403->89439 89405->89297 89408 7ff762ae7bca Concurrency::details::ResourceManager::CreateNodeTopology 89406->89408 89407 7ff762ae7c5a 89407->89312 89408->89407 89409 7ff762aeb808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 89408->89409 89409->89407 89413 7ff762ae8cd7 89412->89413 89415 7ff762ae8cb9 89412->89415 89416 7ff762aea4b0 89413->89416 89415->89380 89417 7ff762aea5bb 89416->89417 89418 7ff762aea73b 89417->89418 89419 7ff762aea719 89417->89419 89432 7ff762aeb2b0 00007FF8B9F61310 89418->89432 89431 7ff762aeb2b0 00007FF8B9F61310 89419->89431 89422 7ff762aea75a 89433 7ff762aeb2b0 00007FF8B9F61310 89422->89433 89423 7ff762aea738 89427 7ff762aeaba0 89423->89427 89429 7ff762aeac19 Concurrency::details::ResourceManager::CreateNodeTopology 89427->89429 89428 7ff762aea7b3 89428->89415 89429->89428 89430 7ff762aeb808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 89429->89430 89430->89428 89431->89423 89432->89422 89433->89423 89440->89335 89441->89332 89442->89334 89443->89340 89444->89341 89445->89343 89452 7ff762a9bc62 89446->89452 89447 7ff762a9bdc8 89505 7ff762aa87d0 49 API calls 89447->89505 89448 7ff762a9bdb5 89448->89447 89504 7ff762aa80d0 46 API calls 89448->89504 89450 7ff762aa85b0 46 API calls 89450->89452 89451 7ff762aa2ba0 46 API calls 89451->89452 89452->89447 89452->89448 89452->89450 89452->89451 89471 7ff762a9c1ec 89452->89471 89503 7ff762a9cd70 46 API calls 89452->89503 89455 7ff762aa2ba0 46 API calls 89457 7ff762a9bf96 89455->89457 89456 7ff762a9becf 89459 7ff762a9bf2e 89456->89459 89506 7ff762ab1f40 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 printf 89456->89506 89465 7ff762a9bfae 89457->89465 89507 7ff762ab0500 46 API calls 89457->89507 89459->89455 89461 7ff762a9c076 89510 7ff762a994d0 12 API calls 89461->89510 89463 7ff762a9c095 89464 7ff762a9c0bc 89463->89464 89511 7ff762ab3400 00007FF8B9F61310 00007FF8C610F020 89463->89511 89512 7ff762ab3400 00007FF8B9F61310 00007FF8C610F020 89464->89512 89465->89461 89470 7ff762a9c041 89465->89470 89508 7ff762ab08d0 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 89465->89508 89469 7ff762a9c11a 89469->89471 89514 7ff762ab39e0 00007FF8B9F61310 00007FF8C610F020 89469->89514 89470->89461 89509 7ff762aaa780 46 API calls 89470->89509 89471->89064 89476 7ff762a9c240 89471->89476 89472 7ff762a9c0d5 89472->89469 89513 7ff762a9b200 00007FF8C61149A0 00007FF8B9F61310 00007FF8C610F020 89472->89513 89477 7ff762a9c254 89476->89477 89478 7ff762a9bc50 51 API calls 89477->89478 89485 7ff762a9c283 89477->89485 89478->89485 89479 7ff762a9c414 89517 7ff762a9b850 12 API calls 89479->89517 89481 7ff762ab3400 00007FF8B9F61310 00007FF8C610F020 89481->89485 89482 7ff762a9c419 89483 7ff762a9c4ac 89482->89483 89518 7ff762a9b310 9 API calls 89482->89518 89486 7ff762a9c4d4 89483->89486 89519 7ff762a9b310 9 API calls 89483->89519 89485->89479 89485->89481 89494 7ff762a9c6ba 89485->89494 89515 7ff762a99280 15 API calls 89485->89515 89516 7ff762ac0e30 00007FF8B9F61310 00007FF8C610F020 89485->89516 89488 7ff762a9c4fc 89486->89488 89520 7ff762a9b310 9 API calls 89486->89520 89498 7ff762a9c524 89488->89498 89521 7ff762a957a0 15 API calls 89488->89521 89492 7ff762a9c598 00007FF8B9F61310 89492->89498 89494->89063 89496 7ff762ab3400 00007FF8B9F61310 00007FF8C610F020 89496->89498 89498->89492 89498->89494 89498->89496 89522 7ff762a99280 15 API calls 89498->89522 89523 7ff762ac0e30 00007FF8B9F61310 00007FF8C610F020 89498->89523 89501 7ff762adea84 89499->89501 89502 7ff762adec57 89499->89502 89500 7ff762aded5f 00007FF8B9F61310 89500->89501 89500->89502 89501->89500 89501->89502 89502->89064 89503->89452 89504->89447 89505->89456 89506->89459 89507->89465 89508->89470 89509->89461 89510->89463 89511->89464 89512->89472 89513->89472 89514->89471 89515->89485 89516->89485 89517->89482 89518->89482 89519->89486 89520->89488 89521->89498 89522->89498 89523->89498 89525 7ff762aea03a 89524->89525 89526 7ff762aea0b8 89524->89526 89528 7ff762aea060 00007FF8B9F61310 89525->89528 89530 7ff762aea7d0 00007FF8C610F020 Concurrency::details::ResourceManager::CreateNodeTopology 89526->89530 89529 7ff762aea0ed 89528->89529 89529->89071 89530->89529 89538 7ff762ae1ab0 89531->89538 89533 7ff762ae8864 89533->89074 89535 7ff762aea2dc 89534->89535 89536 7ff762ae1ab0 00007FF8B7DF36D0 89535->89536 89537 7ff762ae8830 89535->89537 89536->89535 89537->88859 89542 7ff762aed168 89538->89542 89540 7ff762ae1ac3 00007FF8B7DF36D0 89541 7ff762ae1ad8 _Subatomic 89540->89541 89541->89533 88772 1f784117750 88773 1f7841177a4 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 88772->88773 88774 1f78411788c CryptUnprotectData 88773->88774 88775 1f7841178cd type_info::_name_internal_method 88774->88775 88776 1f78413a470 88777 1f78413a490 Concurrency::details::WorkQueue::IsStructuredEmpty 88776->88777 88778 1f78413a4bb CreateFileA ReadFile 88777->88778 88779 1f78413a525 type_info::_name_internal_method 88778->88779 88780 1f78413a2f0 88786 1f78405c520 88780->88786 88782 1f78413a315 CreateFileA 88783 1f78413a355 type_info::_name_internal_method 88782->88783 88788 1f784139e50 88783->88788 88785 1f78413a389 88787 1f78405c536 Concurrency::details::WorkQueue::IsStructuredEmpty 88786->88787 88787->88782 88789 1f784139e72 Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 88788->88789 88790 1f784139f5b CreateFileA 88789->88790 88791 1f784139f93 88790->88791 88791->88785 89543 7ff762aebb9c 89544 7ff762aebbac 89543->89544 89552 7ff762aeb96c 89544->89552 89547 7ff762aebc51 89548 7ff762aebbd0 Concurrency::details::ResourceManager::CreateNodeTopology _RTC_Initialize 89549 7ff762aebc1e 00007FF8C6121B20 89548->89549 89550 7ff762aebc2a 89548->89550 89549->89550 89551 7ff762aebc41 89550->89551 89557 7ff762aec0f8 7 API calls 89550->89557 89553 7ff762aeb97d 89552->89553 89556 7ff762aeb982 __scrt_release_startup_lock 89552->89556 89553->89556 89558 7ff762aec0f8 7 API calls 89553->89558 89555 7ff762aeb9f6 89556->89548 89557->89547 89558->89555 89559 1f78407f46a 89560 1f78405c520 Concurrency::details::WorkQueue::IsStructuredEmpty 89559->89560 89561 1f78407f480 FindFirstFileA 89560->89561 89562 1f78407f4e9 type_info::_name_internal_method 89561->89562 89575 1f78407f4a4 89561->89575 89564 1f78407f559 type_info::_name_internal_method 89562->89564 89582 1f78407fe00 CreateToolhelp32Snapshot Process32NextW Process32NextW type_info::_name_internal_method 89562->89582 89576 1f78416b740 89564->89576 89566 1f78407f5ea 89567 1f78407f6c1 type_info::_name_internal_method 89566->89567 89568 1f78407f5fb type_info::_name_internal_method 89566->89568 89567->89575 89584 1f78411a1f0 4 API calls 4 library calls 89567->89584 89568->89575 89583 1f78407fe00 CreateToolhelp32Snapshot Process32NextW Process32NextW type_info::_name_internal_method 89568->89583 89571 1f78407f773 type_info::_name_internal_method 89571->89575 89585 1f78411acd0 7 API calls 4 library calls 89571->89585 89573 1f78407f82c type_info::_name_internal_method 89573->89575 89586 1f78407e2c0 CreateToolhelp32Snapshot Process32NextW Process32NextW Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 89573->89586 89577 1f78416b770 type_info::_name_internal_method 89576->89577 89578 1f784139e50 CreateFileA 89577->89578 89579 1f78416b780 std::_Facet_Register type_info::_name_internal_method 89578->89579 89581 1f78416b797 type_info::_name_internal_method 89579->89581 89587 1f784167650 89579->89587 89581->89566 89582->89564 89583->89575 89584->89571 89585->89573 89586->89575 89588 1f78416767e Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Fac_node::_Fac_node type_info::_name_internal_method 89587->89588 89589 1f784139e50 CreateFileA 89588->89589 89590 1f784167793 89589->89590 89591 1f7841677a0 type_info::_name_internal_method 89590->89591 89593 1f78413a3d0 89590->89593 89591->89581 89594 1f78405c520 Concurrency::details::WorkQueue::IsStructuredEmpty 89593->89594 89595 1f78413a3fc CreateFileA ReadFile 89594->89595 89596 1f78413a45f 89595->89596 89596->89591 88792 1f784056fe0 88793 1f784057001 Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Fac_node::_Fac_node 88792->88793 88794 1f7840575bc CreateToolhelp32Snapshot 88793->88794 88795 1f784057633 Process32FirstW 88794->88795 88796 1f7840575d7 type_info::_name_internal_method 88794->88796 88795->88796 88798 1f784057659 88795->88798 88797 1f78405779d Process32NextW 88797->88796 88797->88798 88798->88796 88798->88797 89597 1f7841610e0 89605 1f7840552b0 89597->89605 89599 1f784161106 CreateToolhelp32Snapshot 89600 1f784161122 89599->89600 89601 1f784161177 Process32NextW 89600->89601 89602 1f784161129 89600->89602 89601->89602 89604 1f78416119d Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 89601->89604 89603 1f7841612d0 Process32NextW 89603->89602 89603->89604 89604->89603 89606 1f7840552d2 Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 89605->89606 89606->89599

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 7ff762ae4320-7ff762ae45ff call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a93880 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a93880 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a93880 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a93880 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a93880 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a93880 call 7ff762a91080 * 2 call 7ff762aa40a0 call 7ff762a91080 call 7ff762aa4130 47 7ff762ae4601-7ff762ae4614 call 7ff762ae26c0 0->47 48 7ff762ae461a-7ff762ae4653 call 7ff762ae8250 call 7ff762aa0340 0->48 51 7ff762ae4619 47->51 55 7ff762ae4f7c-7ff762ae54e2 call 7ff762aa41b0 call 7ff762ae79b0 call 7ff762ae8480 call 7ff762ae7c90 call 7ff762ae7480 call 7ff762a9c720 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762a91080 call 7ff762aa9240 call 7ff762acf580 call 7ff762aa92a0 call 7ff762aa92e0 call 7ff762a91080 call 7ff762ad1520 call 7ff762aa9390 48->55 56 7ff762ae4659-7ff762ae46ba call 7ff762a91080 call 7ff762aa9240 call 7ff762a91080 call 7ff762ad04f0 48->56 51->48 245 7ff762ae55b4-7ff762ae5615 call 7ff762a91080 call 7ff762aa9240 call 7ff762a91080 call 7ff762ad04f0 55->245 246 7ff762ae54e8-7ff762ae55b3 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a939b0 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a939b0 call 7ff762ae1840 call 7ff762ab4a60 call 7ff762a939b0 55->246 74 7ff762ae46c0-7ff762ae471c SHBrowseForFolder 56->74 75 7ff762ae480d-7ff762ae4e71 call 7ff762aa41b0 call 7ff762ae79b0 call 7ff762ae8480 call 7ff762ae7c90 call 7ff762ae8250 call 7ff762a9c720 call 7ff762ae8250 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae8250 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762ae7480 call 7ff762ab4a30 call 7ff762ab4a50 call 7ff762a91080 call 7ff762aa41e0 call 7ff762ac02a0 call 7ff762a91080 call 7ff762aa9240 call 7ff762aa92e0 call 7ff762acf580 call 7ff762aa9390 call 7ff762a91080 call 7ff762aa9240 call 7ff762aa92e0 call 7ff762ad32d0 call 7ff762aa9390 call 7ff762a91080 call 7ff762aa9240 call 7ff762aa92e0 call 7ff762aa9390 call 7ff762a91080 call 7ff762aa9240 call 7ff762a91080 call 7ff762ad04f0 56->75 74->75 78 7ff762ae4722-7ff762ae473a SHGetPathFromIDList 74->78 317 7ff762ae4e77-7ff762ae4e96 RemoveDirectoryA CreateDirectoryA 75->317 318 7ff762ae4f69-7ff762ae4f77 call 7ff762ae7c90 75->318 81 7ff762ae4740-7ff762ae477b 78->81 82 7ff762ae47fe-7ff762ae480c CoTaskMemFree 78->82 85 7ff762ae4780-7ff762ae478d 81->85 82->75 85->85 88 7ff762ae478f-7ff762ae47d3 call 7ff762ae8250 85->88 96 7ff762ae47d8-7ff762ae47e5 88->96 96->96 99 7ff762ae47e7-7ff762ae47ec 96->99 102 7ff762ae47ee-7ff762ae47fc 99->102 102->82 102->102 272 7ff762ae5631-7ff762ae5640 245->272 273 7ff762ae5617-7ff762ae5626 245->273 246->245 278 7ff762ae5642-7ff762ae5660 call 7ff762a93a20 * 3 272->278 279 7ff762ae5661-7ff762ae566e call 7ff762ae7c90 272->279 273->272 277 7ff762ae5628-7ff762ae5630 ExitProcess 273->277 277->272 278->279 288 7ff762ae566f-7ff762ae567e call 7ff762aa2ba0 279->288 319 7ff762ae4ebf-7ff762ae4ecb call 7ff762aebb34 317->319 320 7ff762ae4e98-7ff762ae4eba MessageBoxA 317->320 318->288 324 7ff762ae4ed0-7ff762ae4ee1 319->324 320->318 325 7ff762ae4ee3-7ff762ae4f3b call 7ff762aea100 324->325 326 7ff762ae4f3d 324->326 328 7ff762ae4f49-7ff762ae4f61 325->328 326->328 328->318
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$BrowseCreateExitFolderFreeFromListMessagePathProcessRemoveTask
                                                                    • String ID: Loader$...$C:\Users\user\Desktop\Nexus-Executor$Fail$Failed to create setup directory$Install$Nexus-Executor$Nexus-Executor$P$choose install folder$continue$destinatinal folder$f$installation...
                                                                    • API String ID: 3810817069-333357129
                                                                    • Opcode ID: 2796e0ceb44c481c8094ebbb64c5a86d0a9228671a5d5b6b18e5b6bea70cc40e
                                                                    • Instruction ID: e7425f1baa8382dc21d264e844a27e94aa1c25514f18cf5929288545073998a4
                                                                    • Opcode Fuzzy Hash: 2796e0ceb44c481c8094ebbb64c5a86d0a9228671a5d5b6b18e5b6bea70cc40e
                                                                    • Instruction Fuzzy Hash: 14A2623191D686D5EBA0EB22E4507AAF360FF88340F844236DE8D57AA5DFBCE145CB50

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: AddressPerformanceProcQuery$CounterFrequencyInfoKeyboardLayoutLibraryLoadLocale
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$XInputGetCapabilities$XInputGetState$i >= 0 && i < Size$imgui_impl_win32$io.BackendPlatformUserData == nullptr && "Already initialized a platform backend!"$xinput1_1.dll$xinput1_2.dll$xinput1_3.dll$xinput1_4.dll$xinput9_1_0.dll
                                                                    • API String ID: 2839060773-805143068
                                                                    • Opcode ID: c0cd0a30def10a826129bf9a140cdbbcde0c23294fc851b4d240245f1bddf609
                                                                    • Instruction ID: c51e0993ebd9f7d6750c734075baef5161b1b00abb56eb32b7790e1069df084c
                                                                    • Opcode Fuzzy Hash: c0cd0a30def10a826129bf9a140cdbbcde0c23294fc851b4d240245f1bddf609
                                                                    • Instruction Fuzzy Hash: 66717E32A08F82D2DB94DF15E8406A9B3A5FB94B84F84513ACE8D43764EFBCE156C310

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 359 7ff762ae0330-7ff762ae0342 360 7ff762ae0344-7ff762ae034e 359->360 361 7ff762ae0352 359->361 362 7ff762ae0375-7ff762ae0378 360->362 363 7ff762ae0350 360->363 364 7ff762ae0354-7ff762ae036e call 7ff762aed440 361->364 366 7ff762ae039b-7ff762ae0429 GetClientRect QueryPerformanceCounter 362->366 367 7ff762ae037a-7ff762ae0394 call 7ff762aed440 362->367 363->364 364->362 370 7ff762ae0445-7ff762ae0451 GetForegroundWindow 366->370 371 7ff762ae042b-7ff762ae043f call 7ff762aed440 366->371 367->366 373 7ff762ae04df-7ff762ae04ed 370->373 374 7ff762ae0457-7ff762ae045e 370->374 371->370 378 7ff762ae0526-7ff762ae0534 373->378 379 7ff762ae04ef-7ff762ae04f6 373->379 376 7ff762ae0460-7ff762ae0485 ClientToScreen 374->376 377 7ff762ae049e-7ff762ae04a2 374->377 382 7ff762ae0495-7ff762ae049c 376->382 383 7ff762ae0487-7ff762ae048f SetCursorPos 376->383 377->373 384 7ff762ae04a4-7ff762ae04b1 GetCursorPos 377->384 380 7ff762ae0536-7ff762ae053d 378->380 381 7ff762ae056d-7ff762ae057b 378->381 379->378 385 7ff762ae04f8-7ff762ae0508 GetKeyState 379->385 380->381 386 7ff762ae053f-7ff762ae054f GetKeyState 380->386 387 7ff762ae05b4-7ff762ae05c2 381->387 388 7ff762ae057d-7ff762ae0584 381->388 382->373 382->377 383->382 384->373 389 7ff762ae04b3-7ff762ae04c3 ScreenToClient 384->389 385->378 390 7ff762ae050a-7ff762ae0511 385->390 386->381 391 7ff762ae0551-7ff762ae0558 386->391 394 7ff762ae05c4-7ff762ae05cb 387->394 395 7ff762ae05fb-7ff762ae05ff 387->395 388->387 392 7ff762ae0586-7ff762ae0596 GetKeyState 388->392 389->373 393 7ff762ae04c5-7ff762ae04da call 7ff762a92260 389->393 390->378 396 7ff762ae0513-7ff762ae0521 call 7ff762a91f90 390->396 391->381 400 7ff762ae055a-7ff762ae0568 call 7ff762a91f90 391->400 392->387 401 7ff762ae0598-7ff762ae059f 392->401 393->373 394->395 403 7ff762ae05cd-7ff762ae05dd GetKeyState 394->403 398 7ff762ae0601-7ff762ae0606 395->398 399 7ff762ae0608-7ff762ae060f 395->399 396->378 405 7ff762ae0615-7ff762ae0618 398->405 399->405 400->381 401->387 407 7ff762ae05a1-7ff762ae05af call 7ff762a91f90 401->407 403->395 404 7ff762ae05df-7ff762ae05e6 403->404 404->395 408 7ff762ae05e8-7ff762ae05f6 call 7ff762a91f90 404->408 409 7ff762ae0625-7ff762ae0628 call 7ff762adfce0 405->409 410 7ff762ae061a-7ff762ae0620 call 7ff762adfb70 405->410 407->387 408->395 415 7ff762ae062d-7ff762ae0634 409->415 410->409
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: State$Client$CursorScreen$CounterForegroundPerformanceQueryRectWindow
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "Context or backend not initialized? Did you call ImGui_ImplWin32_Init()?"$bd->hWnd != 0
                                                                    • API String ID: 1576454153-990843061
                                                                    • Opcode ID: 7959d9425d8ed27d20723f75cacdc1de561572c0acbd32c942e8bf78f96d5c61
                                                                    • Instruction ID: 02ab61a655a498617bc28506f17fa711fdcd55e0c505bf086e56a946cb8e0f2d
                                                                    • Opcode Fuzzy Hash: 7959d9425d8ed27d20723f75cacdc1de561572c0acbd32c942e8bf78f96d5c61
                                                                    • Instruction Fuzzy Hash: F991F331E08686D6FFA1EB25D444B79E3A0EF91784F888135DE8D16594CFECE482DB20

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 701 7ff762adf2f0-7ff762adf311 702 7ff762adf313-7ff762adf337 call 7ff762aed440 701->702 703 7ff762adf339-7ff762adf340 701->703 702->703 708 7ff762adf342 702->708 705 7ff762adf344-7ff762adf365 call 7ff762ac1770 703->705 709 7ff762adf36a-7ff762adf388 705->709 708->705 711 7ff762adf594-7ff762adf597 709->711 712 7ff762adf38e-7ff762adf3ae 709->712 713 7ff762adf59b-7ff762adf5a3 711->713 719 7ff762adf3b4-7ff762adf3c5 712->719 720 7ff762adf58a-7ff762adf58e 712->720 714 7ff762adf416 713->714 715 7ff762adf5a9-7ff762adf5ce call 7ff762a99150 713->715 718 7ff762adf41a-7ff762adf46c 714->718 715->718 723 7ff762adf5d4-7ff762adf5db 715->723 727 7ff762adf472-7ff762adf48e 718->727 728 7ff762adf60d 718->728 719->720 725 7ff762adf3cb-7ff762adf410 719->725 720->711 726 7ff762adf5e0-7ff762adf606 723->726 725->713 725->714 726->726 729 7ff762adf608 726->729 727->728 733 7ff762adf494-7ff762adf497 727->733 730 7ff762adf60f-7ff762adf628 728->730 729->718 735 7ff762adf4d8-7ff762adf4f6 733->735 736 7ff762adf499-7ff762adf4a8 733->736 740 7ff762adf583-7ff762adf585 735->740 741 7ff762adf4fc-7ff762adf504 735->741 737 7ff762adf4b0-7ff762adf4d1 00007FF8B9F61310 736->737 737->737 738 7ff762adf4d3 737->738 738->735 740->730 741->740 742 7ff762adf506-7ff762adf509 741->742 743 7ff762adf50b-7ff762adf515 742->743 744 7ff762adf57a-7ff762adf57d 00007FF8C610F020 742->744 743->744 745 7ff762adf517-7ff762adf534 743->745 744->740 746 7ff762adf536-7ff762adf568 745->746 747 7ff762adf56f-7ff762adf573 745->747 746->747 747->744
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$C610F020F61310
                                                                    • String ID: $C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"
                                                                    • API String ID: 310658293-1764846569
                                                                    • Opcode ID: 08d9d5ea9ef73e9ee21c9a9719e887cff1e7b3ffbb7639eb600bbac3b29985d2
                                                                    • Instruction ID: 35035b97a698b606f81f14e502354d4b154b843a5161f5def3ad28b626d65ee8
                                                                    • Opcode Fuzzy Hash: 08d9d5ea9ef73e9ee21c9a9719e887cff1e7b3ffbb7639eb600bbac3b29985d2
                                                                    • Instruction Fuzzy Hash: 3E919032705A81C6EB50DF25D4507AEB7A5FB88B88F844136DE4E87B64DFB8D445C710

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: NtdllProc_Window
                                                                    • String ID: E
                                                                    • API String ID: 4255912815-3568589458
                                                                    • Opcode ID: f71ada217520157a8222c974fd66714a8a8b4378b5c258b324b72a7210dee7ba
                                                                    • Instruction ID: f8871a137b70389b3431bede8eab4119b06cb7e8ff9d75ec0efa62df194e017e
                                                                    • Opcode Fuzzy Hash: f71ada217520157a8222c974fd66714a8a8b4378b5c258b324b72a7210dee7ba
                                                                    • Instruction Fuzzy Hash: 53513131A0C782DAEBA09B15E4447BAF7A0FB85750F900535EACD82AA4DFFDD446DB10

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 778 1f78407f46a-1f78407f4a2 call 1f78405c520 FindFirstFileA 781 1f78407f4a4-1f78407f4df call 1f784055180 call 1f78405a060 call 1f784061e90 call 1f78405a060 778->781 782 1f78407f4e9-1f78407f520 778->782 805 1f78407fbf5-1f78407fbfd 781->805 783 1f78407f522-1f78407f559 call 1f78405a170 call 1f78407fe00 782->783 784 1f78407f55d-1f78407f5e5 call 1f78407fcb0 call 1f784081a30 call 1f78405a110 call 1f78405a170 call 1f78416b740 782->784 783->784 807 1f78407f5ea-1f78407f5f5 784->807 808 1f78407f6c1-1f78407f6e3 call 1f784167af0 807->808 809 1f78407f5fb-1f78407f642 call 1f78407fd60 call 1f7840819a0 call 1f784061f30 807->809 816 1f78407fb69-1f78407fba4 call 1f784055180 call 1f78405a060 call 1f784061e90 call 1f78405a060 808->816 817 1f78407f6e9-1f78407f7aa call 1f78407d260 call 1f784167960 call 1f78405a170 call 1f78411a1f0 call 1f78405c590 call 1f78405a060 call 1f78405c9c0 808->817 827 1f78407f681-1f78407f6bc call 1f784055180 call 1f78405a060 call 1f784061e90 call 1f78405a060 809->827 828 1f78407f644-1f78407f67d call 1f78405a170 call 1f78407fe00 809->828 816->805 858 1f78407fa0f-1f78407fb63 call 1f784167960 call 1f78405c590 call 1f78405a060 call 1f784167960 call 1f78405c590 call 1f78405a060 call 1f784167960 call 1f78405c590 call 1f78405a060 call 1f784167960 call 1f78405c590 call 1f78405a060 call 1f784167960 call 1f78405c590 call 1f78405a060 call 1f7840828c0 call 1f78405d2a0 817->858 859 1f78407f7b0-1f78407f863 call 1f784167960 call 1f78405a170 call 1f78411acd0 call 1f78405c590 call 1f78405a060 call 1f78405c9c0 817->859 827->805 828->827 858->816 859->858 885 1f78407f869-1f78407f86e 859->885 886 1f78407f874-1f78407f903 call 1f78405a170 call 1f784120000 * 3 call 1f784097950 885->886 887 1f78407f9fc-1f78407fa09 call 1f78405d2a0 885->887 912 1f78407f925-1f78407f9f7 call 1f78405a170 call 1f78407e2c0 call 1f784061e50 call 1f784055180 call 1f784061e90 call 1f78405a060 call 1f78405d2a0 call 1f78405a060 call 1f784061e90 call 1f78405a060 886->912 913 1f78407f905-1f78407f920 call 1f78405a060 call 1f78405d2a0 886->913 887->858 912->805
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78407F47B
                                                                    • FindFirstFileA.KERNEL32 ref: 000001F78407F48B
                                                                      • Part of subcall function 000001F784055180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784055217
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork$FileFindFirst
                                                                    • String ID:
                                                                    • API String ID: 2113789597-0
                                                                    • Opcode ID: 36f8d388834b13250c1cd56afc24a702a3d02f2d48f31d1d6ce06cf885ec64b2
                                                                    • Instruction ID: 0dc62952390df613c1446996a4e5db854c562dcfce7360de595f03a0f7c839aa
                                                                    • Opcode Fuzzy Hash: 36f8d388834b13250c1cd56afc24a702a3d02f2d48f31d1d6ce06cf885ec64b2
                                                                    • Instruction Fuzzy Hash: C312DA3111CB498EE765EF24C499BEBB7E1FBD8340F404A6EA08AD31D2DE709944CB42

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyNextProcess32Queue::StructuredWork$CreateSnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 2993956496-0
                                                                    • Opcode ID: e5cb6cc2a9d3f2d857daf4add4d4784c79b02a268af29c56eed9b1a154788f6c
                                                                    • Instruction ID: f48cc5ac65b0a01c3c350f63bc0ee609ba163eabce035424aa2d91b894fb0b2f
                                                                    • Opcode Fuzzy Hash: e5cb6cc2a9d3f2d857daf4add4d4784c79b02a268af29c56eed9b1a154788f6c
                                                                    • Instruction Fuzzy Hash: 4851293051CB898BE3A5EF64C449BEBB7E1FBD4340F504A6DA08AD32E1DE709904CB42

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1221 7ff762adea60-7ff762adea7e 1222 7ff762adea84-7ff762adea88 1221->1222 1223 7ff762adf082-7ff762adf08c 1221->1223 1222->1223 1224 7ff762adea8e-7ff762adeaaf 1222->1224 1225 7ff762adeab1-7ff762adeab8 1224->1225 1226 7ff762adeaba 1224->1226 1227 7ff762adeabd-7ff762adead7 1225->1227 1226->1227 1228 7ff762adeaea-7ff762adeb26 1227->1228 1229 7ff762adead9-7ff762adeadf 1227->1229 1231 7ff762adeb2c-7ff762adeb3b 1228->1231 1238 7ff762adf052-7ff762adf07a 1228->1238 1230 7ff762adeae1-7ff762adeae7 1229->1230 1229->1231 1230->1228 1232 7ff762adeb52-7ff762adeb8a 1231->1232 1233 7ff762adeb3d-7ff762adeb43 1231->1233 1236 7ff762adeb90-7ff762adebae 1232->1236 1232->1238 1235 7ff762adeb45-7ff762adeb4e 1233->1235 1233->1236 1235->1232 1236->1238 1242 7ff762adebb4-7ff762adebc1 1236->1242 1238->1223 1244 7ff762adec61-7ff762adec6c 1242->1244 1245 7ff762adebc7-7ff762adec32 1242->1245 1244->1238 1245->1244 1251 7ff762adec34-7ff762adec55 1245->1251 1253 7ff762adec71-7ff762adec88 1251->1253 1254 7ff762adec57-7ff762adec5b 1251->1254 1255 7ff762aded95-7ff762adee1d call 7ff762ade5b0 1253->1255 1256 7ff762adec8e 1253->1256 1254->1244 1272 7ff762adee23-7ff762adee2b 1255->1272 1273 7ff762adefe9-7ff762adf04a 1255->1273 1257 7ff762adec91-7ff762adec94 1256->1257 1258 7ff762adec96-7ff762adec9a 1257->1258 1259 7ff762adec9c-7ff762adecb0 call 7ff762aed440 1257->1259 1258->1259 1261 7ff762adecb6-7ff762adecc9 1258->1261 1259->1261 1263 7ff762aded5f-7ff762aded8f 00007FF8B9F61310 1261->1263 1264 7ff762adeccf-7ff762adecd6 1261->1264 1263->1255 1263->1257 1266 7ff762adece0-7ff762aded5d 1264->1266 1266->1263 1266->1266 1274 7ff762adee30-7ff762adee33 1272->1274 1273->1238 1276 7ff762adee35-7ff762adee39 1274->1276 1277 7ff762adee3b-7ff762adee5b call 7ff762aed440 1274->1277 1276->1277 1278 7ff762adee61-7ff762adee73 1276->1278 1277->1278 1282 7ff762adefb7-7ff762adefe3 1278->1282 1283 7ff762adee79 1278->1283 1282->1273 1282->1274 1284 7ff762adee80-7ff762adee83 1283->1284 1286 7ff762adee85-7ff762adee87 1284->1286 1287 7ff762adee89-7ff762adee9d call 7ff762aed440 1284->1287 1286->1287 1289 7ff762adeea3-7ff762adeeb1 1286->1289 1287->1289 1290 7ff762adeed3-7ff762adeef9 1289->1290 1291 7ff762adeeb3-7ff762adeeb7 1289->1291 1295 7ff762adef90-7ff762adef9d 1290->1295 1296 7ff762adeeff-7ff762adef02 1290->1296 1293 7ff762adeec6-7ff762adeece 1291->1293 1294 7ff762adeeb9-7ff762adeec1 call 7ff762ade5b0 1291->1294 1293->1295 1294->1295 1295->1284 1297 7ff762adefa3-7ff762adefb1 1295->1297 1296->1295 1299 7ff762adef08-7ff762adef85 1296->1299 1297->1282 1299->1295
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                    • API String ID: 2490902527-1817040388
                                                                    • Opcode ID: b1eec2181c1e359eb28f9bbcb687503fb88331483defa231dfb92dd7bb477368
                                                                    • Instruction ID: c4cc6d31be2078af38ed9ba5aaf55a61df8eaa08b4f9f220e59deed3c1ec447e
                                                                    • Opcode Fuzzy Hash: b1eec2181c1e359eb28f9bbcb687503fb88331483defa231dfb92dd7bb477368
                                                                    • Instruction Fuzzy Hash: 97028936604B85C6DB60DF26D444AAEB7B5FB88B88F818626DF8D47764CF78D445CB00
                                                                    APIs
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7841177E6
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F784117864
                                                                    • CryptUnprotectData.CRYPT32 ref: 000001F7841178BD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$CryptDataUnprotect
                                                                    • String ID:
                                                                    • API String ID: 3418212865-0
                                                                    • Opcode ID: 51fe853a7d2b22d5b21b9f7a4f3a10a826fa85b530eb29a0291643d65522cfaf
                                                                    • Instruction ID: a6492cef9d2430a6c24dd749da1fe3f088577a0049d78d95ef6a41f4be6c8edd
                                                                    • Opcode Fuzzy Hash: 51fe853a7d2b22d5b21b9f7a4f3a10a826fa85b530eb29a0291643d65522cfaf
                                                                    • Instruction Fuzzy Hash: AC518A7051CB898FE7A4EF28C4597EAB7E1FB98341F50496DA08DD32A1DB749884CB42
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 547d032ff03bed76e8d98501336aec72c7838b5fcf6afd06ef48b4c17f1abeb4
                                                                    • Instruction ID: 60bb5d31760892d7ff018c8a4e479bcc201f955d255d9dc12843b1506150bef9
                                                                    • Opcode Fuzzy Hash: 547d032ff03bed76e8d98501336aec72c7838b5fcf6afd06ef48b4c17f1abeb4
                                                                    • Instruction Fuzzy Hash: 16022D02D286BAC5FB92A6364441BFEA3918F6A344F5C8733ED59379D5DFDC6482C220

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 416 7ff762ae26c0-7ff762ae26dc 417 7ff762ae26e5-7ff762ae2717 416->417 418 7ff762ae26de-7ff762ae26e0 416->418 420 7ff762ae2723-7ff762ae2730 417->420 419 7ff762ae31ad-7ff762ae31b6 418->419 421 7ff762ae2732-7ff762ae2756 420->421 422 7ff762ae2758-7ff762ae282f call 7ff762ae32e0 call 7ff762ae6d10 call 7ff762ae78f0 call 7ff762ae31c0 call 7ff762ae6d10 call 7ff762ae78f0 call 7ff762ae8250 GetModuleHandleA 420->422 421->420 438 7ff762ae2865-7ff762ae28c9 call 7ff762ae8250 GetProcAddress call 7ff762ae7c90 * 2 422->438 439 7ff762ae2831-7ff762ae2863 call 7ff762ae7c90 * 2 422->439 448 7ff762ae28d1-7ff762ae2993 call 7ff762ae1a40 call 7ff762ae90e0 call 7ff762ae9140 call 7ff762ae2150 call 7ff762ae7c90 438->448 439->448 461 7ff762ae299f-7ff762ae29e1 448->461 462 7ff762ae29e3-7ff762ae2a39 461->462 463 7ff762ae2a3e-7ff762ae2b4a VirtualAlloc 461->463 462->461 465 7ff762ae2b4c-7ff762ae2b64 call 7ff762ae7b60 463->465 466 7ff762ae2b69-7ff762ae2c5d call 7ff762ae3520 call 7ff762ae6c80 call 7ff762ae78f0 call 7ff762ae3400 call 7ff762ae6c80 call 7ff762ae78f0 call 7ff762ae8250 GetModuleHandleA 463->466 465->419 483 7ff762ae2c5f-7ff762ae2c97 call 7ff762ae7c90 * 2 466->483 484 7ff762ae2c99-7ff762ae2d06 call 7ff762ae8250 GetProcAddress call 7ff762ae7c90 * 2 466->484 493 7ff762ae2d0e-7ff762ae2dfe call 7ff762ae3760 call 7ff762ae6b60 call 7ff762ae78f0 call 7ff762ae3640 call 7ff762ae6bf0 call 7ff762ae78f0 call 7ff762ae8250 GetModuleHandleA 483->493 484->493 510 7ff762ae2e00-7ff762ae2e38 call 7ff762ae7c90 * 2 493->510 511 7ff762ae2e3a-7ff762ae2ea7 call 7ff762ae8250 GetProcAddress call 7ff762ae7c90 * 2 493->511 521 7ff762ae2eaf-7ff762ae2f0b 510->521 511->521 523 7ff762ae2f25-7ff762ae2f35 521->523 524 7ff762ae2f7f-7ff762ae30a8 call 7ff762ae6da0 call 7ff762ae39b0 call 7ff762ae6ad0 call 7ff762ae78f0 call 7ff762ae3890 call 7ff762ae6ad0 call 7ff762ae78f0 call 7ff762ae8250 GetModuleHandleA 523->524 525 7ff762ae2f37-7ff762ae2f40 523->525 545 7ff762ae30e4-7ff762ae3151 call 7ff762ae8250 GetProcAddress call 7ff762ae7c90 * 2 524->545 546 7ff762ae30aa-7ff762ae30e2 call 7ff762ae7c90 * 2 524->546 526 7ff762ae2f42-7ff762ae2f7b 525->526 527 7ff762ae2f7d 525->527 526->527 527->523 556 7ff762ae3159-7ff762ae31a2 CreateThread call 7ff762ae7b60 545->556 546->556 559 7ff762ae31a7-7ff762ae31a8 556->559 559->419
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 13e46143c9bb452854fa26b528ea7cbc2fb7775d90ecdede2900193578d89e51
                                                                    • Instruction ID: b9e1746dd1315fd1e1033312ab0f48ce2db537709d9223549e8492486ea705ae
                                                                    • Opcode Fuzzy Hash: 13e46143c9bb452854fa26b528ea7cbc2fb7775d90ecdede2900193578d89e51
                                                                    • Instruction Fuzzy Hash: 8142B132609BC595DBA0AB15E8947AAB3A4FBC8B80F404536DACD47B69DFBCC045DB10

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MetricsSystem$ClassCreateHandleModuleRegisterShowUpdate
                                                                    • String ID: class001
                                                                    • API String ID: 3666473625-3656631403
                                                                    • Opcode ID: d0a26d07f94e715907fe1e9cd3793ffca38442d1c0a5227ed338969c9367bda1
                                                                    • Instruction ID: ca19499f5f5d3dff657e43ae94467d43665e3c8c0fc37fc9483558bec0b8f52d
                                                                    • Opcode Fuzzy Hash: d0a26d07f94e715907fe1e9cd3793ffca38442d1c0a5227ed338969c9367bda1
                                                                    • Instruction Fuzzy Hash: 70310C70909B42D6EB80AF20F85CB66B7A5FB84344F90413DE58D866A4CFFDE01AC750

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: v2.1.1 Setup$ v2.1.1 Setup!Before starting the installation, select the folder where the files will be installed$A$FrghcZrah$Nexus-Executor$Welcome to
                                                                    • API String ID: 2030045667-3858696906
                                                                    • Opcode ID: ef12e5db93a373ac1250658159a1f333ca049569d580d89cb042698ec6e65b16
                                                                    • Instruction ID: ba7ea394ffc39ea971560c0b322a7955d663bda31f1e7d268ba1077b457b7d50
                                                                    • Opcode Fuzzy Hash: ef12e5db93a373ac1250658159a1f333ca049569d580d89cb042698ec6e65b16
                                                                    • Instruction Fuzzy Hash: 0B71632190DB82E1EFA0F715F4416AEE7A4EB84780F804435EACD43766DEECD146DB20

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 636 7ff762a9d4f0-7ff762a9d514 call 7ff762aed368 638 7ff762a9d51a-7ff762a9d529 636->638 639 7ff762a9d58a-7ff762a9d58d 638->639 640 7ff762a9d52b-7ff762a9d548 638->640 643 7ff762a9d58f-7ff762a9d5a0 call 7ff762a97d10 639->643 644 7ff762a9d5a2 639->644 641 7ff762a9d57f-7ff762a9d583 640->641 642 7ff762a9d54a-7ff762a9d57c 640->642 641->639 642->641 645 7ff762a9d5a5-7ff762a9d5c8 643->645 644->645 647 7ff762a9d601-7ff762a9d604 645->647 648 7ff762a9d5ca 645->648 651 7ff762a9d611-7ff762a9d62a call 7ff762ab3820 647->651 652 7ff762a9d606-7ff762a9d609 647->652 650 7ff762a9d5d0-7ff762a9d5e0 648->650 653 7ff762a9d5e2-7ff762a9d5f7 650->653 654 7ff762a9d5f9 650->654 658 7ff762a9d62f-7ff762a9d637 651->658 652->651 655 7ff762a9d60b-7ff762a9d60f 652->655 657 7ff762a9d5fc-7ff762a9d5ff 653->657 654->657 655->658 657->647 657->650 659 7ff762a9d6e9-7ff762a9d70a call 7ff762a9d320 658->659 660 7ff762a9d63d-7ff762a9d647 658->660 670 7ff762a9d710-7ff762a9d715 659->670 671 7ff762a9d7c5-7ff762a9d7ce 659->671 662 7ff762a9d649-7ff762a9d658 660->662 663 7ff762a9d68b-7ff762a9d693 call 7ff762ab14f0 660->663 666 7ff762a9d663-7ff762a9d677 call 7ff762aed440 662->666 667 7ff762a9d65a-7ff762a9d661 662->667 673 7ff762a9d696-7ff762a9d699 663->673 672 7ff762a9d67d-7ff762a9d689 666->672 667->666 667->672 674 7ff762a9d717-7ff762a9d71a 670->674 675 7ff762a9d72a-7ff762a9d735 670->675 676 7ff762a9d7d0-7ff762a9d7d5 671->676 677 7ff762a9d7f9-7ff762a9d810 671->677 672->673 673->659 683 7ff762a9d69b-7ff762a9d6b0 673->683 674->677 678 7ff762a9d720-7ff762a9d725 674->678 681 7ff762a9d751-7ff762a9d765 675->681 682 7ff762a9d737-7ff762a9d74b call 7ff762aed440 675->682 679 7ff762a9d7e2 676->679 680 7ff762a9d7d7-7ff762a9d7e0 676->680 684 7ff762a9d7f1-7ff762a9d7f4 call 7ff762ab3400 678->684 685 7ff762a9d7e7-7ff762a9d7ee 679->685 680->685 687 7ff762a9d794-7ff762a9d79a 681->687 688 7ff762a9d767-7ff762a9d76c 681->688 682->681 689 7ff762a9d6b2-7ff762a9d6bf 683->689 690 7ff762a9d6c1-7ff762a9d6d5 call 7ff762aed440 683->690 684->677 685->684 696 7ff762a9d7b0-7ff762a9d7c4 687->696 697 7ff762a9d79c-7ff762a9d7ab 00007FF8B9F61310 687->697 692 7ff762a9d779 688->692 693 7ff762a9d76e-7ff762a9d777 688->693 689->690 694 7ff762a9d6db-7ff762a9d6e3 689->694 690->694 698 7ff762a9d77e-7ff762a9d790 call 7ff762ab3400 692->698 693->698 694->659 697->696 698->687
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$it >= Data && it <= Data + Size$off >= 4 && off < Buf.Size$p >= begin() && p < end()
                                                                    • API String ID: 2490902527-15920025
                                                                    • Opcode ID: 99790948f109f600e1c394ed64e3b1af4ee5b5b93923c2e74f6dfed6afc58ff6
                                                                    • Instruction ID: 15ae7f17aad12523a0712626a262b6b9bf903802a730c46536c16aa94cc74cbc
                                                                    • Opcode Fuzzy Hash: 99790948f109f600e1c394ed64e3b1af4ee5b5b93923c2e74f6dfed6afc58ff6
                                                                    • Instruction Fuzzy Hash: FF91E172B28A46C6EF94BF26D8409B8B360FB44B84B944135CE4E47794DFBCE891C720

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1003 1f784056fe0-1f7840575d5 call 1f784055740 call 1f7840577f0 call 1f784059d80 call 1f78405a110 call 1f7840578a0 call 1f784059cf0 call 1f78405a110 call 1f784057960 call 1f784059c60 call 1f78405a110 call 1f784057a10 call 1f784059c60 call 1f78405a110 call 1f784057ac0 call 1f784059c60 call 1f78405a110 call 1f784057b70 call 1f784059bd0 call 1f78405a110 call 1f784057c20 call 1f784059b40 call 1f78405a110 call 1f784057ce0 call 1f784059a00 call 1f78405a110 call 1f784057dc0 call 1f7840598c0 call 1f78405a110 call 1f784057e90 call 1f784059830 call 1f78405a110 call 1f784057f60 call 1f7840597a0 call 1f78405a110 call 1f784058010 call 1f784059bd0 call 1f78405a110 call 1f7840580c0 call 1f784059710 call 1f78405a110 call 1f784058170 call 1f7840595d0 call 1f78405a110 call 1f784058230 call 1f784059710 call 1f78405a110 call 1f7840582e0 call 1f784059540 call 1f78405a110 call 1f784058390 call 1f7840594b0 call 1f78405a110 call 1f784058450 call 1f784059370 call 1f78405a110 call 1f784058500 call 1f784059370 call 1f78405a110 call 1f7840585b0 call 1f784059230 call 1f78405a110 call 1f784058670 call 1f784059230 call 1f78405a110 call 1f784058730 call 1f7840591a0 call 1f78405a110 call 1f784058800 call 1f784059370 call 1f78405a110 call 1f7840588b0 call 1f784059060 call 1f78405a110 call 1f784058960 call 1f784058f20 call 1f78405a110 call 1f784058a20 call 1f784058de0 call 1f78405a110 call 1f784058db0 call 1f784059e90 call 1f784058ba0 CreateToolhelp32Snapshot 1168 1f7840575d7-1f7840575df 1003->1168 1169 1f784057633-1f784057653 Process32FirstW 1003->1169 1172 1f7840575e8-1f78405762e call 1f784058af0 call 1f784058c70 call 1f78405a110 call 1f784059e70 1168->1172 1173 1f7840575e1-1f7840575e6 1168->1173 1170 1f7840577b9-1f7840577d8 call 1f78405a110 call 1f784059e70 1169->1170 1171 1f784057659-1f7840576ab call 1f784055360 call 1f784175ac0 call 1f784175d80 1169->1171 1187 1f7840577df-1f7840577e8 1170->1187 1191 1f7840576b7-1f7840576d3 call 1f784059e40 1171->1191 1172->1187 1173->1172 1196 1f7840576d9-1f784057702 call 1f784059e10 call 1f784059fe0 1191->1196 1197 1f784057790-1f7840577b3 call 1f78405a060 Process32NextW 1191->1197 1204 1f78405778b 1196->1204 1205 1f784057708-1f784057710 1196->1205 1197->1170 1197->1171 1204->1191 1207 1f78405771b-1f784057723 1205->1207 1208 1f784057712-1f784057719 1205->1208 1209 1f78405773a-1f784057789 call 1f78405a170 call 1f784056f30 call 1f78405a060 call 1f784059e70 1207->1209 1210 1f784057725-1f78405772a 1207->1210 1208->1209 1209->1187 1210->1209 1211 1f78405772c-1f784057738 1210->1211 1211->1210
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process32$CreateFac_nodeFac_node::_FirstNextSnapshotToolhelp32char_traitsstd::_
                                                                    • String ID:
                                                                    • API String ID: 4114415025-0
                                                                    • Opcode ID: 2cf1e73a0f9107235ddbfb485c3595bfcba21e3825775f53e0b531762a104419
                                                                    • Instruction ID: b23d0f864309b40795a918edc9e6706d9a1d4796dd048f4a6eb7b1fea0871be9
                                                                    • Opcode Fuzzy Hash: 2cf1e73a0f9107235ddbfb485c3595bfcba21e3825775f53e0b531762a104419
                                                                    • Instruction Fuzzy Hash: B1321B3221CA494BE755FF38C4697EBB2D2FB98340F9109BEA14AD31D2EE719944CB41
                                                                    APIs
                                                                    • type_info::_name_internal_method.LIBCMTD ref: 000001F784139EF0
                                                                      • Part of subcall function 000001F784086A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784086AAB
                                                                      • Part of subcall function 000001F784086A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784086ABA
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784139F56
                                                                    • CreateFileA.KERNEL32 ref: 000001F784139F82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFiletype_info::_name_internal_method
                                                                    • String ID:
                                                                    • API String ID: 645652700-0
                                                                    • Opcode ID: f64b6eb87d80957077a350099af48cbfcdfbf435f0acf51f21d504348669a5e4
                                                                    • Instruction ID: c1ed20b483ed68a7d38d930bdbd5061a522bcc1f3c00d9a4f3393185f23cfb20
                                                                    • Opcode Fuzzy Hash: f64b6eb87d80957077a350099af48cbfcdfbf435f0acf51f21d504348669a5e4
                                                                    • Instruction Fuzzy Hash: C781403061CB498FE794EF68D859BEAB7E1FB98350F404A6DA049C32D1DE79D845CB02
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78405476C
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78405477E
                                                                      • Part of subcall function 000001F7840553C0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840553DD
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840547BB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                    • String ID:
                                                                    • API String ID: 1865873047-0
                                                                    • Opcode ID: 2bd40488f3e532a51d24b491183ad7726d9c7802e0b56b6519047ab1d83811bb
                                                                    • Instruction ID: 98155c9e6172c2a4d85f514dde2297741fb5d41d2103836ff2de541f70c6e5d6
                                                                    • Opcode Fuzzy Hash: 2bd40488f3e532a51d24b491183ad7726d9c7802e0b56b6519047ab1d83811bb
                                                                    • Instruction Fuzzy Hash: D031DC7052CB888FD794EF28C449BABF7E1FB94340F81496DB0C9D22A5DBB0A444CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                                    • String ID:
                                                                    • API String ID: 586831839-0
                                                                    • Opcode ID: 02f2dc65f8decb4645fb847ec84ab164623bd49ce40520f2aa61d7a6ee298412
                                                                    • Instruction ID: fad00b1da9617d80bd8a90c6072497a42bb0367d759920c2ec60a91d8f0b8cf6
                                                                    • Opcode Fuzzy Hash: 02f2dc65f8decb4645fb847ec84ab164623bd49ce40520f2aa61d7a6ee298412
                                                                    • Instruction Fuzzy Hash: EB21C770618B888FD794EF2CC498B9ABBE0FB99344F50491DE489C32A0DB75D844CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                                    • String ID:
                                                                    • API String ID: 586831839-0
                                                                    • Opcode ID: 58da95cd914e928df27caef5f136864f76f7d90ee48b638eaa7250070e662160
                                                                    • Instruction ID: e4a1ee60c164570e9c96ec83d82756585a9c243d08da9cca3922560321b9489c
                                                                    • Opcode Fuzzy Hash: 58da95cd914e928df27caef5f136864f76f7d90ee48b638eaa7250070e662160
                                                                    • Instruction Fuzzy Hash: 2101D37461CB888FD744EF28C49971ABBE1FB99345F50091DF48AC32A0DB79D945CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DispatchPeekTranslate
                                                                    • String ID:
                                                                    • API String ID: 4217535847-0
                                                                    • Opcode ID: 592db406a15101d98d1bfc7a93d39be7e429bab12ec8d4365a76516f4c6005f4
                                                                    • Instruction ID: f1aa2681dfa295dd5ead749061b049c9cde6f495232805893a7137f802752425
                                                                    • Opcode Fuzzy Hash: 592db406a15101d98d1bfc7a93d39be7e429bab12ec8d4365a76516f4c6005f4
                                                                    • Instruction Fuzzy Hash: C1015E2192C592E6FF907B20A855F7AE664AF91341FD01031EACE41895DFECD04AEB30
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: gfff
                                                                    • API String ID: 1173767890-1553575800
                                                                    • Opcode ID: bd7c02e19e7797869487961a1e51ca7333e1f9954b24b3a2c72c06caf69b2669
                                                                    • Instruction ID: 560e5a6e9beb51606e2fbfe69935e793261ef3646542b2cecad57741564891a7
                                                                    • Opcode Fuzzy Hash: bd7c02e19e7797869487961a1e51ca7333e1f9954b24b3a2c72c06caf69b2669
                                                                    • Instruction Fuzzy Hash: E0519A23708BC586DB458F2899116BDFBB1F788B40F8D8235DA48877A9CB7CD155C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007
                                                                    • String ID: @
                                                                    • API String ID: 3568877910-2766056989
                                                                    • Opcode ID: 73d6871cf4131e7e7e3c516ea5bb2b6940c2de2e4e255355f0021467e71eb675
                                                                    • Instruction ID: 538d212f197d33c86ee6e07026e8fa78c6f93d9a2def99b71dead1404672235e
                                                                    • Opcode Fuzzy Hash: 73d6871cf4131e7e7e3c516ea5bb2b6940c2de2e4e255355f0021467e71eb675
                                                                    • Instruction Fuzzy Hash: 36110A70E08606D5FF80AB01E80CBB5A7A0BB54784F90413DD94D577A0DFFDA16ACB20
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78413A310
                                                                    • CreateFileA.KERNEL32 ref: 000001F78413A33F
                                                                      • Part of subcall function 000001F78405A170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78405A18D
                                                                      • Part of subcall function 000001F784139E50: type_info::_name_internal_method.LIBCMTD ref: 000001F784139EF0
                                                                      • Part of subcall function 000001F784139E50: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784139F56
                                                                      • Part of subcall function 000001F784139E50: CreateFileA.KERNEL32 ref: 000001F784139F82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFile$type_info::_name_internal_method
                                                                    • String ID:
                                                                    • API String ID: 2627539804-0
                                                                    • Opcode ID: 98ea87f00965d57ac3efe53a622e5d3c7e907a059cd269744f0d00fbdf9eee7f
                                                                    • Instruction ID: 9ca926d551f565682c5df73a16427c933e6ea0623520bb1967d9e8c9f81e57c5
                                                                    • Opcode Fuzzy Hash: 98ea87f00965d57ac3efe53a622e5d3c7e907a059cd269744f0d00fbdf9eee7f
                                                                    • Instruction Fuzzy Hash: E0111E7061CB898FD794EF28C44976AB7E1FBD9341F40492DE08DC3291DB79C8458B42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C6121Initialize
                                                                    • String ID:
                                                                    • API String ID: 2978892875-0
                                                                    • Opcode ID: d68fa1dd1f25c5d9833bb5b41399011af0f0bca26c4982c59452d0f3d9cb9bed
                                                                    • Instruction ID: bb15d092f393c3b98f50a322223889ad005f78dab2a834525725d13c9eb43a42
                                                                    • Opcode Fuzzy Hash: d68fa1dd1f25c5d9833bb5b41399011af0f0bca26c4982c59452d0f3d9cb9bed
                                                                    • Instruction Fuzzy Hash: 0D119C45E48243E2FFD477B1455AAB8C9465F95740FC40930ED9D462C3EDDCA983E232
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                    • String ID:
                                                                    • API String ID: 1173176844-0
                                                                    • Opcode ID: f263315650486d802dc5ceafc5012ad1b5bad17f869d85328af45017b7dfee40
                                                                    • Instruction ID: f4340e4aa909211d3bf2ec088bbd52e608a8230dbc41c198a4961b912cea8d52
                                                                    • Opcode Fuzzy Hash: f263315650486d802dc5ceafc5012ad1b5bad17f869d85328af45017b7dfee40
                                                                    • Instruction Fuzzy Hash: 11F09A10E19307E0FFA97665241A9B88101AF08770F980B30DEFC093C6EEDCA497E230
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                                    • Instruction ID: 09159b990cf086fefa956e09e051fdb11c60ff82f264b2fbeb568757c8d9a959
                                                                    • Opcode Fuzzy Hash: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                                    • Instruction Fuzzy Hash: B6A19436619B84C6DBA0DB1AE49072AB7A4F7C8B94F504125EECE83B68DF7CD451DB00
                                                                    APIs
                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 000001F78417F2EC
                                                                      • Part of subcall function 000001F78417FD70: std::bad_alloc::bad_alloc.LIBCMTD ref: 000001F78417FD79
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                    • String ID:
                                                                    • API String ID: 680105476-0
                                                                    • Opcode ID: 40e99fc6ce4dc2d146cdf7f013a5a6f8ee3dd898e06d9c12abdcb6339ef11b74
                                                                    • Instruction ID: 09173b3d28c6ef698e3dc20b89734112aaf33b5e0f4b55e168041909741639f6
                                                                    • Opcode Fuzzy Hash: 40e99fc6ce4dc2d146cdf7f013a5a6f8ee3dd898e06d9c12abdcb6339ef11b74
                                                                    • Instruction Fuzzy Hash: 7B014B34A3D90F4AFA98AE75A98D3FA2AD5BB483C1F94143CD515C61DAE994CC81C111
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_task
                                                                    • String ID:
                                                                    • API String ID: 118556049-0
                                                                    • Opcode ID: 68dcdc5df13b1305609106057423c5647b76bdd97cd7c73a0b3a13548c0169f4
                                                                    • Instruction ID: a4e47060dacc178d6c841dc7d889b6db3c384ec0b20c3a0e35a8b96e41b41373
                                                                    • Opcode Fuzzy Hash: 68dcdc5df13b1305609106057423c5647b76bdd97cd7c73a0b3a13548c0169f4
                                                                    • Instruction Fuzzy Hash: 96014061619F41D1DBA0AB18E445A2AF3A4FF88798F800734EADD42B94DFBCD511DB14
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310$__swprintf_l
                                                                    • String ID: !((flags & ImGuiInputTextFlags_CallbackCompletion) && (flags & ImGuiInputTextFlags_AllowTabInput))$!((flags & ImGuiInputTextFlags_CallbackHistory) && (flags & ImGuiInputTextFlags_Multiline))$#SCROLLY$%*s%.*s$@$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$apply_new_text_length <= buf_size$apply_new_text_length >= 0$buf != 0 && buf_size >= 0$buf[0] != 0$callback != 0$callback_data.Buf == callback_buf$callback_data.BufSize == state->BufCapacity$callback_data.BufTextLen == (int)strlen(callback_data.Buf)$callback_data.Flags == flags$font->ContainerAtlas->TexID == _CmdHeader.TextureId$g.DragDropActive || g.ActiveId == id || g.ActiveId == 0 || g.ActiveIdPreviousFrame == id || (g.CurrentMultiSelect != 0 && g.BoxSel$i >= 0 && i < Size$idx <= obj->TextLen$password_font->Glyphs.empty() && password_font->IndexAdvanceX.empty() && password_font->IndexLookup.empty()$state != 0$state && state->ID == id
                                                                    • API String ID: 2185106832-4266151527
                                                                    • Opcode ID: 2e47b44ae7e68c9b264366a916df0331105604c339e4ebef53baa41483c6feeb
                                                                    • Instruction ID: 9411023a085fc5cbdbc4de5a03d43018e48c34486f9b9ea6f20e032ecf0c8f53
                                                                    • Opcode Fuzzy Hash: 2e47b44ae7e68c9b264366a916df0331105604c339e4ebef53baa41483c6feeb
                                                                    • Instruction Fuzzy Hash: 4A93F532A08686CAEB90EF35D444AB9B7A0FF59788F848635DE4C17695CFF8E445CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$C610C612F020F61310
                                                                    • String ID: (Debug Log: Auto-disabled some ImGuiDebugLogFlags after 2 frames)$333?$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$Click %s Button to break in debugger! (remap w/ Ctrl+Shift)$Debug##Default$GImGui != 0$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$GetCurrentWindowRead()->Flags & ImGuiWindowFlags_Tooltip$HoveredId: 0x%08X$Left$Middle$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right$Size > 0$g.CurrentWindow->IsFallbackWindow == true$g.Font->IsLoaded()$g.MovingWindow && g.MovingWindow->RootWindow$g.Viewports.Size == 1$g.WindowsFocusOrder.Size <= g.Windows.Size$gfff$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                    • API String ID: 2611590445-8291574
                                                                    • Opcode ID: 67dd819bf459e58f4dc24f307201e7a997b3b530ade4f3c3acdfb8b4452a2f7a
                                                                    • Instruction ID: a4951c2ac570bbe0ce5cae9e9bdc6a675cfd764abdec00a733674229b05a0745
                                                                    • Opcode Fuzzy Hash: 67dd819bf459e58f4dc24f307201e7a997b3b530ade4f3c3acdfb8b4452a2f7a
                                                                    • Instruction Fuzzy Hash: 3CC2C032E146C2C9DFA1EF36C8446E8B7A1FF54748F948236DE085B6A5DFB8A541C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: 0 && "stbtt_InitFont(): failed to parse FontData. It is correct and complete? Check FontDataSize."$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$atlas->ConfigData.Size > 0$cfg.DstFont && (!cfg.DstFont->IsLoaded() || cfg.DstFont->ContainerAtlas == atlas)$font->ConfigData == font_config$font_offset >= 0 && "FontData is incorrect, or FontNo cannot be found."$glyph_index_in_font != 0$i >= 0 && i < Size$n < (Storage.Size << 5)$src_range[0] <= src_range[1] && "Invalid range: is your glyph range array persistent? it is zero-terminated?"$src_tmp.DstIndex != -1$src_tmp.GlyphsList.Size == src_tmp.GlyphsCount
                                                                    • API String ID: 1173767890-2192739418
                                                                    • Opcode ID: 80a92c5cf435319950cd35234684aa65eed7adde482fdeb0840858b163b0eb86
                                                                    • Instruction ID: 25542e7f8c577535f608c933b4645a7dfd5a39578b56a9fb671e91904174a830
                                                                    • Opcode Fuzzy Hash: 80a92c5cf435319950cd35234684aa65eed7adde482fdeb0840858b163b0eb86
                                                                    • Instruction Fuzzy Hash: B2F21732B04A86C6EB95EF25D484ABDB7A0FB58744F848236CE4D57760DFB8E446CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: (g.IO.BackendPlatformUserData == 0) && "Forgot to shutdown Platform backend?"$(g.IO.BackendRendererUserData == 0) && "Forgot to shutdown Renderer backend?"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Forgot to shutdown Platform backend?$Forgot to shutdown Renderer backend?
                                                                    • API String ID: 1173767890-2716422499
                                                                    • Opcode ID: 96087274a65a48a19f2292afb59cc2bb9d0ee349fad39154f4d4ad274d245eb9
                                                                    • Instruction ID: 32d8377ee7278e6f1f20fb10339a5148e870294abaf67db73764e6c7e5eb8b8f
                                                                    • Opcode Fuzzy Hash: 96087274a65a48a19f2292afb59cc2bb9d0ee349fad39154f4d4ad274d245eb9
                                                                    • Instruction Fuzzy Hash: 3B42BE72A18A82D2CB49EF24C9585FCB3A5FB54B84F984136CF0D4B654DFB8E566C320
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (inner_window->IDStack.back() == table_instance->TableInstanceID) && "Mismatching PushID/PopID!"$(outer_window->DC.ItemWidthStack.Size >= temp_data->HostBackupItemWidthStackSize) && "Too many PopItemWidth!"$(table->Flags & ImGuiTableFlags_ScrollX) == 0$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$Calling PopStyleColor() too many times!$Mismatching PushID/PopID!$Size > 0$Too many PopItemWidth!$g.CurrentWindow == outer_window && g.CurrentTable == table$g.TablesTempDataStacked > 0$i >= 0 && i < Size$inner_window == g.CurrentWindow$outer_window == inner_window || outer_window == inner_window->ParentWindow$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table != 0 && "Only call EndTable() if BeginTable() returns true!"$table->RowPosY2 == inner_window->DC.CursorPos.y
                                                                    • API String ID: 0-2342475368
                                                                    • Opcode ID: c7d7ccd073aa28cc0a8da63f02696dfd21ea439c566dee167eb27b63e243ea54
                                                                    • Instruction ID: 4d6041e21467af1d5cda47b00e5b955656a0baa6b76f18a7479ed15860173288
                                                                    • Opcode Fuzzy Hash: c7d7ccd073aa28cc0a8da63f02696dfd21ea439c566dee167eb27b63e243ea54
                                                                    • Instruction Fuzzy Hash: 0772B432A08A86D6EB95DB36C544BF8B360FF55744F888232DE49132A1DFF8B595CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$F61310$C610C61149F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$Calling PopStyleColor() too many times!$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$N/A$i >= 0 && i < Size$tab->LastFrameVisible >= tab_bar->PrevFrameVisible$tab->NameOffset < tab_bar->TabsNames.Buf.Size
                                                                    • API String ID: 1871915874-961183113
                                                                    • Opcode ID: 99a11c1a350e8a9dfd3b351aa328eb123f9d651ded0f6308aafe3ce9168905aa
                                                                    • Instruction ID: f50861b09fac98a6d6ceeb6c899539aa4dc7ad27f10ab2b829a7ec74a1ef570d
                                                                    • Opcode Fuzzy Hash: 99a11c1a350e8a9dfd3b351aa328eb123f9d651ded0f6308aafe3ce9168905aa
                                                                    • Instruction Fuzzy Hash: 6CB2C233A08A85C6DB95DF36C0405B9B7A1FF58788F948B36DE49632A4DFB8E445CB10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: State
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$ImGui::IsNamedKey(key)
                                                                    • API String ID: 1649606143-1336968070
                                                                    • Opcode ID: 320e79d58a395caa32967525c0a4eeebff8b16c0838ad5b5bb5afecf55618b72
                                                                    • Instruction ID: a219a0ee6f63f73531f1ec00019b5a5ecae2cf88cba2661c288fa0e4db4faa1b
                                                                    • Opcode Fuzzy Hash: 320e79d58a395caa32967525c0a4eeebff8b16c0838ad5b5bb5afecf55618b72
                                                                    • Instruction Fuzzy Hash: 5F911411E6C666E5FFF1B6355400BB9A2818FA1748F990236DCCE265D5CEEC7883E270
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: 0 && "Unknown event!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Processed$Remaining$button >= 0 && button < ImGuiMouseButton_COUNT$i >= 0 && i < Size$it >= Data && it < Data + Size && it_last >= it && it_last <= Data + Size$key != ImGuiKey_None$n >= 0 && n < BITCOUNT
                                                                    • API String ID: 2490902527-1923509833
                                                                    • Opcode ID: 8a7e1af03d72756e019b02673daee7c066d9e9cf1c3008671a80216385de6d30
                                                                    • Instruction ID: 6300dc7c4da3c16d0a07099b7187b9f78777db898f507e2f8e47fcc14803cff3
                                                                    • Opcode Fuzzy Hash: 8a7e1af03d72756e019b02673daee7c066d9e9cf1c3008671a80216385de6d30
                                                                    • Instruction Fuzzy Hash: 5E42F962B082C296EFD8AB2498507BEFB90FF51744F844135DE994BA98CBFCE454C760
                                                                    APIs
                                                                    • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF762A95CA0), ref: 00007FF762A971A7
                                                                    • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A97227
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$C610F020F61310
                                                                    • String ID: !g.Initialized && !g.SettingsLoaded$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$FindSettingsHandler(handler->TypeName) == 0$Table$Window$n >= 0 && n < BITCOUNT
                                                                    • API String ID: 310658293-416841283
                                                                    • Opcode ID: 6999e506cd3f841049ed0ddc9bbeb4f37ac2a9f693a45f5d1a2f228a3b90db1c
                                                                    • Instruction ID: 01bcdc5865217bd6558079402f19332e120bb0238147e6a6fa99320ea0f2398f
                                                                    • Opcode Fuzzy Hash: 6999e506cd3f841049ed0ddc9bbeb4f37ac2a9f693a45f5d1a2f228a3b90db1c
                                                                    • Instruction Fuzzy Hash: 4412BE72A19B82C6EB90EF25E8446B8B7A4FB54B44F944136CE8D473A4DFBCE455C320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: ClipboardGlobal$ByteCharMultiWide$AllocCloseDataEmptyFreeLockOpenUnlock
                                                                    • String ID:
                                                                    • API String ID: 1965520120-0
                                                                    • Opcode ID: ebbd9d8b24dcedb596b0ca59058d4c86985b5e6383d3a38eef27f5b3966815bd
                                                                    • Instruction ID: 4b0d30eef8d41355af9f25d50680ef51fb746f5d0c1a3de74f28098690020824
                                                                    • Opcode Fuzzy Hash: ebbd9d8b24dcedb596b0ca59058d4c86985b5e6383d3a38eef27f5b3966815bd
                                                                    • Instruction Fuzzy Hash: 58119675A08E01C2EF947B25B804535E2A5AFC8BD1F484138DE8E477A4DEFCD445D710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !is_visible$#ContextMenu$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->IndexWithinEnabledSet <= column->DisplayOrder$i >= 0 && i < Size$p >= Data && p < DataEnd$table->IsLayoutLocked == false$table->LeftMostEnabledColumn >= 0 && table->RightMostEnabledColumn >= 0
                                                                    • API String ID: 0-1387518580
                                                                    • Opcode ID: 4a9ae7a7dfc95e9f833c2f08296e03bc7dc638ae3a7b9870f2afbfcbe5ec5d51
                                                                    • Instruction ID: 58332c68d3bd4b0e1d1a5680fce0fffd23eb4192f0241f5648e25543483f215a
                                                                    • Opcode Fuzzy Hash: 4a9ae7a7dfc95e9f833c2f08296e03bc7dc638ae3a7b9870f2afbfcbe5ec5d51
                                                                    • Instruction Fuzzy Hash: F7E2D532A08685D6EB96EB36C1417B8B760FF59784F488321DF48136A5DBF8F4A5CB10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                                    • API String ID: 0-2705777111
                                                                    • Opcode ID: ed100c909a3311f44bcdd3e20e5d115049063c2e232d0146e083f4a0e98039ee
                                                                    • Instruction ID: dbc1ecb1af413f28903dc179a2419b9d378507bc425bd352022d3872890957bc
                                                                    • Opcode Fuzzy Hash: ed100c909a3311f44bcdd3e20e5d115049063c2e232d0146e083f4a0e98039ee
                                                                    • Instruction Fuzzy Hash: 4572CE23E18BE885C743DB3694426B9B7E1EF6E781F59C323ED44A6661EBB8D441C700
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$00007C610CloseDataF020Open
                                                                    • String ID:
                                                                    • API String ID: 330523670-0
                                                                    • Opcode ID: 26d566c6706ed3b603c2ca6413b7fcc995dc930fd5e624c9433e805aea778b59
                                                                    • Instruction ID: a43b652e32b8db2a74b8bf55bfca3da7a13e43a325e0dea90144ea97be544ead
                                                                    • Opcode Fuzzy Hash: 26d566c6706ed3b603c2ca6413b7fcc995dc930fd5e624c9433e805aea778b59
                                                                    • Instruction Fuzzy Hash: B231C532B08B81C3EB94AF25B80456AA6E4FBC8B91F540134DF8D47794DFBCE451D620
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3140674995-0
                                                                    • Opcode ID: 8964dd5a87bbd0479f9b080791705f60ec265abbfbc2f45a2eb81db15352648c
                                                                    • Instruction ID: ff5c6aa3ea5586f3d751021e77c787a944d433669ba2314acfd6bc86077fc94e
                                                                    • Opcode Fuzzy Hash: 8964dd5a87bbd0479f9b080791705f60ec265abbfbc2f45a2eb81db15352648c
                                                                    • Instruction Fuzzy Hash: ED317572608B81D5EBA0AF64E8407EDB365F784744F844039DE8E47794EFB8C249C710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !scoring_rect.IsInverted()$<NULL>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: from move, window "%s", layer=%d$[nav] NavMoveRequest: clamp NavRectRel for gamepad move$[nav] NavMoveRequestForward %d$g.NavMoveDir != ImGuiDir_None && g.NavMoveClipDir != ImGuiDir_None$g.NavMoveFlags & ImGuiNavMoveFlags_Forwarded
                                                                    • API String ID: 0-1751011103
                                                                    • Opcode ID: e4aba979aa13f89c1d393d52a5a001510e270dacfaf0202835dd2f82b435fe5c
                                                                    • Instruction ID: a56d59bceacd4297c9ee3c261ec7e376edb9e499da63caddec84c2d62daabaa2
                                                                    • Opcode Fuzzy Hash: e4aba979aa13f89c1d393d52a5a001510e270dacfaf0202835dd2f82b435fe5c
                                                                    • Instruction Fuzzy Hash: EC32F732D1878A82EBD2AB3681416F8F350EF69754F588332DE58265E1DFE87491C660
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$dx >= 0$dy >= 0$e->ey >= y_top$e->sy <= y_bottom && e->ey >= y_top$fabsf(area) <= 1.01f$sy1 > y_final-0.01f$x >= 0 && x < len
                                                                    • API String ID: 0-3568222241
                                                                    • Opcode ID: 790997296c3ace0f49b917fc0f4bb1bfed2a2440f2ab62fef7e3b804057f5052
                                                                    • Instruction ID: 15eba76b633028eecbfd09f6c148ef89e8273f44ccc22e1bd2ae213bd815369e
                                                                    • Opcode Fuzzy Hash: 790997296c3ace0f49b917fc0f4bb1bfed2a2440f2ab62fef7e3b804057f5052
                                                                    • Instruction Fuzzy Hash: 9912F622D18B8AC5EB52A73351824B5F250AFBF3C5F58D732ED48325B2DFA87191DA10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (0) && "Calling PopItemFlag() too many times!"$*Missing Text*$<Unknown>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Calling PopItemFlag() too many times!$p >= Data && p < DataEnd
                                                                    • API String ID: 0-3275063505
                                                                    • Opcode ID: daca524e7c5dbf27fa7a34285fc0e3a370f51538253c794bdcc54b755110fd88
                                                                    • Instruction ID: b2eba9af6d11bdc1249764c4edc25ddec6ba67732fabdc64f305838e880ff0f2
                                                                    • Opcode Fuzzy Hash: daca524e7c5dbf27fa7a34285fc0e3a370f51538253c794bdcc54b755110fd88
                                                                    • Instruction Fuzzy Hash: B1B1D472B08B82D1EF94AB18D504AA8A792FB45B84F844036DE4D037E5DFFCE855CB60
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s"$g.NavActivateDownId == g.NavActivateId$g.NavLayer == ImGuiNavLayer_Main || g.NavLayer == ImGuiNavLayer_Menu$g.NavMoveDir == ImGuiDir_None$g.NavWindow != 0
                                                                    • API String ID: 0-2167808928
                                                                    • Opcode ID: 0183191b6d91be417bd1c7107b1b726c92c41574d8174999c2f60281904307fd
                                                                    • Instruction ID: a6a992893f8f08ac1d3ddad733c902a3a5f2fd7d2bbfca145873a0e1f4bed13c
                                                                    • Opcode Fuzzy Hash: 0183191b6d91be417bd1c7107b1b726c92c41574d8174999c2f60281904307fd
                                                                    • Instruction Fuzzy Hash: 8672A532D08AC2C9EFE5AB35C0447B9A791EF55B48F884235DE98176E5CFF86481C7A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$button >= 0 && button < ((int)(sizeof(g.IO.MouseDown) / sizeof(*(g.IO.MouseDown))))$button >= 0 && button < ImGuiMouseButton_COUNT$id != 0
                                                                    • API String ID: 2490902527-2768765550
                                                                    • Opcode ID: 88b3baaae7ef37454bd0309ba98a3de903c58a9088266fe0384f8de82cd0dde6
                                                                    • Instruction ID: 40e5ce131a04ab169be8d77bf0ffb4b1aa064228aaf8a73d13963ce402a614ff
                                                                    • Opcode Fuzzy Hash: 88b3baaae7ef37454bd0309ba98a3de903c58a9088266fe0384f8de82cd0dde6
                                                                    • Instruction Fuzzy Hash: C322E132F08286C6EFE9A6259140BB9E691EF45344F84413ADE5D573E2CFECB854CB60
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #RESIZE$5$6$C:\Users\55yar\Desktop\imgui-master\imgui.h$idx == 0 || idx == 1
                                                                    • API String ID: 0-650503096
                                                                    • Opcode ID: bf26349d3ab49ba21dda182bb6882259765bc9e983ce837090972ddbe99c5440
                                                                    • Instruction ID: ca1cbfd312dec9e87befece879fdf7432413b2b90eb661fec3b57246a9d7fcfe
                                                                    • Opcode Fuzzy Hash: bf26349d3ab49ba21dda182bb6882259765bc9e983ce837090972ddbe99c5440
                                                                    • Instruction Fuzzy Hash: 29B22D32D18689C5EB92DB3795416B9B360FF59344F688732EE48235A2DFF8B885C710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$p >= begin() && p < end()$settings->ColumnsCount == table->ColumnsCount && settings->ColumnsCountMax >= settings->ColumnsCount$settings->ID == table->ID
                                                                    • API String ID: 0-2168725360
                                                                    • Opcode ID: dbd1ca440d040c993ee2685d397bd915aafff7e4aec8d0b619bb3bcf36a6bb7e
                                                                    • Instruction ID: c025b5e57aaa66938278614833e13c92b4fb4113d434bf093629118d409815ea
                                                                    • Opcode Fuzzy Hash: dbd1ca440d040c993ee2685d397bd915aafff7e4aec8d0b619bb3bcf36a6bb7e
                                                                    • Instruction Fuzzy Hash: 8461E333A18A81C6DB91EF25E4846A9BBA0FB40744F84C436DF8D473A1DBBCE549CB11
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                    • String ID:
                                                                    • API String ID: 2933794660-0
                                                                    • Opcode ID: 68b080e5c74ecdc989d9497fb427bfec2812cf223949a70a0905cf8ba2b6c893
                                                                    • Instruction ID: 11cc7aed08dc24d0f163f32ea2a921b0bc4ec1a8ac944ee1bf71f389fd3f2f7b
                                                                    • Opcode Fuzzy Hash: 68b080e5c74ecdc989d9497fb427bfec2812cf223949a70a0905cf8ba2b6c893
                                                                    • Instruction Fuzzy Hash: 16110A22B14F018AEF40DB60E8547B873A4FB59758F840E31DE6E46BA4EFB8D159C390
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ##NavUpdateWindowing$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0$shared_mods != 0
                                                                    • API String ID: 0-1670481530
                                                                    • Opcode ID: 04b31613541f7851fe5fa51a6883c1d55b506e0910f57327a67c4b686c1ca123
                                                                    • Instruction ID: 9b7b3988ea853f3fac7e0b93010da1eed4c3affb2449d5aa278f7a49a355d8b5
                                                                    • Opcode Fuzzy Hash: 04b31613541f7851fe5fa51a6883c1d55b506e0910f57327a67c4b686c1ca123
                                                                    • Instruction Fuzzy Hash: 5462C332E08786D6EFE9AA318144BB9E290FF55744F888239CE4D536D1CFE97464C760
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #CLOSE$#COLLAPSE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                    • API String ID: 0-766050946
                                                                    • Opcode ID: c667e738bb88e9983f5b0a5b33468422bbcf6a4303e5676e8c40f70c724579e5
                                                                    • Instruction ID: 5c42cdf89ee3e022041424dcce9abe481cd9f3a908156dd6804ae3784b8fdacd
                                                                    • Opcode Fuzzy Hash: c667e738bb88e9983f5b0a5b33468422bbcf6a4303e5676e8c40f70c724579e5
                                                                    • Instruction Fuzzy Hash: 13125C32E18785C5EB91DB369441BF8F360EF6A384F548736EE4C636A1DFA8A485C710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$ImMax(size_contents_v, size_visible_v) > 0.0f$idx == 0 || idx == 1
                                                                    • API String ID: 0-3128625980
                                                                    • Opcode ID: dc63a2eb52d91a7c96ab9617dc742f0ba242692b369b0ab69c027296cb449c46
                                                                    • Instruction ID: c6555f602e169959614f622d2cc761015239d88ee43a0e692f0305bda927679c
                                                                    • Opcode Fuzzy Hash: dc63a2eb52d91a7c96ab9617dc742f0ba242692b369b0ab69c027296cb449c46
                                                                    • Instruction Fuzzy Hash: 46120822D187C9C1EB93A63790416B9E350AF6E784F5CCB32FD58325A1DBE8B4C1C610
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ##v$#ComboPopup$C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                    • API String ID: 0-2429816084
                                                                    • Opcode ID: d223ba95fa3f8431c3527eb8a8addc1fc094f61dda7c71b05821a76b8b7267f5
                                                                    • Instruction ID: 6fdb5e38c1c09ab90a7bbf54a4fbb0b28de5e26c5f8095b41ecbe1dd2a249fa2
                                                                    • Opcode Fuzzy Hash: d223ba95fa3f8431c3527eb8a8addc1fc094f61dda7c71b05821a76b8b7267f5
                                                                    • Instruction Fuzzy Hash: A4E10632E14B85CAEB61DF3684406E9B360FF69348F549B22EE08379A5DFB8A055D710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (0) && "Calling PopItemFlag() too many times!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Calling PopItemFlag() too many times!
                                                                    • API String ID: 0-102052167
                                                                    • Opcode ID: 96fb338a3eb5323ad8e16e2236e7e16ed0364ae2ad41a9e1da31dbf1eaac17b2
                                                                    • Instruction ID: 9ec8ce25d7e9d84ca144c7131972bcda80834cdf82970e4e97f401171dc4fc03
                                                                    • Opcode Fuzzy Hash: 96fb338a3eb5323ad8e16e2236e7e16ed0364ae2ad41a9e1da31dbf1eaac17b2
                                                                    • Instruction Fuzzy Hash: 47E1E6329186C9C1EB66AB3690417F9F361EF59744F888732EE88235E1DFECA495C710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID:
                                                                    • API String ID: 1173767890-0
                                                                    • Opcode ID: 840806cd119453e176316f103cfa6115c689a532c86d21d08463b5bbe60d1203
                                                                    • Instruction ID: 5958bd8b75052cf84411a130debabac19a661cd01fc3f2dddbf8e87dd3431671
                                                                    • Opcode Fuzzy Hash: 840806cd119453e176316f103cfa6115c689a532c86d21d08463b5bbe60d1203
                                                                    • Instruction Fuzzy Hash: DCB12633E14A95C9D761EF3590846BEF3A4FF59B85F448322EF8512650EBB8E482C710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: InfoKeyboardLayoutLocale
                                                                    • String ID:
                                                                    • API String ID: 1218629382-0
                                                                    • Opcode ID: 9e33f65f36021c76e3ce5085f13d9bf961fb33b85001965e3fe80dccfd441406
                                                                    • Instruction ID: 587d48e721c94c2e176b64a367a5c76b97f7038005d69e3519fb38a7f914ca79
                                                                    • Opcode Fuzzy Hash: 9e33f65f36021c76e3ce5085f13d9bf961fb33b85001965e3fe80dccfd441406
                                                                    • Instruction Fuzzy Hash: 62F0A066714A81D6EBA28B26A400ABAF394EB48754F584037CFCE53310DEBDD887D750
                                                                    Strings
                                                                    • (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened, xrefs: 00007FF762AAC2E4
                                                                    • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF762AAC2DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened$C:\Users\55yar\Desktop\imgui-master\imgui.cpp
                                                                    • API String ID: 0-3836044477
                                                                    • Opcode ID: 5a185c5bc87efbe87e49fe26606f6f425be744948ca03a92641440ced4ace0dc
                                                                    • Instruction ID: 93d4c6c4bb53d5bc58401e05a99d21de165e0c8b1925f3ffd2cca341aecc1f79
                                                                    • Opcode Fuzzy Hash: 5a185c5bc87efbe87e49fe26606f6f425be744948ca03a92641440ced4ace0dc
                                                                    • Instruction Fuzzy Hash: 86D1E722D08A8EC1F7E2A63B40424B9E3919F6E385F5C9732FD48369E1CBD87585C590
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !(o > b->size || o < 0)$C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                                    • API String ID: 0-2013812653
                                                                    • Opcode ID: 338cbcf2d73f435f5922b98e8238c06777b811b88471036ee86486d399c18bc5
                                                                    • Instruction ID: 97055198f75436782481782f3cd10eb6c61e1704ec740274f5c8cf94d9436b59
                                                                    • Opcode Fuzzy Hash: 338cbcf2d73f435f5922b98e8238c06777b811b88471036ee86486d399c18bc5
                                                                    • Instruction Fuzzy Hash: 0BB1D132A08AC5CAFB01DF7E90411BDB7B0FB99385F545325EF8922675DBB8A585CB00
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i*stride_in_bytes] == 0
                                                                    • API String ID: 0-15633718
                                                                    • Opcode ID: 31de7da7b85a2ca0f7b465d4c6b43859fb456ff60d2410b47046c024e5081591
                                                                    • Instruction ID: 2f1ee498e505a0755d4375955e437f70000b1db30c900c8794f19d11bd3a2a8c
                                                                    • Opcode Fuzzy Hash: 31de7da7b85a2ca0f7b465d4c6b43859fb456ff60d2410b47046c024e5081591
                                                                    • Instruction Fuzzy Hash: 6D714B7360C2E28BD7A6572CA840B6EEED2B799340F5C4235EEC9C3B85C9BCD505CA50
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i] == 0
                                                                    • API String ID: 0-2060079458
                                                                    • Opcode ID: 00354369be909df9498fe21faccccd311e8301600fa052487b4864d57ac2e6d2
                                                                    • Instruction ID: f170602c4ca720c31d55a410a9dbc8ee02ffc486fc2eb5ca7eeb0c1a3df0284b
                                                                    • Opcode Fuzzy Hash: 00354369be909df9498fe21faccccd311e8301600fa052487b4864d57ac2e6d2
                                                                    • Instruction Fuzzy Hash: 6E71F66362C6E186CB658B39D844A7DFFA1F785305F484236EECC82B95CABDE114CB10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$text_end != 0
                                                                    • API String ID: 0-48455972
                                                                    • Opcode ID: 337525c904e070bd42df79c0a6487294a94bd2ebcfc3121796ca707f84feba5e
                                                                    • Instruction ID: 6e2c3ea05edcbf9f7dc516168fd6216dd78af04899aa0416826901930220efae
                                                                    • Opcode Fuzzy Hash: 337525c904e070bd42df79c0a6487294a94bd2ebcfc3121796ca707f84feba5e
                                                                    • Instruction Fuzzy Hash: 2641FB21F0D65AC6EFA1A9235480579E751AF65780FDC8732FD0C277A4ABFCE481CA10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                    • API String ID: 0-1180621679
                                                                    • Opcode ID: 6ed20166e65553b91257ace29f513335ab454b8572dbed2f61cfc2601968656f
                                                                    • Instruction ID: d39ec44247d28e4dec949730b95fef006f7751259c472de8fd3c8f4f2edfdaf9
                                                                    • Opcode Fuzzy Hash: 6ed20166e65553b91257ace29f513335ab454b8572dbed2f61cfc2601968656f
                                                                    • Instruction Fuzzy Hash: 2B319C72B141E58BEBD8CB62A810F797B60E3D5782B896122EFC017A48C67CD511CB60
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                    • API String ID: 0-1180621679
                                                                    • Opcode ID: 440f36ff81ebcb3adc85cc04d88a8c0a58b369e470e635c1928618b8866c0834
                                                                    • Instruction ID: 5053bf76631a1ee597ece8cfe20906ebea2df180e76bdda4b86e40d65766641f
                                                                    • Opcode Fuzzy Hash: 440f36ff81ebcb3adc85cc04d88a8c0a58b369e470e635c1928618b8866c0834
                                                                    • Instruction Fuzzy Hash: 8D11B7B1604691C6DB48CB61D4E04B9B7A0F794782F85103BEBDA07655DE7CD181C760
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: P
                                                                    • API String ID: 0-3110715001
                                                                    • Opcode ID: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                                    • Instruction ID: 8d23a3463a63e8f51a77355ec5cb7ed67557956edc59af991f81d5355c93b7fc
                                                                    • Opcode Fuzzy Hash: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                                    • Instruction Fuzzy Hash: 0A12D0702187459FD348DF28C090A6BB7E2FBCD348F504A6DE48AD77A5D634EA41CB42
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @
                                                                    • API String ID: 0-2766056989
                                                                    • Opcode ID: af22b2a64cd9b34464c746f31960b8c553625a99857650b96e506a8a1dbf1dca
                                                                    • Instruction ID: bf08cff67f41dfc113875fdbc59f4951682b181798b140e3a0bc6ab00095685a
                                                                    • Opcode Fuzzy Hash: af22b2a64cd9b34464c746f31960b8c553625a99857650b96e506a8a1dbf1dca
                                                                    • Instruction Fuzzy Hash: 09E1FE7421CB888FE7A4DF18D45876AB7E2FB99345F10492DE48EC32A0DB75D885CB06
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                                    • API String ID: 0-2705777111
                                                                    • Opcode ID: 64546066472ca3b8349dd8d249968d4cd0d82be6d00cd49db611cd94df8f4d3b
                                                                    • Instruction ID: 877332d4947cfc785f4b61319027dca6b61510248ba30d5f9539315b8520d150
                                                                    • Opcode Fuzzy Hash: 64546066472ca3b8349dd8d249968d4cd0d82be6d00cd49db611cd94df8f4d3b
                                                                    • Instruction Fuzzy Hash: 08514AA6B244B183DF609F2AC8C19BC77D1E78A743FD44176D65C82E51C5AEC14ADF20
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 19d529cf8631021c5dd542a830c84e469b7f6db80fccbf318bd5255d4788bf88
                                                                    • Instruction ID: c69dc7da272a0ca7ef4ce3b9acaf6e980d5d7398789e6e6606c3e1f3e57d654e
                                                                    • Opcode Fuzzy Hash: 19d529cf8631021c5dd542a830c84e469b7f6db80fccbf318bd5255d4788bf88
                                                                    • Instruction Fuzzy Hash: 8E927A33924B8886C756CF37958146CBB60FFADB85B19D716EE0823361EB75E4A4DB00
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C612
                                                                    • String ID:
                                                                    • API String ID: 1428191659-0
                                                                    • Opcode ID: f9d01269032edfe605ba9ee75bb53b8e442012ac64e2949f0b5a13a459ae737e
                                                                    • Instruction ID: 510fcec47d7b5d5b61f24e9e75ba62b3ee827a16734092983929c3e7da146adb
                                                                    • Opcode Fuzzy Hash: f9d01269032edfe605ba9ee75bb53b8e442012ac64e2949f0b5a13a459ae737e
                                                                    • Instruction Fuzzy Hash: 56828F73815BC187D728CF30B9981DAB7A8FB55340F105219DBF623A61DB78E1A6E708
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 26b4d47ad76f81d195c8f0f126609d9310c86f704e33473ce772df188177d854
                                                                    • Instruction ID: 8ae26718017cfa158aefd00e764439a3e094980b3a5b4bec93ec0e82a5ba77b8
                                                                    • Opcode Fuzzy Hash: 26b4d47ad76f81d195c8f0f126609d9310c86f704e33473ce772df188177d854
                                                                    • Instruction Fuzzy Hash: BC220433E08685CAEB91DA3690407FDF361FF59348F484B36EE48225A6DBF8A454CB11
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c56881822656bce64306f4bdbbfd4d3a54c53e1fbf9d1ba752f976963bfc6c0c
                                                                    • Instruction ID: 2004ed83324b57e91ae262ae42d67a9ccf3d90cf80e25167756ddd713633796f
                                                                    • Opcode Fuzzy Hash: c56881822656bce64306f4bdbbfd4d3a54c53e1fbf9d1ba752f976963bfc6c0c
                                                                    • Instruction Fuzzy Hash: D2024532A186C0CAD761CB369040AB9F7A1FF5D785F148322EF8963695EB7CE591CB10
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5cdcacff072863030bac574a795dcf5713a463dc51147c05da48169f858605a4
                                                                    • Instruction ID: 16597ecfae207fd8b94cc40c2a445c78fcb33a55622c11d4af784ff2b7cf3980
                                                                    • Opcode Fuzzy Hash: 5cdcacff072863030bac574a795dcf5713a463dc51147c05da48169f858605a4
                                                                    • Instruction Fuzzy Hash: 01020923E18B89C2D751E63794425B9F360FFAE385F585721FE4422AB6CFA9F051DA00
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5317f72f240fe5e613bfbcefe3a1641e28353fe1cc31e2d5af9e94ad44fd5358
                                                                    • Instruction ID: 90e597fe18801ab5bbfbcfa0f91ef11676bba1abf420f3a742b60cb0b4b507dc
                                                                    • Opcode Fuzzy Hash: 5317f72f240fe5e613bfbcefe3a1641e28353fe1cc31e2d5af9e94ad44fd5358
                                                                    • Instruction Fuzzy Hash: 18F1A332908281CAEFB5AA259040BBDB7A0EF59744F884E35DE89076D5DFFDE445CB20
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: afc59dc2018c5ed4bc9c3a55fd55fd1d2e106552e6602e1d74bb624f49eb36f9
                                                                    • Instruction ID: 3d3bb9ab3c8eeb40df0bf762a4538599974dc0143df0e7a9b48e1df958fafc3e
                                                                    • Opcode Fuzzy Hash: afc59dc2018c5ed4bc9c3a55fd55fd1d2e106552e6602e1d74bb624f49eb36f9
                                                                    • Instruction Fuzzy Hash: 5DD1D251D2D2C3EDEFE1AE364A00AB9A790EF12748FA88135DE491A5D5CFED6C41C231
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7fbf8747a14f15bf5d526cc27580a8984dc6b205a8b29d6e8ef1f11398739796
                                                                    • Instruction ID: 23c9b6d2e547e4a06e9a77439c4b332a5ca0cfc4b6adbdc622a68c096861964d
                                                                    • Opcode Fuzzy Hash: 7fbf8747a14f15bf5d526cc27580a8984dc6b205a8b29d6e8ef1f11398739796
                                                                    • Instruction Fuzzy Hash: 00C13B36750B8982EB508F3BD454BAD6761EB9EF88F09D231CE0A17BA4DF7AC1458700
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 562b7d3f91c9f74b619fe1397834ae2ab76450cf0a24359a5ff58522b0b22631
                                                                    • Instruction ID: 185a6c64e2c1855f88eabe0689b3de9411c9165c5c6fd1a90a9ee8af2b566a4f
                                                                    • Opcode Fuzzy Hash: 562b7d3f91c9f74b619fe1397834ae2ab76450cf0a24359a5ff58522b0b22631
                                                                    • Instruction Fuzzy Hash: 67B1D822E28FCC81E263A63750825F9E250AF7F3C5F2DDB23FD84756B29BA461D19510
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 07cb8aba6307fe7dc9cd5f23d641e01c29a23161fcd7abab4b59ac3142b8c2da
                                                                    • Instruction ID: 6dadd538244f246844f33da624c5601afe79b44bdacf5bca95f96e91f8d5f0ca
                                                                    • Opcode Fuzzy Hash: 07cb8aba6307fe7dc9cd5f23d641e01c29a23161fcd7abab4b59ac3142b8c2da
                                                                    • Instruction Fuzzy Hash: 10D1BE32D0A3C1D5E7919F358440AF8BBD4FB66B48F4C827ADF8817A56CBA85450DBB0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2103458bef360e4307c807517193c080bccb7cfe3cd90ec02abd82c8c74968f6
                                                                    • Instruction ID: 80a13fe5ee5bc95fbea71b2797b33e8292a9d5df81cd5392dc6ad41e47438f23
                                                                    • Opcode Fuzzy Hash: 2103458bef360e4307c807517193c080bccb7cfe3cd90ec02abd82c8c74968f6
                                                                    • Instruction Fuzzy Hash: E2910332918685C6EBEAAF36C0007F9B3A0FF04758F58833ACE59565D4DBF96484CB60
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                                    • Instruction ID: 8f60a195d6f7ff8a9d00f3ef039faeb7920a6cf85c5f7e98934ea5b2fa68ee25
                                                                    • Opcode Fuzzy Hash: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                                    • Instruction Fuzzy Hash: 48410DDFC0DAC51BC7428664ACAA6827F709A2324EBCF58DBD498CA587F048D409D712
                                                                    APIs
                                                                      • Part of subcall function 000001F784055360: _WChar_traits.LIBCPMTD ref: 000001F78405538D
                                                                      • Part of subcall function 000001F784054AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784054AD0
                                                                      • Part of subcall function 000001F784054AA0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F784054B2F
                                                                      • Part of subcall function 000001F784054AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784054B41
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840548B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::Concurrency::details::_CriticalEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWork$Char_traits
                                                                    • String ID: $ $ $B$D$K$KDBM$M$a$a$a$b$c$e$g$i$l$o$t$y
                                                                    • API String ID: 1777712374-1292890139
                                                                    • Opcode ID: c02a726d3c2bd88a4534588b83aa4fca235328903684469cf21292f4d99c4a12
                                                                    • Instruction ID: 6c49366aef59224a1f000f4a35e4f2d570b0a8f06c6c940d6189bd1ac98bc9c2
                                                                    • Opcode Fuzzy Hash: c02a726d3c2bd88a4534588b83aa4fca235328903684469cf21292f4d99c4a12
                                                                    • Instruction Fuzzy Hash: CB61D77050CB848FE761EB68C449B9BBBE1FBA9304F04495DA4C9C7261DBB99488CB53
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C6125630
                                                                    • String ID: 1.91.6 WIP$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$strcmp(version, "1.91.6 WIP") == 0 && "Mismatched version string!"$sz_idx == sizeof(ImDrawIdx) && "Mismatched struct layout!"$sz_io == sizeof(ImGuiIO) && "Mismatched struct layout!"$sz_style == sizeof(ImGuiStyle) && "Mismatched struct layout!"$sz_vec2 == sizeof(ImVec2) && "Mismatched struct layout!"$sz_vec4 == sizeof(ImVec4) && "Mismatched struct layout!"$sz_vert == sizeof(ImDrawVert) && "Mismatched struct layout!"
                                                                    • API String ID: 1529501491-1295771896
                                                                    • Opcode ID: 81d2e9201c58c4257a11a08258dd765dc5fa7c07bb397093847fbf6462c9f984
                                                                    • Instruction ID: 6c91425fcef8342b9c225f2bf76702c8d8a4c701ceca99fd02d83c1163e4789a
                                                                    • Opcode Fuzzy Hash: 81d2e9201c58c4257a11a08258dd765dc5fa7c07bb397093847fbf6462c9f984
                                                                    • Instruction Fuzzy Hash: 95314120A08A42D0FF95BB05E844975B765FFA5784FC85031DC4D07AA8DFEDE546C7A0
                                                                    APIs
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001F7840D6BDD
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D6C5A
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D6C73
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001F7840D6CB3
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D6D12
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D6D2B
                                                                    • _Min_value.LIBCPMTD ref: 000001F7840D6D62
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D6D7E
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D6D97
                                                                    • _Max_value.LIBCPMTD ref: 000001F7840D6DCE
                                                                    • _Min_value.LIBCPMTD ref: 000001F7840D6DEB
                                                                      • Part of subcall function 000001F7840DF140: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001F7840DF165
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Affinity::operator!=Concurrency::details::HardwareMin_value$Max_valueSchedulerScheduler::_
                                                                    • String ID:
                                                                    • API String ID: 2048856540-0
                                                                    • Opcode ID: e866146c94e960af1540157134187f2a0fce7dbc0c02fbcd93b84c3e2d61bdcf
                                                                    • Instruction ID: b66d98bd80945d6e7d05ecdca6ce0d3c783c93c5e78bbda4424e4c6e85452d40
                                                                    • Opcode Fuzzy Hash: e866146c94e960af1540157134187f2a0fce7dbc0c02fbcd93b84c3e2d61bdcf
                                                                    • Instruction Fuzzy Hash: CF02CD7151CB898FDBB5EF18C458BEBB3E1FB98340F400A6EA58EC3291DA749545CB42
                                                                    APIs
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001F7840D722D
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D72AA
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D72C3
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001F7840D7303
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D7362
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D737B
                                                                    • _Min_value.LIBCPMTD ref: 000001F7840D73B2
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D73CE
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840D73E7
                                                                    • _Max_value.LIBCPMTD ref: 000001F7840D741E
                                                                    • _Min_value.LIBCPMTD ref: 000001F7840D743B
                                                                      • Part of subcall function 000001F7840DF190: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001F7840DF1B5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Affinity::operator!=Concurrency::details::HardwareMin_value$Max_valueSchedulerScheduler::_
                                                                    • String ID:
                                                                    • API String ID: 2048856540-0
                                                                    • Opcode ID: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                                    • Instruction ID: 27f017b5b4d43a85a35d93ce414d9de58d843030f98c6e170bb043384f6ad682
                                                                    • Opcode Fuzzy Hash: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                                    • Instruction Fuzzy Hash: 5C02DB7111CB898FDBB5EF18C458BEBB7E1FBA8344F400A6E958EC3291DA709545CB42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: ##Background$##Foreground$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$Size > 0$draw_data->CmdLists.Size == draw_data->CmdListsCount$g.Initialized
                                                                    • API String ID: 2490902527-3285338674
                                                                    • Opcode ID: 55e0a90a21c0d75db33410e0f2d76169ae9688cc536bc39d37b1e1ec5e10517e
                                                                    • Instruction ID: 2bd4fe5159edd7987671538deecb5cc79920870934229cf4f86681f7c6624bac
                                                                    • Opcode Fuzzy Hash: 55e0a90a21c0d75db33410e0f2d76169ae9688cc536bc39d37b1e1ec5e10517e
                                                                    • Instruction Fuzzy Hash: 51E1A432F14A82C6EF90EF26D944AA9B7A6FB48B44F944035DE4D47695DFB8EC41C310
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: ((char*)(state->undo_rec + state->redo_point + 1) + move_size) <= buf_end$((char*)(state->undo_rec + state->redo_point)) >= buf_begin$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$C:\Users\55yar\Desktop\imgui-master\imstb_textedit.h$i >= 0 && i < Size$idx <= obj->TextLen
                                                                    • API String ID: 2490902527-1648308927
                                                                    • Opcode ID: cba7749c605e8c7e24c6b8a343890df7f9a2b9aba5917ea33c91d25d186e9d41
                                                                    • Instruction ID: 7149f754e7bd5df4f71b60c62e91b4dde445743d49fca9c7959e5b9de1cfbb8d
                                                                    • Opcode Fuzzy Hash: cba7749c605e8c7e24c6b8a343890df7f9a2b9aba5917ea33c91d25d186e9d41
                                                                    • Instruction Fuzzy Hash: 5391DCB2B14B8582EF44DF28D044BBCB762FB95B88F884135CE4A17659DBBCE542C721
                                                                    APIs
                                                                    • 00007FF8B9F61310.VCRUNTIME140(00000000,?,00000000,?,00007FF762AC1E8F), ref: 00007FF762AC1C6E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$Fonts.Size > 0 && "Cannot use MergeMode for the first font"$Size > 0$font_cfg->FontData != 0 && font_cfg->FontDataSize > 0$font_cfg->OversampleH > 0 && font_cfg->OversampleV > 0 && "Is ImFontConfig struct correctly initialized?"$font_cfg->SizePixels > 0.0f && "Is ImFontConfig struct correctly initialized?"
                                                                    • API String ID: 2490902527-1408190167
                                                                    • Opcode ID: b09eefd3328623ce888b009cefca10f17047618d8816258d79a3665aee2993cc
                                                                    • Instruction ID: 1121254c0b4cbe5d94eeb289e9d8cf7a98782c89422176b5042bff660e4447f5
                                                                    • Opcode Fuzzy Hash: b09eefd3328623ce888b009cefca10f17047618d8816258d79a3665aee2993cc
                                                                    • Instruction Fuzzy Hash: 19918C32608B82D6EF90EF25E840AA8B7A4FB44B84F844136CE4D43365DFBCD5A9D751
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$std::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 2527301759-0
                                                                    • Opcode ID: 71ef438b1bb58b4182dc28e9ffd7d5b29104a32867a1bdd3a258c92d20c36c8b
                                                                    • Instruction ID: 5018510df6d9a489adc8755a6d5d25acdfd077bff6f443c48a3217fd2df2f5f6
                                                                    • Opcode Fuzzy Hash: 71ef438b1bb58b4182dc28e9ffd7d5b29104a32867a1bdd3a258c92d20c36c8b
                                                                    • Instruction Fuzzy Hash: B2611B7062C7569BE264DF19C498BBBB6E1BBC43D0F4008BDF086C75E2DAA4DC41D642
                                                                    APIs
                                                                    • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF762ABD0B7), ref: 00007FF762AC0A83
                                                                    • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF762ABD0B7), ref: 00007FF762AC0C0C
                                                                    • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF762ABD0B7), ref: 00007FF762AC0C2C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: $C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                    • API String ID: 2490902527-669993125
                                                                    • Opcode ID: 71389e765cdf82a4882dcaf081e1e13a47cd802ca95431e42650f4a32f630d61
                                                                    • Instruction ID: 6b158d3b33fbc9c562e94b75cfbd0913b37079a51aab216692873e1dfa7692a3
                                                                    • Opcode Fuzzy Hash: 71389e765cdf82a4882dcaf081e1e13a47cd802ca95431e42650f4a32f630d61
                                                                    • Instruction Fuzzy Hash: 65E19EB2B08A86CAEF94DF15D440B69A3A5FB84B84F858135CE4E87764DFB8E441CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: <NULL>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$[focus] FocusWindow("%s", UnlessBelowModal): prevented by "%s".$i >= 0 && i < Size$window == 0 || window->RootWindow != 0
                                                                    • API String ID: 2490902527-1613245857
                                                                    • Opcode ID: 38ba76fbec77e7e4ee3866a5998e65f7bd94d7ae0fa5277d0de83dec56c81f92
                                                                    • Instruction ID: 4bd65dd97c4fc1f83acd4e03adeb7a07a0a03343be56fcbf0e69f056323cb14c
                                                                    • Opcode Fuzzy Hash: 38ba76fbec77e7e4ee3866a5998e65f7bd94d7ae0fa5277d0de83dec56c81f92
                                                                    • Instruction Fuzzy Hash: 0AA19132A09682DAEFE9AF15D144AF9E791EF40780F880036DE9D07A95DFECE454C361
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$i >= 0 && i < Size$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table->MemoryCompacted == false
                                                                    • API String ID: 1173767890-1783795845
                                                                    • Opcode ID: 05490356745c638e72b665715467a340bbf28cbfda5662b06804bd3badcdefa0
                                                                    • Instruction ID: 2afea86ff3bc6001a5b811fe9de8ae8d5c114f253bcd9ba885e3f47fb9d4d805
                                                                    • Opcode Fuzzy Hash: 05490356745c638e72b665715467a340bbf28cbfda5662b06804bd3badcdefa0
                                                                    • Instruction Fuzzy Hash: 8D51BA72A08A82C6DF50AF14E8546E8B7A4FB54B88F880036CE4D4B7A4DFFDE146C750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Decorator::getTableTypeshared_ptr
                                                                    • String ID: d
                                                                    • API String ID: 143873753-2564639436
                                                                    • Opcode ID: 69cead7afb0e039ecb5138173952be44cfc6b8be8a7abe79b5a91df074882742
                                                                    • Instruction ID: a089e327300074397895baebc23ce0f07a6edb93e9a815dae47591dd60038546
                                                                    • Opcode Fuzzy Hash: 69cead7afb0e039ecb5138173952be44cfc6b8be8a7abe79b5a91df074882742
                                                                    • Instruction Fuzzy Hash: EE91213051C7898FD794EF28C458BABBBE1FFD9340F4409ADB489C32A2DA749945CB42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Decorator::getTableTypeshared_ptr
                                                                    • String ID: d
                                                                    • API String ID: 143873753-2564639436
                                                                    • Opcode ID: 1a6a6722034d945976169db871c6d8bc4f2ed9e348582280147d843b730620fb
                                                                    • Instruction ID: 782072ce34f90663cfc2bc888f7bd569dd21cc8f34c54fd93bcca05455e36a0c
                                                                    • Opcode Fuzzy Hash: 1a6a6722034d945976169db871c6d8bc4f2ed9e348582280147d843b730620fb
                                                                    • Instruction Fuzzy Hash: 1591243051C7898FD794EF28C458BABBBE1FFD9340F4449ADB489C32A2DA749945CB42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Decorator::getTableTypeshared_ptr
                                                                    • String ID: d
                                                                    • API String ID: 143873753-2564639436
                                                                    • Opcode ID: 2612a0b920fc091130e9c3c3613e0ec6eef3206baac283914f1a5a83fc148c58
                                                                    • Instruction ID: 770fc16a9271cfadac68ed4f8c3a9ebc3eebdfc8b7ddaea3bb7be12b6775c698
                                                                    • Opcode Fuzzy Hash: 2612a0b920fc091130e9c3c3613e0ec6eef3206baac283914f1a5a83fc148c58
                                                                    • Instruction Fuzzy Hash: 6991203061C7898FD794EF28C4587ABBBE1FFD9340F4409ADB489C32A2DA749945CB52
                                                                    APIs
                                                                      • Part of subcall function 00007FF762AB50E0: 00007FF8C61149A0.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF762AB5139
                                                                    • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762AC43A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$C610C61149F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$i >= 0 && i < Size$pack_context != 0$pack_rects[i].w == user_rects[i].Width && pack_rects[i].h == user_rects[i].Height$user_rects.Size >= 1
                                                                    • API String ID: 3027678408-766226355
                                                                    • Opcode ID: 772eaf52f8a00a670f05471158b65ee58448afbc09224eec8e1d511d86153d15
                                                                    • Instruction ID: ad7b1f0ae0baa66023cac5564f7043d85856dde6dfec79540d0425e36b38c573
                                                                    • Opcode Fuzzy Hash: 772eaf52f8a00a670f05471158b65ee58448afbc09224eec8e1d511d86153d15
                                                                    • Instruction Fuzzy Hash: 2FA16B72B08A52D6EF84AF15D4409B8A765FB90B88B804136CE8E477A4DFFCE546C760
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: !g.WindowsFocusOrder.contains(window)$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$g.WindowsFocusOrder[window->FocusOrder] == window$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                    • API String ID: 2490902527-3130785268
                                                                    • Opcode ID: 9f02b039fdcaa7b742a3d60f602bcfec43f35c8abd80d2da92b53ff394a33b45
                                                                    • Instruction ID: a0c14a1c7c420cc002e3804e161d986c7ced669567c3020cb2849a07d3552abf
                                                                    • Opcode Fuzzy Hash: 9f02b039fdcaa7b742a3d60f602bcfec43f35c8abd80d2da92b53ff394a33b45
                                                                    • Instruction Fuzzy Hash: C4719132B15A82D1DF60AF15D840AF8A761FB94B84FA44032CE4E47654CFF9E996C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$cmd.ElemCount == 6$i >= 0 && i < Size$it >= Data && it <= Data + Size
                                                                    • API String ID: 2490902527-3684587188
                                                                    • Opcode ID: 32f969d57518e8ff86bb7a1ee6f74f0bf99713afd0104c017ab027245c74de74
                                                                    • Instruction ID: ac2ffd7662d20e5fb03f7769a98284f8db765e27e053c8cc55b6ea9bbd95c4e6
                                                                    • Opcode Fuzzy Hash: 32f969d57518e8ff86bb7a1ee6f74f0bf99713afd0104c017ab027245c74de74
                                                                    • Instruction Fuzzy Hash: 6C81D322A18AC5D2EB509B2AD8407B9B320FF98744F949331DE8D176A4DFFDE586C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$char_traits
                                                                    • String ID: $'
                                                                    • API String ID: 2432257368-2481900351
                                                                    • Opcode ID: 52a6df86987effc56c3942b1dc471f96e7d443776264125f91504f2597ebadb0
                                                                    • Instruction ID: 9b9738b71ff56e52bb063a99cae3e1d2ec119bf1eb3fa45eac3ea32a1ca2ca52
                                                                    • Opcode Fuzzy Hash: 52a6df86987effc56c3942b1dc471f96e7d443776264125f91504f2597ebadb0
                                                                    • Instruction Fuzzy Hash: 5251313151CB898FD3A0FF14C489BEBB7E1FB98341F40496DA08AC72A2DEB49544CB42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: EventMouseTrack$ClientExtraInfoMessageScreen
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                    • API String ID: 3561655495-3890275027
                                                                    • Opcode ID: abe9a299fd20b9a6fbd2fc3767dffb8d4ebf984e011b516c80763c98f3087046
                                                                    • Instruction ID: 24817844a4bb35861d4a674b9a7f6365db5527818e8bac97a3ce765531353742
                                                                    • Opcode Fuzzy Hash: abe9a299fd20b9a6fbd2fc3767dffb8d4ebf984e011b516c80763c98f3087046
                                                                    • Instruction Fuzzy Hash: 9561F072B08652DAEB90DF61D440ABDB3B5FB44744F98403ADE8A53A94CFF8E846D710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: __swprintf_l
                                                                    • String ID: #Child$%s/%08X$%s/%s_%08X$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$id != 0
                                                                    • API String ID: 1488884202-1586801193
                                                                    • Opcode ID: 6db79fa99209152f1d7b5e30e8589ad90eaa443debf081e66ebce48769e8c08d
                                                                    • Instruction ID: d3577692cfc2d409aac9d5ad442673579ef00ef9ed753db9a4b12e42aa91d83c
                                                                    • Opcode Fuzzy Hash: 6db79fa99209152f1d7b5e30e8589ad90eaa443debf081e66ebce48769e8c08d
                                                                    • Instruction Fuzzy Hash: FB51DC32E08A85D6EB94EF269440AE9B7A1FF98744F948136DF4803691CFF8A4A5C710
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID:
                                                                    • API String ID: 1173767890-0
                                                                    • Opcode ID: 3bdaf2d7e444b422f850cb11a475b2b945d7ea902e82f7935716d9e8c5838d19
                                                                    • Instruction ID: f49f4b8713023d3c7de204f9db29272ffb1977a4eb0076b5c537937925a7dff0
                                                                    • Opcode Fuzzy Hash: 3bdaf2d7e444b422f850cb11a475b2b945d7ea902e82f7935716d9e8c5838d19
                                                                    • Instruction Fuzzy Hash: 7E026E32A19982D2DB89FF65D5954FCE374FB54B40B904232DB0E831A1DFB8E56AC710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$z != 0$z->direction$z->ey >= scan_y_top
                                                                    • API String ID: 0-479673919
                                                                    • Opcode ID: 9fd9bdd6ad68a8098bfebc2115c419c8b9b529cc5a024d7a6b8dab4b64df2eeb
                                                                    • Instruction ID: cdd331983efad8f2785895fa2488b7b863fdeafaf112a8cf0edbef2ff9f16581
                                                                    • Opcode Fuzzy Hash: 9fd9bdd6ad68a8098bfebc2115c419c8b9b529cc5a024d7a6b8dab4b64df2eeb
                                                                    • Instruction Fuzzy Hash: BA12F432908AC5C6DB92DF36D0416A9F3A0FF58785F588322DE4963665EFB8E195CB00
                                                                    APIs
                                                                    • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A98442
                                                                    • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A984FA
                                                                    • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A9858A
                                                                      • Part of subcall function 00007FF762A981E0: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A98269
                                                                      • Part of subcall function 00007FF762A981E0: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A982E9
                                                                      • Part of subcall function 00007FF762A981E0: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A9836A
                                                                    • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762A98624
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$DrawList == &DrawListInst
                                                                    • API String ID: 1173767890-20161693
                                                                    • Opcode ID: 8f0dc90c3efb46d4bbd22a949c9ecc273bb37a15ecf20fa59b12ee5c9ffabb3b
                                                                    • Instruction ID: 3ec18252835dc219e72385753796c63cd6b66b3fef03e37a3eec2cb7ba5a89cd
                                                                    • Opcode Fuzzy Hash: 8f0dc90c3efb46d4bbd22a949c9ecc273bb37a15ecf20fa59b12ee5c9ffabb3b
                                                                    • Instruction Fuzzy Hash: FF71E172A19A82C6CB85EF14D4955FCB3B5FB54B84FA84236CE0E87260DFB8D55AC340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$C610F020F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->SortOrder < table->SortSpecsCount$p >= Data && p < DataEnd
                                                                    • API String ID: 310658293-2291414753
                                                                    • Opcode ID: 0431d1fd47e77aa1f7e3d261d8250983adf7b6efdf7b2589177fc9585646c7a3
                                                                    • Instruction ID: 08d8fc8998e124f34a75cbb0b5c47b5b988a83e023937154e3ab07c49792568d
                                                                    • Opcode Fuzzy Hash: 0431d1fd47e77aa1f7e3d261d8250983adf7b6efdf7b2589177fc9585646c7a3
                                                                    • Instruction Fuzzy Hash: 2A619F32708A92D6DB48EF29D1845BCB761FB44B40F844136DF5D873A4DBB8E566C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$i >= 0 && i < Size$pos <= text_len
                                                                    • API String ID: 2490902527-3124524525
                                                                    • Opcode ID: 43148d90905608da133ba6f2dc9b7995a38c7d11a5028563e3b51f33180f49da
                                                                    • Instruction ID: 46ba8472ef444fdf6e0b1f0f179d7885b1af71fb15f535243467485baf1ca241
                                                                    • Opcode Fuzzy Hash: 43148d90905608da133ba6f2dc9b7995a38c7d11a5028563e3b51f33180f49da
                                                                    • Instruction Fuzzy Hash: 3E41E532B08646C6EF64AB15E8506BAF761FB84784F840435DECE43695DEFCE582C720
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork$Decorator::getTableTypebool_shared_ptr
                                                                    • String ID:
                                                                    • API String ID: 2413108386-0
                                                                    • Opcode ID: 860d05d0c23d945e2812b9969cd3f9d0f2eb79ac7c3eafe6dc3321d711d52ae6
                                                                    • Instruction ID: e7051b59068a3c5de9dd774eb80882c1e616cb29ccff1c57a1b5e9a55c977439
                                                                    • Opcode Fuzzy Hash: 860d05d0c23d945e2812b9969cd3f9d0f2eb79ac7c3eafe6dc3321d711d52ae6
                                                                    • Instruction Fuzzy Hash: 7EF1C33111CA458FD765EF28C859BFBB7E1FF99340F5049ADA089C72E2DAB09944CB42
                                                                    APIs
                                                                    • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001F7840BE0A3
                                                                    • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001F7840BE0B7
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840BE0D0
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840BE132
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840BE300
                                                                      • Part of subcall function 000001F784066020: Concurrency::details::_ReaderWriterLock::_ReaderWriterLock.LIBCMTD ref: 000001F78406602E
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840BE1B7
                                                                      • Part of subcall function 000001F784068FE0: std::error_condition::error_condition.LIBCPMTD ref: 000001F784068FFE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupReaderScheduleSegmentUnrealizedWriter$Concurrency::details::_LockLock::_std::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 3233732842-0
                                                                    • Opcode ID: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                                    • Instruction ID: 2664d1e4b8ba818bd94546c1f0bc1f37211bec4838357165c1d9fa555fefcabd
                                                                    • Opcode Fuzzy Hash: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                                    • Instruction Fuzzy Hash: D7F18F3011C7898FD7A4EF28C459BEBB7E1FB95340F5048ADA58DC32D2DEB499458B42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::$Base::ContextIdentityQueueWork$Affinity::operator!=HardwareList
                                                                    • String ID:
                                                                    • API String ID: 2242293343-0
                                                                    • Opcode ID: 88a63c18065b4d406e2cb50c44761dcb7cf26b639b903796a9ee2bdb5b598967
                                                                    • Instruction ID: 8fc4a045b34ccdd8a03a057f73fc24b34dc52dc2e03449e81d10aa001df17fff
                                                                    • Opcode Fuzzy Hash: 88a63c18065b4d406e2cb50c44761dcb7cf26b639b903796a9ee2bdb5b598967
                                                                    • Instruction Fuzzy Hash: C941203011CA498FD794EF28D859BEBB7E0FBA4341F80496DA089D32D2EEB4D944C742
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                    • String ID:
                                                                    • API String ID: 1588182640-0
                                                                    • Opcode ID: aeb162027570cbcb45857eaeecfccc621a0a56d2e3941c5bc9fa514a50d9ad9c
                                                                    • Instruction ID: c1b18d0d621b013c4702a3a1d6e79531ac2f3895e8203bbf8abf7e6bdc7afb33
                                                                    • Opcode Fuzzy Hash: aeb162027570cbcb45857eaeecfccc621a0a56d2e3941c5bc9fa514a50d9ad9c
                                                                    • Instruction Fuzzy Hash: EF31783061CB898FDA94EF28C459BAFB7E1FB99380F50496DA48DC3292DA70D845C752
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$C610F020F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$p < end()$p >= begin() && p < end()
                                                                    • API String ID: 310658293-1901453082
                                                                    • Opcode ID: 9aee298ee965694e484d48163432ec4cc781f88492cc277dff30295049130940
                                                                    • Instruction ID: b8ebff675e86648feee53dd29231bfc39f39a009ef26bd433882b0f34cdfe0e7
                                                                    • Opcode Fuzzy Hash: 9aee298ee965694e484d48163432ec4cc781f88492cc277dff30295049130940
                                                                    • Instruction Fuzzy Hash: 8981EE72B04A82D2EF58AB14DA496A8F3A5FB44B84F884136CE4D473A4EFBCE555C710
                                                                    APIs
                                                                    Strings
                                                                    • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF762AC13DA
                                                                    • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF762AC13D3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                                    • API String ID: 1173767890-3599239301
                                                                    • Opcode ID: a32acda8ac8af02c719bca1bcece888833a57668d5cda898378eef80b58275bd
                                                                    • Instruction ID: f81e93ace21217132651e856d406ac7a060a73f53a5cb2debea1723c155ed0fe
                                                                    • Opcode Fuzzy Hash: a32acda8ac8af02c719bca1bcece888833a57668d5cda898378eef80b58275bd
                                                                    • Instruction Fuzzy Hash: 6361A0B2B09A46D6DF85EF14E1546BCB3B0FB14B84B948226CB1E43364DFB8D56AC740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$C6118950$C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$filename && mode
                                                                    • API String ID: 3653100989-1878659873
                                                                    • Opcode ID: f2c59e7ee1b2eeed8209b2d3b8f89095980b2d1d2566467a124b1568a8a534f6
                                                                    • Instruction ID: 6df993e1d39086819258e18b2f87203c8076d9952b9b57a098c33b82c251e976
                                                                    • Opcode Fuzzy Hash: f2c59e7ee1b2eeed8209b2d3b8f89095980b2d1d2566467a124b1568a8a534f6
                                                                    • Instruction Fuzzy Hash: BA41A321A19A42C1EF98FF16A844678E3A4EF94B94BA44132DD4E47B94DFFCE856C310
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Capture$ExtraInfoMessage
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                    • API String ID: 2172523684-3890275027
                                                                    • Opcode ID: 923c053ce066281c7ac671ef25c172f5d6b9f676048f14a3257d116d11b5ca04
                                                                    • Instruction ID: f948ad0e4510626de87e20c4b626ece3ca6bb69c24254ff9152aab786d7b6186
                                                                    • Opcode Fuzzy Hash: 923c053ce066281c7ac671ef25c172f5d6b9f676048f14a3257d116d11b5ca04
                                                                    • Instruction Fuzzy Hash: 8C210CB6605A42C2EB91DB25D400AB9B394FF44BA4FC00131DE6D47394DFB8E947D750
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: printf
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$[%05d] $[%s] [%05d]
                                                                    • API String ID: 3524737521-3476604433
                                                                    • Opcode ID: 3791ea77b646f4efedb4acf6e20016a352b3f2d24d4217499d1552f2091f9011
                                                                    • Instruction ID: 1b801a95c66da64424f6de0befaa52b521941c8c84731ac76e46880affb662ed
                                                                    • Opcode Fuzzy Hash: 3791ea77b646f4efedb4acf6e20016a352b3f2d24d4217499d1552f2091f9011
                                                                    • Instruction Fuzzy Hash: FD21C172A04A42D5EF50AF12F8449EAE7A1FB44785F844036EE8D53664CFBCE845C710
                                                                    APIs
                                                                    Strings
                                                                    • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF762ADFAAA
                                                                    • C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp, xrefs: 00007FF762ADFA84
                                                                    • GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?", xrefs: 00007FF762ADFAB1
                                                                    • bd != nullptr && "No platform backend to shutdown, or already shutdown?", xrefs: 00007FF762ADFA8B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "No platform backend to shutdown, or already shutdown?"
                                                                    • API String ID: 3664257935-1332676508
                                                                    • Opcode ID: 8892cb04782d5aeb6a338803f32bc4cec3f8f323c030194c26ef7242e1d1625e
                                                                    • Instruction ID: dac4038d3e9f608642e6265fe1175bac6e9cc5faa751db0d7240cd24505c338b
                                                                    • Opcode Fuzzy Hash: 8892cb04782d5aeb6a338803f32bc4cec3f8f323c030194c26ef7242e1d1625e
                                                                    • Instruction Fuzzy Hash: 47315E31A09A42D2EF94AF15E840A78B7A0FB54B84F88853ADE4D47774DFACE466C350
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: Capture$ExtraInfoMessageRelease
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                    • API String ID: 1767768705-3890275027
                                                                    • Opcode ID: cb19a9e6c1605ae45a3bbd78077dd2cfbef91a2a50fb1b9c956a217acb42d625
                                                                    • Instruction ID: 1b939758eabae3dc35c3925044e0b542c052900e4c898c680fcbe6f6c45a5ece
                                                                    • Opcode Fuzzy Hash: cb19a9e6c1605ae45a3bbd78077dd2cfbef91a2a50fb1b9c956a217acb42d625
                                                                    • Instruction Fuzzy Hash: 8E213462A15A52D2EF91AB65D400AB9A2A1FB84BD4FC00031CD8F07394CFFCE847D320
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$Base::ChoresConcurrency::details::Func_classGroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 831135708-0
                                                                    • Opcode ID: 63f4ccc0c719f990fd2cecc369a8989cbc0d16d11778b62a075870b531d386af
                                                                    • Instruction ID: 6b48805ae326247b1cee9fd8a12b9fcfba67f74a6ded18d7bfbc334ff2e5e44b
                                                                    • Opcode Fuzzy Hash: 63f4ccc0c719f990fd2cecc369a8989cbc0d16d11778b62a075870b531d386af
                                                                    • Instruction Fuzzy Hash: 00F1453111CB498FE7A5EF24C859BEBB2E1FB94340F9049BDA44DC32D2DE7899458B42
                                                                    APIs
                                                                    • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001F7840A27C5
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840A2810
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840A2904
                                                                    • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001F7840A2BB3
                                                                      • Part of subcall function 000001F7840AF6A0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001F7840AF6CB
                                                                    • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001F7840A2C8E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::$Scheduler$ProcessorProxyRoot::Virtual$Base::ChoresConcurrency::details::_EmptyGroupQueue::ScheduleScheduler::_SegmentStructuredUnrealizedWorkstd::make_error_code
                                                                    • String ID:
                                                                    • API String ID: 1866601945-0
                                                                    • Opcode ID: 1c48c8f7abf4ee09f37d3fb5ff55bc5fc80e92da85bd99eabbe83459b1591442
                                                                    • Instruction ID: be78eb4e49e98f6d14213721f5e50ec59abc1ec48d228a18e71ccf81f5ed2eb5
                                                                    • Opcode Fuzzy Hash: 1c48c8f7abf4ee09f37d3fb5ff55bc5fc80e92da85bd99eabbe83459b1591442
                                                                    • Instruction Fuzzy Hash: 86F1EF3161CB498FE7A5EF28C459BEBB3E1FB98340F40496EA48DC3291DE749585CB42
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 28bcf8cbf4f9d8ee0fb80cf63995194d2d98c00cad99854f8db27e055435d40e
                                                                    • Instruction ID: ef64274676969d92eb79650a16acb4839a6510eb330a58c049ccb7217d5f29ce
                                                                    • Opcode Fuzzy Hash: 28bcf8cbf4f9d8ee0fb80cf63995194d2d98c00cad99854f8db27e055435d40e
                                                                    • Instruction Fuzzy Hash: ABB1C23011CA898FDBA4EF18C495FAAB7E1FBD8345F50495DA08EC72A1DB70D881CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: fpos
                                                                    • String ID:
                                                                    • API String ID: 1083263101-0
                                                                    • Opcode ID: 3f23ec98ed8d0db8145a29062c11fbcc78a6c96a5bf2dc5e6165215fd931549f
                                                                    • Instruction ID: f6e2ca325930c72aa9f4b0f919d3b92431a01a86c485443f7ba2a3331e5144c5
                                                                    • Opcode Fuzzy Hash: 3f23ec98ed8d0db8145a29062c11fbcc78a6c96a5bf2dc5e6165215fd931549f
                                                                    • Instruction Fuzzy Hash: 3EB1CC3021CB898FD7A4DF18C959BAAB7E0FBA9355F54096DA4DAC32D0D7B4D844CB02
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 1851498522-0
                                                                    • Opcode ID: 216af3604e034a8d617a86ff12bb7c94723bc8f844cd3d72ff026fb2d344c1b4
                                                                    • Instruction ID: 023b0c3ba42341dfdbaa90f566f59ed66ad21b42f7ac557ac7bfbb6da8724e7f
                                                                    • Opcode Fuzzy Hash: 216af3604e034a8d617a86ff12bb7c94723bc8f844cd3d72ff026fb2d344c1b4
                                                                    • Instruction Fuzzy Hash: 90A14F3111CB4A8BE765EF54C449BFFB3E1FB94394F400AADA08AC21E1DEB4D9458782
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$std::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 2527301759-0
                                                                    • Opcode ID: 52cd85fabb40296642562d013464caab3b67d2761199756b925dca6721a50769
                                                                    • Instruction ID: 006790f53f667cea36cc70de251c14a5df69b05f3f1b53bd1d0955138993e8ef
                                                                    • Opcode Fuzzy Hash: 52cd85fabb40296642562d013464caab3b67d2761199756b925dca6721a50769
                                                                    • Instruction Fuzzy Hash: 0D91F23111C7899BE365EF24C459BEBB7E1FBD4380F40596DA08AC71E2DEB09944CB46
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Mailbox
                                                                    • String ID:
                                                                    • API String ID: 1763892119-0
                                                                    • Opcode ID: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                                    • Instruction ID: d6555532b3aab4f41d8dfe185c6cf3cb7e7f5b5fa82cbbe5415a0df94a168c60
                                                                    • Opcode Fuzzy Hash: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                                    • Instruction Fuzzy Hash: BF61433150CA898FD7A5EA18C458BFBB7E1FBA8345F400A6EA48AD3291DE71D944C743
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::_SchedulerScheduler::_$std::error_condition::error_condition$std::bad_exception::bad_exception
                                                                    • String ID:
                                                                    • API String ID: 3801495819-0
                                                                    • Opcode ID: 855e9fad3cf8b62679a3ed4dce5103e3daddbb4618be66b587f956b2a1f93412
                                                                    • Instruction ID: 323c83042bc52633af99a4b8f4b4c7b2df3734c36fb4d782aabf032f45524b4b
                                                                    • Opcode Fuzzy Hash: 855e9fad3cf8b62679a3ed4dce5103e3daddbb4618be66b587f956b2a1f93412
                                                                    • Instruction Fuzzy Hash: 3061FA3461CB498FD7A4EF28C488BEAB7E1FB98350F50896DE089C7291DB74D845CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork__crt_scoped_stack_ptr$Decorator::getTableTypeshared_ptr
                                                                    • String ID:
                                                                    • API String ID: 2480882750-0
                                                                    • Opcode ID: 91d403a99b0aa0b9c84ca8b623b580e6659b45cf93c11dcecb02eb8a3e2d9174
                                                                    • Instruction ID: cc0f4da5c3b45d747d27ccf7937594ea9216ea1daa9e820ebf94d2575b4ee35a
                                                                    • Opcode Fuzzy Hash: 91d403a99b0aa0b9c84ca8b623b580e6659b45cf93c11dcecb02eb8a3e2d9174
                                                                    • Instruction Fuzzy Hash: CB61E03051CB498FD7A4EF28C449BABB7E0FB98341F50496EA48DC32A1DB75D885CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork__crt_scoped_stack_ptr$Decorator::getTableTypeshared_ptr
                                                                    • String ID:
                                                                    • API String ID: 2480882750-0
                                                                    • Opcode ID: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                                    • Instruction ID: 11eed52d6dcbc33679b0df2b6677730aba2d392d702290411ea28d305297f1d0
                                                                    • Opcode Fuzzy Hash: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                                    • Instruction Fuzzy Hash: E961D07051CB498FD7A4EF28C449BABB7E0FB98341F50496EA48DC32A1DB75D885CB42
                                                                    APIs
                                                                    • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001F7840BFF83
                                                                    • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001F7840BFF97
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840BFFB0
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840C0003
                                                                      • Part of subcall function 000001F784066020: Concurrency::details::_ReaderWriterLock::_ReaderWriterLock.LIBCMTD ref: 000001F78406602E
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840C0067
                                                                      • Part of subcall function 000001F784068FE0: std::error_condition::error_condition.LIBCPMTD ref: 000001F784068FFE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupReaderScheduleSegmentUnrealizedWriter$Concurrency::details::_LockLock::_std::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 3233732842-0
                                                                    • Opcode ID: 8fc910353a04408718612e5cf30e4eda843c1b23e99fc2a10d87dd0fa77c1dfc
                                                                    • Instruction ID: afae80953270a59023e53f9d9c0a61d6f50e05d13fc57e74546e6ab101b85c9e
                                                                    • Opcode Fuzzy Hash: 8fc910353a04408718612e5cf30e4eda843c1b23e99fc2a10d87dd0fa77c1dfc
                                                                    • Instruction Fuzzy Hash: 4B51AF3011D6498BE2A4EF18C959BEBB3E1FB94340F5045BDA48DC32E2DEB49845CB46
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_conditiontype_info::_name_internal_method
                                                                    • String ID:
                                                                    • API String ID: 2306575402-0
                                                                    • Opcode ID: 4b51986160a4cd423a99c67445d446e796d3c0d4e65a0d82bc8bd3ca371d903f
                                                                    • Instruction ID: ac58d3de87420046e5a6312a2be1ef710e47f1a16d2bc13d0502df9f89ba3694
                                                                    • Opcode Fuzzy Hash: 4b51986160a4cd423a99c67445d446e796d3c0d4e65a0d82bc8bd3ca371d903f
                                                                    • Instruction Fuzzy Hash: F651723021C7468BE760EF64C4557FBB7E1FB84394F504AADA08AD61D2EAB4D904DB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$00007C610F020
                                                                    • String ID:
                                                                    • API String ID: 1061835773-0
                                                                    • Opcode ID: 238211e2dd296852fc445dc02d55ac6e72dd57f90259a6a8d4c8cb9abac53d7c
                                                                    • Instruction ID: dc2dd41d72fd2025ce6f888db7038cc0a3e19708c270d156f943779abee28049
                                                                    • Opcode Fuzzy Hash: 238211e2dd296852fc445dc02d55ac6e72dd57f90259a6a8d4c8cb9abac53d7c
                                                                    • Instruction Fuzzy Hash: 5B411132A08F4182D764EF16B8404A9B7A5FB88BD4F488236DE4D07BA4DF7CC55AC300
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                    • String ID:
                                                                    • API String ID: 1588182640-0
                                                                    • Opcode ID: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                                    • Instruction ID: e52a8c4610212de315c4c1066368902d0bfcea86be74981e6834e23bec912e41
                                                                    • Opcode Fuzzy Hash: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                                    • Instruction Fuzzy Hash: 1D219F3061CB898FD6A4FF28C4597AFB7E1FBD8340F50496DA08DC3292DA70D8458752
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                    • String ID:
                                                                    • API String ID: 1588182640-0
                                                                    • Opcode ID: 815c5ab9791d234820be11a13cdb67723ff592c1cb60b69b78e51ea6d37036d7
                                                                    • Instruction ID: dce5d24c2d0324f7f35c60b56fe7379b4d946a3d1fe653bdc7722c5b4bab68bf
                                                                    • Opcode Fuzzy Hash: 815c5ab9791d234820be11a13cdb67723ff592c1cb60b69b78e51ea6d37036d7
                                                                    • Instruction Fuzzy Hash: 88216E3061CB498FD6A4FF28C4597AFB7E1FBD8340F90496DA48DC3292DA74D8458752
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_conditiontype_info::_name_internal_method
                                                                    • String ID:
                                                                    • API String ID: 2306575402-0
                                                                    • Opcode ID: 18c570fd0deab407a0f837e49046f6b791d582b1a6d6ce112fe98874db57e66e
                                                                    • Instruction ID: cae530a8932b8ecaa4f3d66ec9bf0fef5ea0b201b0f1015c6e2afa4615f75c33
                                                                    • Opcode Fuzzy Hash: 18c570fd0deab407a0f837e49046f6b791d582b1a6d6ce112fe98874db57e66e
                                                                    • Instruction Fuzzy Hash: 8F21FE3021CB4A9BE645EF24C459BFBB6E2FBC4380F4049BDA085C72E6DAA4D941D785
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: shared_ptr$allocator$Affinity::operator!=Concurrency::details::Hardware
                                                                    • String ID:
                                                                    • API String ID: 1053258265-0
                                                                    • Opcode ID: 731d90d100de80035144f11b9cbff0f6121979b4b1cf63ee1738207ad95db791
                                                                    • Instruction ID: cd9d29225a666a782e64e9f8a27ebd9db77c42bfae1c27c6c120877e3b524a6c
                                                                    • Opcode Fuzzy Hash: 731d90d100de80035144f11b9cbff0f6121979b4b1cf63ee1738207ad95db791
                                                                    • Instruction Fuzzy Hash: 59111F7051CB498FD7A0EF28C4497EBBBE1FBD8391F404A6DA48DD3291DA70D9458B82
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$char_traits
                                                                    • String ID:
                                                                    • API String ID: 2432257368-3916222277
                                                                    • Opcode ID: fc3064d62a3cd5194dff096c9fc33b5f2c68b979ee5dc823d586b5ed394c8f21
                                                                    • Instruction ID: a8dc189f52fea1c8db7d9c67383f56e2c6775d617e532b7d6b853a88d8751aad
                                                                    • Opcode Fuzzy Hash: fc3064d62a3cd5194dff096c9fc33b5f2c68b979ee5dc823d586b5ed394c8f21
                                                                    • Instruction Fuzzy Hash: DEC1DA3152CB898BE765EF28C459BEBB3E1FB98344F410A6DA08AD31D1DF749944CB42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: #MOVE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                    • API String ID: 2490902527-319756798
                                                                    • Opcode ID: a965c5a7e196307ce80f4d594ba493067b977d02000f34dec74c3b5a605e1374
                                                                    • Instruction ID: 511f3ea786aa31f289bd23bd17e5086fe18cfd1f48b52a1ddb47eaba9df684ce
                                                                    • Opcode Fuzzy Hash: a965c5a7e196307ce80f4d594ba493067b977d02000f34dec74c3b5a605e1374
                                                                    • Instruction Fuzzy Hash: 07D15B32606BC1DAD754DF29E98879CB7A8F305B14FA94239CBA8073A0DF75E062C714
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840A374F
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840A37BB
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840A3815
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                    • String ID: e
                                                                    • API String ID: 1865873047-4024072794
                                                                    • Opcode ID: a5aedeaa2a5e8da9842271219853bb447ad559dd74de6758b306763cffed3ded
                                                                    • Instruction ID: 2cbcd14609841b0089a89376ae665c15db3008233721c57962d369bbe2811b74
                                                                    • Opcode Fuzzy Hash: a5aedeaa2a5e8da9842271219853bb447ad559dd74de6758b306763cffed3ded
                                                                    • Instruction Fuzzy Hash: AE611D3151CB458FE794EF68C489BABB7E1FB98341F50096EE18AC72A1D7B4D841CB12
                                                                    APIs
                                                                    • 00007FF8B9F61310.VCRUNTIME140(00000000,?,00000000,000001F7FF821C00,00007FF762AB0EC1,?,?,00000000,00007FF762A99F9A), ref: 00007FF762AB114C
                                                                    • 00007FF8B9F61310.VCRUNTIME140 ref: 00007FF762AB12A7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$g.Initialized
                                                                    • API String ID: 2490902527-1422301356
                                                                    • Opcode ID: 3e9c344c1d301b24d002604c38042e59a87773ff59d66f59d2992e4b1af52429
                                                                    • Instruction ID: 4c94c0471f4388934e68b8dcf2426c4641e6b32936c86c28fe5311c2d5185e48
                                                                    • Opcode Fuzzy Hash: 3e9c344c1d301b24d002604c38042e59a87773ff59d66f59d2992e4b1af52429
                                                                    • Instruction Fuzzy Hash: C0612B52F0D682C5EF91AA15A808ABAE791AB41BC6FC84535CE5C87385EEFCD445C720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Subatomic
                                                                    • String ID: d
                                                                    • API String ID: 3648745215-2564639436
                                                                    • Opcode ID: 54bdeb58da35ab94bcf85085278a1c4949db9dfd6b8a7e539e187413d69c00dd
                                                                    • Instruction ID: 1ca2a72b66b8839664c6db52d04ffc1b02b10a9d86125bcfb6db3a401f34bd63
                                                                    • Opcode Fuzzy Hash: 54bdeb58da35ab94bcf85085278a1c4949db9dfd6b8a7e539e187413d69c00dd
                                                                    • Instruction Fuzzy Hash: 1541F27021DB489FD754EF28C44D7ABB7E2FB99345F40596EA08AD3260DBB4D5408B42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiUnicodeWideWindow
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                    • API String ID: 3417139564-3890275027
                                                                    • Opcode ID: d9a610a5f53e9fa10297ec8690aded1cef327910e5f6d708596898dc3a383a64
                                                                    • Instruction ID: e91e2ba90eebd7ce25918c69cde377a735b784f675a063703aac0af2b4b1c254
                                                                    • Opcode Fuzzy Hash: d9a610a5f53e9fa10297ec8690aded1cef327910e5f6d708596898dc3a383a64
                                                                    • Instruction Fuzzy Hash: 0651D522B18652D6EBA5DF24C450AB9A3A1FB44B48F984036DE8D47A84DFFCDC47D720
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                                    • API String ID: 1173767890-3599239301
                                                                    • Opcode ID: e21a51cd6fc816a2bd9147ba443e1185ee90a422f277b73c4d41c78987587b6a
                                                                    • Instruction ID: c8df96538cb0b3b3a34f5bfeb162e7d1529911b753f6e42c00f8ae05ccee70be
                                                                    • Opcode Fuzzy Hash: e21a51cd6fc816a2bd9147ba443e1185ee90a422f277b73c4d41c78987587b6a
                                                                    • Instruction Fuzzy Hash: 6F51BA72A08A82C2DF84EF14E4549BCB3B4FB58B81B984236CE4E43660DFBCD596C740
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784054AD0
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F784054B2F
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784054B41
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_
                                                                    • String ID:
                                                                    • API String ID: 991905282-3916222277
                                                                    • Opcode ID: 36a22229416e564e8440cefac388c07ecd404f3bbc27db4e377a02a1a41e44dc
                                                                    • Instruction ID: 08fbd319a26adb4e2e50d532633b4fd178aaead3690951608fe1be7639554aa6
                                                                    • Opcode Fuzzy Hash: 36a22229416e564e8440cefac388c07ecd404f3bbc27db4e377a02a1a41e44dc
                                                                    • Instruction Fuzzy Hash: 9041E730118B458FE394EF28C4997ABBBE0FB84345F91596DB4D9D22A1CBB09845CB42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$i >= 0 && i < Size
                                                                    • API String ID: 2490902527-3833649686
                                                                    • Opcode ID: 2d656bff229cbb4746685fbfad4308eb7320790fdcd0fb319f4a17860adbbdb5
                                                                    • Instruction ID: 59341679b87f4926cea7cb36f1506a79069ef30e571a5fe5f293c583b22e510e
                                                                    • Opcode Fuzzy Hash: 2d656bff229cbb4746685fbfad4308eb7320790fdcd0fb319f4a17860adbbdb5
                                                                    • Instruction Fuzzy Hash: 95415171A14A86D2EF94AB11E4809E9E765FF94B84F840135DEDE43A64CFECF249C360
                                                                    APIs
                                                                    Strings
                                                                    • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF762AC1640
                                                                    • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF762AC1639
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                                    • API String ID: 1173767890-3599239301
                                                                    • Opcode ID: cb5a36fee1d6425d1c033b334fafb6d3c66ff7acfe97189d89c7330356846d2d
                                                                    • Instruction ID: d5a86cfbbc0aa060f11a063e46315c8aa0f006121fa37e1ced168a655108a0e7
                                                                    • Opcode Fuzzy Hash: cb5a36fee1d6425d1c033b334fafb6d3c66ff7acfe97189d89c7330356846d2d
                                                                    • Instruction Fuzzy Hash: CB31D173709A42C6CB85EF18D4954B8B3B5FB14B84B984237CA0E43364DFB8C5AAC740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$std::error_condition::error_condition
                                                                    • String ID: }
                                                                    • API String ID: 2527301759-4239843852
                                                                    • Opcode ID: be98c45c2635ea1b7c099d9ee1afc8aab728c4e80a3655f5ac3be0dc2360b2bb
                                                                    • Instruction ID: 69e2f8b12d5fe69b83159e6bd084cff0b3954f69a96f6e9eba50f21d3d718a56
                                                                    • Opcode Fuzzy Hash: be98c45c2635ea1b7c099d9ee1afc8aab728c4e80a3655f5ac3be0dc2360b2bb
                                                                    • Instruction Fuzzy Hash: 8E212C3051C6868BE364DF58C0487ABBBE1FB85390F5009BDE08AC25E1D6B4C9809706
                                                                    APIs
                                                                      • Part of subcall function 000001F78405A170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78405A18D
                                                                      • Part of subcall function 000001F78405A110: char_traits.LIBCPMTD ref: 000001F78405A13D
                                                                    • type_info::_name_internal_method.LIBCMTD ref: 000001F784117A14
                                                                      • Part of subcall function 000001F784139E50: type_info::_name_internal_method.LIBCMTD ref: 000001F784139EF0
                                                                      • Part of subcall function 000001F784139E50: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784139F56
                                                                      • Part of subcall function 000001F784139E50: CreateFileA.KERNEL32 ref: 000001F784139F82
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001F784117AE4
                                                                      • Part of subcall function 000001F784055180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784055217
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::$EmptyQueue::StructuredWork$type_info::_name_internal_method$Affinity::operator!=CreateFileHardwarechar_traits
                                                                    • String ID:
                                                                    • API String ID: 2370075206-0
                                                                    • Opcode ID: a65eba7b441e30818a227a1c83e82e3293a1d35dbeeb2e9a63ea877c5ac8c65b
                                                                    • Instruction ID: 7a89a474d6b3adc4596e829e814e38a04cef1f69782d0ff6ae4c6d53d3b7b342
                                                                    • Opcode Fuzzy Hash: a65eba7b441e30818a227a1c83e82e3293a1d35dbeeb2e9a63ea877c5ac8c65b
                                                                    • Instruction Fuzzy Hash: A3020F3112CA498AE365FF24C459BEBB7E0FB94344F5149BEA08AD31E2DE709945CB42
                                                                    APIs
                                                                    • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001F7840B3951
                                                                      • Part of subcall function 000001F784082880: _Ptr_base.LIBCMTD ref: 000001F784082893
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Base::ChoresConcurrency::details::GroupPtr_baseScheduleSegmentUnrealized
                                                                    • String ID:
                                                                    • API String ID: 3333744592-0
                                                                    • Opcode ID: 570f11bbdc05f9da95d07b3fdbdb974941727138929f366d8f2bea2d8099bd35
                                                                    • Instruction ID: e6b22028a668ba29e1922e1f400f5aa2266dbf572eb017203efe9d035cf7df30
                                                                    • Opcode Fuzzy Hash: 570f11bbdc05f9da95d07b3fdbdb974941727138929f366d8f2bea2d8099bd35
                                                                    • Instruction Fuzzy Hash: 0CF1CE3111CB8D8FE7A5EF18C859BEBB3E1FB98340F50496EA48DC3295DAB495448B42
                                                                    APIs
                                                                    • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001F7840A5917
                                                                    • std::make_error_code.LIBCPMTD ref: 000001F7840A5992
                                                                    • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001F7840A5B1C
                                                                      • Part of subcall function 000001F7840AF870: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001F7840AF8CD
                                                                      • Part of subcall function 000001F7840AF870: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001F7840AF8E4
                                                                    • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001F7840A5CAB
                                                                      • Part of subcall function 000001F784086BC0: char_traits.LIBCPMTD ref: 000001F784086BE0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Scheduler$Concurrency::details::$Concurrency::details::_ProcessorProxyRoot::Scheduler::_Virtual$Base::ChoresGroupScheduleSegmentUnrealizedchar_traitsstd::make_error_code
                                                                    • String ID:
                                                                    • API String ID: 3113402709-0
                                                                    • Opcode ID: 8315beeaeb721658927f8f770d131a9c147b9258a1641d469c0d50eda48e832c
                                                                    • Instruction ID: 55de320805da6e1214a7ae37b9354210e6ca19ef5362a46ebc5b0467c7f34ce5
                                                                    • Opcode Fuzzy Hash: 8315beeaeb721658927f8f770d131a9c147b9258a1641d469c0d50eda48e832c
                                                                    • Instruction Fuzzy Hash: 08C10E3151CB4D8FE7A5EB28C459BEBB3E1FBA8340F40096E948EC3291DE749945CB42
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784062CA2
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784062E63
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784062E78
                                                                      • Part of subcall function 000001F78405B170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78405B17E
                                                                      • Part of subcall function 000001F78405B170: _Max_value.LIBCPMTD ref: 000001F78405B1A3
                                                                      • Part of subcall function 000001F78405B170: _Min_value.LIBCPMTD ref: 000001F78405B1D1
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F784062FB7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                                                                    • String ID:
                                                                    • API String ID: 348937374-0
                                                                    • Opcode ID: 9076abe83797b2f5b95f51d9a62a17b5c4646a91e0ea6bac038e2092eb8d8266
                                                                    • Instruction ID: f67cb720acb70ba312f58efd95b34bda4ed24c66846e433c6bbf60c475877219
                                                                    • Opcode Fuzzy Hash: 9076abe83797b2f5b95f51d9a62a17b5c4646a91e0ea6bac038e2092eb8d8266
                                                                    • Instruction Fuzzy Hash: DCD1AE3061CB898FD7A4EF18C459BABB7E1FBE8345F41496DA08DD32A1DA70D941CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 246976077-0
                                                                    • Opcode ID: 5f3126eda9a4eb9af231d5239096d653e2129c4e3c35e502a72c1b9b8bd3846d
                                                                    • Instruction ID: 6588452c80310f04b5e3f47a3d805fb2d420431a25237e7a4bfb7891f945311f
                                                                    • Opcode Fuzzy Hash: 5f3126eda9a4eb9af231d5239096d653e2129c4e3c35e502a72c1b9b8bd3846d
                                                                    • Instruction Fuzzy Hash: B5C1023021CB498FE7A5EF28C455BEBB7E1FB98350F50496DA08AC3291DB75D941CB42
                                                                    APIs
                                                                    • UnDecorator::getVbTableType.LIBCMTD ref: 000001F7840C1564
                                                                      • Part of subcall function 000001F7840950A0: char_traits.LIBCPMTD ref: 000001F7840950C1
                                                                    • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001F7840C15C1
                                                                      • Part of subcall function 000001F7840CA0F0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001F7840CA112
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Scheduler$Concurrency::details::Concurrency::details::_Decorator::getProcessorProxyRoot::Scheduler::_TableTypeVirtualchar_traits
                                                                    • String ID:
                                                                    • API String ID: 1673230147-0
                                                                    • Opcode ID: 54f13db51325af36e86bb9f0e7cfac0249b4394f15ed719d382bbe191eb23ca8
                                                                    • Instruction ID: fa05d74e8d0885f310f9d519322be8fa3655b4d06f0c6f37d5eb867bc47d5e79
                                                                    • Opcode Fuzzy Hash: 54f13db51325af36e86bb9f0e7cfac0249b4394f15ed719d382bbe191eb23ca8
                                                                    • Instruction Fuzzy Hash: 0CC1B87051CB898FE7A4EF18C489BEBB7E1FBA8340F50496E948DC3291DB749484CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 1046759889-0
                                                                    • Opcode ID: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                                    • Instruction ID: f838742ef28bed9be7c693d88ee1842c685b191b2ab651971706e706084fa943
                                                                    • Opcode Fuzzy Hash: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                                    • Instruction Fuzzy Hash: 31B1AB3051CB898FD6A4EF28C459BEBB7E1FB98340F5049ADA48DC32D2DE719845CB42
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 34be266543894efc96d51f676f5f1ca7cc37a58dd76303ca975cdefcda27a6da
                                                                    • Instruction ID: 4c113ae6aff1093a28845b7e09708968096d3f8908304c6142efff9f832f0d69
                                                                    • Opcode Fuzzy Hash: 34be266543894efc96d51f676f5f1ca7cc37a58dd76303ca975cdefcda27a6da
                                                                    • Instruction Fuzzy Hash: 8991F03011CA498FDB94EF18C495FAAB7F1FBE9344F50495DA08EC72A2DA70E941CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::make_error_code$std::error_condition::error_condition
                                                                    • String ID:
                                                                    • API String ID: 2527301759-0
                                                                    • Opcode ID: 58c7311be2cb89b8753877e7c75642fcbb82317ee9f238dba1156d6b4c2a68d4
                                                                    • Instruction ID: eda055f2970667c09e8e4a848995be3a94c866a967ce3330470e657efa8b927c
                                                                    • Opcode Fuzzy Hash: 58c7311be2cb89b8753877e7c75642fcbb82317ee9f238dba1156d6b4c2a68d4
                                                                    • Instruction Fuzzy Hash: 5081D03051CA8A8BE7A5EF18C459BFFB7E1FB94340F5049ADA08AC21E1DA749845DB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: fpos
                                                                    • String ID:
                                                                    • API String ID: 1083263101-0
                                                                    • Opcode ID: a06c74410f647526738439c1d7a2df2a66b16ccba1c99b2313f6c08277eab004
                                                                    • Instruction ID: 39ac4e16dfc7ce28b71d6b054820814e7000b1a127cfd0cfb49e6a1912626f09
                                                                    • Opcode Fuzzy Hash: a06c74410f647526738439c1d7a2df2a66b16ccba1c99b2313f6c08277eab004
                                                                    • Instruction Fuzzy Hash: BD81F93051CB498FE7A4DB28C949B6BBBE0FB98351F54496DB4D9C32A0C664D840CB02
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                                    • String ID:
                                                                    • API String ID: 1927102706-0
                                                                    • Opcode ID: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                                    • Instruction ID: dc62cd84b35b0e3645fe29c00466233d04fceeb667ff08fd901c92f035e47abf
                                                                    • Opcode Fuzzy Hash: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                                    • Instruction Fuzzy Hash: B271CD3015CB49CFE6B5EF28D459BEBB7E1FB98350F80096DA48DC3291DA74D9428742
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                                    • String ID:
                                                                    • API String ID: 1927102706-0
                                                                    • Opcode ID: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                                    • Instruction ID: 63e07fcfb8aaac22b30684f117ffb0001a3f9a86c67707856fc544821ea68a5a
                                                                    • Opcode Fuzzy Hash: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                                    • Instruction Fuzzy Hash: 21711E3011CA899FD6B1EF18C499BEBB3E1FB98350F40496DE489C3291DE74D9458B42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$Concurrency::details::EmptyQueue::StructuredWorkchar_traits
                                                                    • String ID:
                                                                    • API String ID: 1744367693-0
                                                                    • Opcode ID: 30ffffbc32562f55399461986d00f4272352037bfd5b746e90ae5d919702b9bf
                                                                    • Instruction ID: 5174eb7b60fbf20297c9b9ab0d023d95fe0e8b5b93d58df33ed608d5b705fbb4
                                                                    • Opcode Fuzzy Hash: 30ffffbc32562f55399461986d00f4272352037bfd5b746e90ae5d919702b9bf
                                                                    • Instruction Fuzzy Hash: C7512E3111CB859FE3A4EF18C449BABB7E1FB94344F401A6DA089D72E1EBB4D945CB42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID:
                                                                    • API String ID: 1173767890-0
                                                                    • Opcode ID: 87edbd7c1ca10c775655078cece7bcc32b684bf25203532633eabef71ff50005
                                                                    • Instruction ID: 5f185bfd5091ccc4b7b2e8da72d4df1778a1007f1b045dc35d3edc8baa414c93
                                                                    • Opcode Fuzzy Hash: 87edbd7c1ca10c775655078cece7bcc32b684bf25203532633eabef71ff50005
                                                                    • Instruction Fuzzy Hash: AA51A173619992C6CB89EF18D0954FCB3B1FB58B44B948227DA0E87260EFB8D55BC340
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::$Affinity::operator!=Base::ContextHardwareIdentityQueueWorkshared_ptr
                                                                    • String ID:
                                                                    • API String ID: 714649587-0
                                                                    • Opcode ID: 56e7f5989e768847083db759d86a7ebfa7ab74bda9f1653fe54440c5e8e10927
                                                                    • Instruction ID: 06427782c68565fc14b6a337ba2a1baebc7296052e42ab30479fd74e5fb134b1
                                                                    • Opcode Fuzzy Hash: 56e7f5989e768847083db759d86a7ebfa7ab74bda9f1653fe54440c5e8e10927
                                                                    • Instruction Fuzzy Hash: 9841DE3011CE498FEB94EF18C499BABB7E1FBA8345F50096DB089C72A1DB74D941CB42
                                                                    APIs
                                                                      • Part of subcall function 000001F78412FE90: _Byte_length.LIBCPMTD ref: 000001F78412FEFE
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F78412FD15
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F78412FD3E
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F78412FD75
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F78412FD9E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Byte_length
                                                                    • String ID:
                                                                    • API String ID: 1141060839-0
                                                                    • Opcode ID: a094d049b7394f019bb74d8a9ce6fa8793c3500efc0350374be82258551a5043
                                                                    • Instruction ID: c087189d01b985016b617732fea028f4ceaa2cec5fd060cf572c7540ce49b80d
                                                                    • Opcode Fuzzy Hash: a094d049b7394f019bb74d8a9ce6fa8793c3500efc0350374be82258551a5043
                                                                    • Instruction Fuzzy Hash: 6441E03051CB498FE754EF18C459BEBF7E0FB98341F50496EA089D32A1DE70A985CB42
                                                                    APIs
                                                                    • type_info::_name_internal_method.LIBCMTD ref: 000001F7840DD48B
                                                                      • Part of subcall function 000001F7840A76A0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 000001F7840A76B8
                                                                    • type_info::_name_internal_method.LIBCMTD ref: 000001F7840DD4AA
                                                                      • Part of subcall function 000001F7840D0D30: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 000001F7840D0D48
                                                                    • type_info::_name_internal_method.LIBCMTD ref: 000001F7840DD4C9
                                                                    • type_info::_name_internal_method.LIBCMTD ref: 000001F7840DD4E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                    • String ID:
                                                                    • API String ID: 1588182640-0
                                                                    • Opcode ID: 6ae970fd7b6ecd4af07a3924a38ebf6e4c6a300736612a1d38c72f7b099ca0b1
                                                                    • Instruction ID: 98c4cff1721f60d14f1c022c7681e7524bd4195c906d37d67d53d0e71b0bf8f4
                                                                    • Opcode Fuzzy Hash: 6ae970fd7b6ecd4af07a3924a38ebf6e4c6a300736612a1d38c72f7b099ca0b1
                                                                    • Instruction Fuzzy Hash: EB11913061CB498FD694FF38C4597AFBBE1FBD8380F50496DA089C32A2DA74D8458B52
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                    • String ID:
                                                                    • API String ID: 1588182640-0
                                                                    • Opcode ID: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                                    • Instruction ID: ca678fd46076b67a617779bba63c37a4483011ff794556cfbda5cc858c30f691
                                                                    • Opcode Fuzzy Hash: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                                    • Instruction Fuzzy Hash: 6A119F3061CB458FD694FF38C4597AFB7E1FBD8380F50496DA489C32A2DA74D8458B52
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                    • String ID:
                                                                    • API String ID: 1588182640-0
                                                                    • Opcode ID: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                                    • Instruction ID: ac63b6439eb72c3e684a0609526f9a7cf671f4c05e7b69eac58a96fc6401cb14
                                                                    • Opcode Fuzzy Hash: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                                    • Instruction Fuzzy Hash: 4A119F3061CB458FD694FF38C459BAFB7E1FBD8380F50496DA089C32A2DA74D8458B52
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Func_class
                                                                    • String ID:
                                                                    • API String ID: 1670654298-0
                                                                    • Opcode ID: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                                    • Instruction ID: e5d47621778b9eb37dccca9dbe5b2fa352e840583eb824c377c82a5a96f624de
                                                                    • Opcode Fuzzy Hash: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                                    • Instruction Fuzzy Hash: A011BF3061CA098FD684EF2CC98977B77E1FB99381F40496DB549C32F1DA65D841CB41
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840AEFAA
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840AEFBE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                    • String ID:
                                                                    • API String ID: 1865873047-0
                                                                    • Opcode ID: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                                    • Instruction ID: b5ef20eec5b6193832e8f5005fc4c24d1c132b02a45c5b37a58ebd855046bd82
                                                                    • Opcode Fuzzy Hash: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                                    • Instruction Fuzzy Hash: B501ED70178A5E8BD3D4DF29C8597BBB9D2FB84384FD0087DB549C22E1C6F9D8409652
                                                                    APIs
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840AEF0A
                                                                    • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840AEF1E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                    • String ID:
                                                                    • API String ID: 1865873047-0
                                                                    • Opcode ID: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                                    • Instruction ID: a95b93286523ffc852eb99e7a600136ec833b28374e533c8377e1429cfa4fa35
                                                                    • Opcode Fuzzy Hash: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                                    • Instruction Fuzzy Hash: F301ED70178B8A8BE3D5DF29C8987AF75D2FB84384F90096DA04DC22D0DAF9D8509652
                                                                    APIs
                                                                      • Part of subcall function 000001F784055360: _WChar_traits.LIBCPMTD ref: 000001F78405538D
                                                                      • Part of subcall function 000001F784054740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78405476C
                                                                      • Part of subcall function 000001F784054740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F78405477E
                                                                      • Part of subcall function 000001F784054740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001F7840547BB
                                                                      • Part of subcall function 000001F784054850: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F7840548B8
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001F78405412A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Concurrency::details::EmptyQueue::StructuredWork$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Char_traits
                                                                    • String ID: $X
                                                                    • API String ID: 1626164810-1398056850
                                                                    • Opcode ID: b7fe99cffcf7bd97a9e81d5aad9f532e1525070ba119c050f664d87821b138ec
                                                                    • Instruction ID: 8a6594bcde640a2bd82d5297ecde8115287b0f340f23a27e138886472b45a660
                                                                    • Opcode Fuzzy Hash: b7fe99cffcf7bd97a9e81d5aad9f532e1525070ba119c050f664d87821b138ec
                                                                    • Instruction Fuzzy Hash: 51D1897051CB898FD7A4EF28C4997EBB7E1FB98341F50496EA48DC3251DB749884CB42
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "$"
                                                                    • API String ID: 0-3758156766
                                                                    • Opcode ID: d9ca275203620766a00d06b5d65ade6f880f8bd0154771a424bc1f8235aa31d6
                                                                    • Instruction ID: ca38bcad1bd0ada80b5514022d57b4f6e6c2404ad39f1388751420968925b935
                                                                    • Opcode Fuzzy Hash: d9ca275203620766a00d06b5d65ade6f880f8bd0154771a424bc1f8235aa31d6
                                                                    • Instruction Fuzzy Hash: 1D71FC3111CB498AD795EF14C495FEBB7E1FBA8384F400AADB08AC31A2DA70D545CB82
                                                                    APIs
                                                                    • std::error_condition::error_condition.LIBCPMTD ref: 000001F784074CEA
                                                                      • Part of subcall function 000001F7840701A0: Concurrency::details::VirtualProcessor::ClaimTicket::InitializeTicket.LIBCMTD ref: 000001F7840701BD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4474425071.000001F784050000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F784050000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1f784050000_Nexus-Executor.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ClaimConcurrency::details::InitializeProcessor::TicketTicket::Virtualstd::error_condition::error_condition
                                                                    • String ID: @$@
                                                                    • API String ID: 2004282921-149943524
                                                                    • Opcode ID: 5d6c2f79357090950899d93de7d3641f261afb3f4bf2f8be1211dfb2002849bd
                                                                    • Instruction ID: 7698e3f87c4a8fd50674d2b784dddd83f3791bba4dd355fbc6b3b559b5a1a718
                                                                    • Opcode Fuzzy Hash: 5d6c2f79357090950899d93de7d3641f261afb3f4bf2f8be1211dfb2002849bd
                                                                    • Instruction Fuzzy Hash: 5951C47050D7498FE7A4EF58C488BBBB7E0FB95385F10496DE189C7290DBB298448B07
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C612
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$max_error > 0.0f
                                                                    • API String ID: 1428191659-3636960062
                                                                    • Opcode ID: 173fbfa97a9e8faf60806451bce5e775cbc6d79fbfbf66f348b23af2c050349d
                                                                    • Instruction ID: 7ba9f3f669af7986699541ac191507f035923c998bc20416f49fca6a3852de28
                                                                    • Opcode Fuzzy Hash: 173fbfa97a9e8faf60806451bce5e775cbc6d79fbfbf66f348b23af2c050349d
                                                                    • Instruction Fuzzy Hash: AD61D332D1878AC9E742AB3785416A9B790EF69744F5CC732EE49361A4DFA8B4C1C620
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$g.SettingsWindows.empty()
                                                                    • API String ID: 1173767890-1747592857
                                                                    • Opcode ID: 170e04b973949e5f49f0dbd9dc130716887260cca0c17508c06e4d01c7df8597
                                                                    • Instruction ID: 2789f48df6fdb05b478ebf7fc82933c0a6d105fcae9d84962316564f2a9295fb
                                                                    • Opcode Fuzzy Hash: 170e04b973949e5f49f0dbd9dc130716887260cca0c17508c06e4d01c7df8597
                                                                    • Instruction Fuzzy Hash: C941F432A19A82C5DF84EF21E5585B8B360FB54B85F984136EE4D07754DFBCE042C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                    • API String ID: 1173767890-1817040388
                                                                    • Opcode ID: 9a9350dd72d12d3fe3cdaffedce5434e64b06f0471b182a10d57f79dce085956
                                                                    • Instruction ID: 1d0aa985199c2b5b9a74db282c97ff64fa2b971d5b0e58c2945e94e66c9448c8
                                                                    • Opcode Fuzzy Hash: 9a9350dd72d12d3fe3cdaffedce5434e64b06f0471b182a10d57f79dce085956
                                                                    • Instruction Fuzzy Hash: 6741E332A18A82C2DF54EF15E4804A8F374FB54784B944136DF4D47BA0DFB8E5A6C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                    • API String ID: 1173767890-1817040388
                                                                    • Opcode ID: 8a08cfacd40c638483205b80b2c85210fff27a7fdd7df82892847bc392aadf12
                                                                    • Instruction ID: e77befc58e2fe92a71ee6567d50217b18eb2639d0204d3a659735b9c7eb19c36
                                                                    • Opcode Fuzzy Hash: 8a08cfacd40c638483205b80b2c85210fff27a7fdd7df82892847bc392aadf12
                                                                    • Instruction Fuzzy Hash: DA41E332A08A82C2DB44EF14E8945B8F374FB94B89B944132DE8D477A4DFBCE556C350
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                    • API String ID: 1173767890-1817040388
                                                                    • Opcode ID: cbd96c97ff7e78fc22fdf30f912b4748780d3bf07ba9c45d4c4a176889ab244b
                                                                    • Instruction ID: f18a949ffb28cc824aab4e0b28f91519bdf520f7010a443a7aba06eff17cb980
                                                                    • Opcode Fuzzy Hash: cbd96c97ff7e78fc22fdf30f912b4748780d3bf07ba9c45d4c4a176889ab244b
                                                                    • Instruction Fuzzy Hash: 48319F72A08A96C2DF44EF24D4804A8B3A4FB84B84B944136DE8D47B64DFB8D557C710
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007C61149
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                    • API String ID: 3281661635-1817040388
                                                                    • Opcode ID: 3a94cb1d79306fdc9a050dd449591057f5d3f3fa0e938ade244f3a3a1197444a
                                                                    • Instruction ID: 22f5215ae4f9810ecc69651e8d992c6b4296f257b7b9a3be93e20146a07877ac
                                                                    • Opcode Fuzzy Hash: 3a94cb1d79306fdc9a050dd449591057f5d3f3fa0e938ade244f3a3a1197444a
                                                                    • Instruction Fuzzy Hash: 4721D831B28596C5EFA4DB16E840AADE760FB85B40F984135DE8E47754CEFCE841C710
                                                                    APIs
                                                                    • 00007FF8B9F61310.VCRUNTIME140 ref: 00007FF762AD6070
                                                                      • Part of subcall function 00007FF762AB3900: 00007FF8B9F61310.VCRUNTIME140 ref: 00007FF762AB393C
                                                                      • Part of subcall function 00007FF762AB3900: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF762AB39BA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007$F61310$C610F020
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$state->TextA.Data != 0
                                                                    • API String ID: 4093856333-1138122324
                                                                    • Opcode ID: aa4380df76de35955622659888f7b988f766b4deb2fbaf4c5fddfc36e82c04f4
                                                                    • Instruction ID: 5a67b894b015a8c9549e5067dcf5a24467a17bf4d26ce12865aa4eac91eca981
                                                                    • Opcode Fuzzy Hash: aa4380df76de35955622659888f7b988f766b4deb2fbaf4c5fddfc36e82c04f4
                                                                    • Instruction Fuzzy Hash: 99218572B04642C2EF58DF25D4556A972A1EB84B45F88443AEE4DCB388DEFCE685C720
                                                                    APIs
                                                                    • 00007FF8B9F61310.VCRUNTIME140(?,?,00000000,00007FF762A9D62F), ref: 00007FF762AB38C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$it >= Data && it <= Data + Size
                                                                    • API String ID: 2490902527-3870282576
                                                                    • Opcode ID: 84a9b61979137050a1197245c5bdd7e55bba15df666dd3b8409ce5f9d3bc927c
                                                                    • Instruction ID: 7cf9039bd653f3aaa8305c8776f8ae521b97fed968692ed25be6f289c236c91d
                                                                    • Opcode Fuzzy Hash: 84a9b61979137050a1197245c5bdd7e55bba15df666dd3b8409ce5f9d3bc927c
                                                                    • Instruction Fuzzy Hash: 2B21F3B2B14681D3EF549B5AE6405A8A321FB44BC1B88D035DF9E47B44DFACF5A1C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007
                                                                    • String ID: $@
                                                                    • API String ID: 3568877910-1077428164
                                                                    • Opcode ID: 4be356fa8e074784c90dbf701479d069685c3cbf6e883b402ec0f34ae6b6c832
                                                                    • Instruction ID: 461c6b006721b83874f6448de70f6af1d8064450266bb14ab1a490adbd69c96d
                                                                    • Opcode Fuzzy Hash: 4be356fa8e074784c90dbf701479d069685c3cbf6e883b402ec0f34ae6b6c832
                                                                    • Instruction Fuzzy Hash: 45113A7290878187DB25DF21F14452AB3A1FB89B84F584225EFCA07B18DBBCD985CE00
                                                                    APIs
                                                                    • 00007FF8B9F61310.VCRUNTIME140(?,?,00000000,00007FF762AC7563,?,?,00000000,00007FF762AC1FCF), ref: 00007FF762AC73A6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4482239218.00007FF762A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF762A90000, based on PE: true
                                                                    • Associated: 00000000.00000002.4482178365.00007FF762A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E02000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762E0D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF762F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482239218.00007FF763132000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4482969867.00007FF763133000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4483046065.00007FF763135000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7ff762a90000_Nexus-Executor.jbxd
                                                                    Similarity
                                                                    • API ID: 00007F61310
                                                                    • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$stb__dout + length <= stb__barrier_out_e
                                                                    • API String ID: 2490902527-3603624656
                                                                    • Opcode ID: 4929abf8706d8f602428b6fe1b765513a0fac0a761fcb1cd9c61d870a0381a7c
                                                                    • Instruction ID: 36d0cb9d0918f886ee8e94afeca30c16a0d48b5a7f9985b2c83cd8fa61072706
                                                                    • Opcode Fuzzy Hash: 4929abf8706d8f602428b6fe1b765513a0fac0a761fcb1cd9c61d870a0381a7c
                                                                    • Instruction Fuzzy Hash: 7D11FE31B18A42E1EF80AB01F9448A5A765FB48BC0BC45036EE5D17764DFBCE9A2C720