Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WaveExecutor.exe

Overview

General Information

Sample name:WaveExecutor.exe
Analysis ID:1570766
MD5:20530c9bc61569e79d6ffece7f7e426a
SHA1:fe3dca7b627e8d3ae49d2e9c9145581f108330f2
SHA256:76dbac3dc4d2dc8aa1e0e8de0d8f4d57172a8be90fc3ef535159ef649d762dd5
Tags:exeuser-aachum
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
PE file contains section with special chars
Tries to harvest and steal browser information (history, passwords, etc)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • WaveExecutor.exe (PID: 7516 cmdline: "C:\Users\user\Desktop\WaveExecutor.exe" MD5: 20530C9BC61569E79D6FFECE7F7E426A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: WaveExecutor.exe PID: 7516JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.WaveExecutor.exe.2c33ae0f1d0.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-08T02:12:09.105297+010028032742Potentially Bad Traffic192.168.2.849705104.26.9.59443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: WaveExecutor.exeAvira: detected
        Source: WaveExecutor.exeReversingLabs: Detection: 21%
        Source: WaveExecutor.exeVirustotal: Detection: 22%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: WaveExecutor.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33AD87750 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,CryptUnprotectData,0_2_000002C33AD87750
        Source: unknownHTTPS traffic detected: 104.26.9.59:443 -> 192.168.2.8:49705 version: TLS 1.2
        Source: WaveExecutor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33ACEF46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_000002C33ACEF46A
        Source: Joe Sandbox ViewIP Address: 104.26.9.59 104.26.9.59
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49705 -> 104.26.9.59:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: global trafficDNS traffic detected: DNS query: api.myip.com
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://https/:://websocketpp.processorGeneric
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: WaveExecutor.exe, 00000000.00000003.1483688447.000002C33ACB1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
        Source: WaveExecutor.exe, 00000000.00000003.1451712581.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1457751354.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1464996705.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3888813379.000002C33B170000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462341885.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1468124629.000002C33B170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/7
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/Russia
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage
        Source: WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold
        Source: WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownHTTPS traffic detected: 104.26.9.59:443 -> 192.168.2.8:49705 version: TLS 1.2
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652001C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF652001C20
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652001D70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF652001D70
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652001C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF652001C20
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652030330 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF652030330
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652030D02 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF652030D02

        System Summary

        barindex
        Source: WaveExecutor.exeStatic PE information: section name: "aR
        Source: WaveExecutor.exeStatic PE information: section name: b@b8
        Source: C:\Users\user\Desktop\WaveExecutor.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652033B90 PostQuitMessage,GetWindowRect,SetWindowPos,NtdllDefWindowProc_A,0_2_00007FF652033B90
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D248 NtdllDefWindowProc_A,0_2_00007FF65203D248
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202FCE00_2_00007FF65202FCE0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202EA600_2_00007FF65202EA60
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202F2F00_2_00007FF65202F2F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520303300_2_00007FF652030330
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520343200_2_00007FF652034320
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65200DB500_2_00007FF65200DB50
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202CB400_2_00007FF65202CB40
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202A3700_2_00007FF65202A370
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FE73900_2_00007FF651FE7390
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FEFBB00_2_00007FF651FEFBB0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652016BC00_2_00007FF652016BC0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652006C900_2_00007FF652006C90
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FE6CB00_2_00007FF651FE6CB0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520054F00_2_00007FF6520054F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652017CE00_2_00007FF652017CE0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65200BD100_2_00007FF65200BD10
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652030D020_2_00007FF652030D02
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65201D5300_2_00007FF65201D530
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FFE1C00_2_00007FF651FFE1C0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520159E00_2_00007FF6520159E0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65200B1E00_2_00007FF65200B1E0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65201F9E00_2_00007FF65201F9E0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FFFA000_2_00007FF651FFFA00
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652022A000_2_00007FF652022A00
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FF5A300_2_00007FF651FF5A30
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FFC2500_2_00007FF651FFC250
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FFF2500_2_00007FF651FFF250
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65200C2700_2_00007FF65200C270
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202BA800_2_00007FF65202BA80
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202C3100_2_00007FF65202C310
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FEDFB00_2_00007FF651FEDFB0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65200BFC00_2_00007FF65200BFC0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520197F00_2_00007FF6520197F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520260900_2_00007FF652026090
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65200AD400_2_00007FF65200AD40
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FE5D900_2_00007FF651FE5D90
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202E5B00_2_00007FF65202E5B0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65201CDD00_2_00007FF65201CDD0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520125F00_2_00007FF6520125F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652020DE00_2_00007FF652020DE0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FE9E100_2_00007FF651FE9E10
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FF46200_2_00007FF651FF4620
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FFD6200_2_00007FF651FFD620
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF6520096B00_2_00007FF6520096B0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FF6EC00_2_00007FF651FF6EC0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FF46F00_2_00007FF651FF46F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF652007EF00_2_00007FF652007EF0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF651FE97300_2_00007FF651FE9730
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33ADB27200_2_000002C33ADB2720
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33ACDBA300_2_000002C33ACDBA30
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33AD138410_2_000002C33AD13841
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: String function: 00007FF652001F40 appears 40 times
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: String function: 00007FF65203D440 appears 867 times
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: String function: 00007FF651FF85B0 appears 36 times
        Source: WaveExecutor.exeStatic PE information: Resource name: RT_RCDATA type: DOS executable (COM)
        Source: WaveExecutor.exeStatic PE information: Resource name: RT_RCDATA type: ARJ archive data, v65, multi-volume, slash-switched, backup, original name: \026)\246\274\303F"\306\005\301\206y\363\207\203X\304\254\227\252iV6\322\006\207\374\3137D\234T"\360;]w\263\233r\361\371\011<\337\274H\\234\220\365,
        Source: WaveExecutor.exeStatic PE information: Section: bbbb ZLIB complexity 0.999073478746118
        Source: classification engineClassification label: mal84.spyw.evad.winEXE@1/1@1/1
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33ADD10E0 CreateToolhelp32Snapshot,Process32NextW,Concurrency::details::WorkQueue::IsStructuredEmpty,Concurrency::details::WorkQueue::IsStructuredEmpty,Process32NextW,0_2_000002C33ADD10E0
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\0JUUKU8Y.htmJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1753164467.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462576926.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889656381.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1610058737.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2046470525.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B438000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE autofill (name VARCHAR, value VARCHAR, value_lower VARCHAR, date_created INTEGER DEFAULT 0, date_last_used INTEGER DEFAULT 0, count INTEGER DEFAULT 1, PRIMARY KEY (name, value))t4;
        Source: WaveExecutor.exe, 00000000.00000002.3889012697.000002C33B320000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE server_addresses (id VARCHAR, company_name VARCHAR, street_address VARCHAR, address_1 VARCHAR, address_2 VARCHAR, address_3 VARCHAR, address_4 VARCHAR, postal_code VARCHAR, sorting_code VARCHAR, country_code VARCHAR, language_code VARCHAR, recipient_name VARCHAR, phone_number VARCHAR);
        Source: WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1753164467.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462576926.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889656381.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1610058737.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2046470525.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B438000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B438000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE offer_data (offer_id UNSIGNED LONG, offer_reward_amount VARCHAR, expiry UNSIGNED LONG, offer_details_url VARCHAR, merchant_domain VARCHAR, promo_code VARCHAR, value_prop_text VARCHAR, see_details_text VARCHAR, usage_instructions_text VARCHAR);M
        Source: WaveExecutor.exe, 00000000.00000002.3886336510.000002C33ABF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE server_card_cloud_token_data (id VARCHAR, suffix VARCHAR, exp_month INTEGER DEFAULT 0, exp_year INTEGER DEFAULT 0, card_art_url VARCHAR, instrument_token VARCHAR);~
        Source: WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1945634611.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1465375008.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1517096164.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1758631606.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2036016440.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE clusters(cluster_id INTEGER PRIMARY KEY AUTOINCREMENT,should_show_on_prominent_ui_surfaces BOOLEAN NOT NULL,label VARCHAR NOT NULL,raw_label VARCHAR NOT NULL,triggerability_calculated BOOLEAN NOT NULL,originator_cache_guid TEXT NOT NULL,originator_cluster_id INTEGER NOT NULL)>;
        Source: WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1945634611.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1465375008.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1517096164.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1574401896.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1758631606.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2036016440.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2040627077.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE safety_hub_navigations (navigation_date INTEGER,smartscreen_scanned_navigations_counter INTEGER,typosquatting_scanned_navigations_counter INTEGER,lookalike_scanned_navigations_counter INTEGER,certificate_warning_scanned_navigations_counter INTEGER,PRIMARY KEY(navigation_date))c4;
        Source: WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B443000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: WaveExecutor.exe, 00000000.00000002.3889656381.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1753164467.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2025195253.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1569796602.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1610058737.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2046470525.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1457995357.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462576926.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1758631606.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1705783497.000002C33B3E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE masked_credit_cards (id VARCHAR, name_on_card VARCHAR, network VARCHAR, last_four VARCHAR, exp_month INTEGER DEFAULT 0, exp_year INTEGER DEFAULT 0, bank_name VARCHAR, nickname VARCHAR, card_issuer INTEGER DEFAULT 0, instrument_id INTEGER DEFAULT 0, virtual_card_enrollment_state INTEGER DEFAULT 0, card_art_url VARCHAR, product_description VARCHAR, card_issuer_id VARCHAR, virtual_card_enrollment_type INTEGER DEFAULT 0)H;
        Source: WaveExecutor.exe, 00000000.00000003.1458873429.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3891175971.000002C33B4D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE masked_credit_cards (id VARCHAR, name_on_card VARCHAR, network VARCHAR, last_four VARCHAR, exp_month INTEGER DEFAULT 0, exp_year INTEGER DEFAULT 0, bank_name VARCHAR, nickname VARCHAR, card_issuer INTEGER DEFAULT 0, instrument_id INTEGER DEFAULT 0, virtual_card_enrollment_state INTEGER DEFAULT 0, card_art_url VARCHAR, product_description VARCHAR, card_issuer_id VARCHAR, virtual_card_enrollment_type INTEGER DEFAULT 0)C;
        Source: WaveExecutor.exeReversingLabs: Detection: 21%
        Source: WaveExecutor.exeVirustotal: Detection: 22%
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: d3d9.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: msvcp140.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: d3d10warp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: resourcepolicyclient.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dxcore.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: xinput1_4.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: inputhost.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: WaveExecutor.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: WaveExecutor.exeStatic file information: File size 1390123 > 1048576
        Source: WaveExecutor.exeStatic PE information: Raw size of bbbb is bigger than: 0x100000 < 0x142000
        Source: WaveExecutor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\WaveExecutor.exeUnpacked PE file: 0.2.WaveExecutor.exe.7ff651fe0000.1.unpack "aR:EW;bbbb:EW;Unknown_Section2:W; vs "aR:ER;bbbb:ER;Unknown_Section2:W;
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202F7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF65202F7A0
        Source: initial sampleStatic PE information: section where entry point is pointing to: bbbb
        Source: WaveExecutor.exeStatic PE information: section name: "aR
        Source: WaveExecutor.exeStatic PE information: section name: bbbb
        Source: WaveExecutor.exeStatic PE information: section name: b@b8
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D168 push rbp; retf 0_2_00007FF65203D11B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203B810 push rbp; retf 0_2_00007FF65203D09B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D028 push rsi; retf 0_2_00007FF65203D02B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D050 push rsi; retf 0_2_00007FF65203D063
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D038 push rbp; retf 0_2_00007FF65203D043
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D070 push r14; retf 0_2_00007FF65203D07B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D060 push r14; retf 0_2_00007FF65203D06B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D080 push rsi; retf 0_2_00007FF65203D063
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D080 push rbp; retf 0_2_00007FF65203D09B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D0E8 push rbp; retf 0_2_00007FF65203D0EB
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D0D8 push rbp; retf 0_2_00007FF65203D0DB
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D0E0 push rsi; retf 0_2_00007FF65203D0E3
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203D100 push rbp; retf 0_2_00007FF65203D103
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33AD04970 push es; ret 0_2_000002C33AD0497F
        Source: WaveExecutor.exeStatic PE information: section name: bbbb entropy: 7.9997575830156915
        Source: C:\Users\user\Desktop\WaveExecutor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeWindow / User API: threadDelayed 5459Jump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeWindow / User API: foregroundWindowGot 1634Jump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_000002C33ACEF46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_000002C33ACEF46A
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsdvboxserviceu
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayx64dbgh
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
        Source: WaveExecutor.exe, 00000000.00000002.3886336510.000002C33AC30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWXU
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: P}GUqEmuneLbN\
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
        Source: WaveExecutor.exe, 00000000.00000003.1468124629.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1464996705.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3886336510.000002C33ABF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3888813379.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1457751354.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1451712581.000002C33B187000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462341885.000002C33B187000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-gaVGAuthServicevmwaretrayv
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
        Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
        Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: wiresharkvmwareuseri
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
        Source: WaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
        Source: WaveExecutor.exe, 00000000.00000003.1434948593.000002C33B374000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
        Source: C:\Users\user\Desktop\WaveExecutor.exeAPI call chain: ExitProcess graph end nodegraph_0-89505
        Source: C:\Users\user\Desktop\WaveExecutor.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203C0F8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF65203C0F8
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65202F7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF65202F7A0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203C0F8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF65203C0F8
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF65202F7A0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: GetLocaleInfoA,0_2_00007FF65203D028
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: GetKeyboardLayout,GetLocaleInfoA,0_2_00007FF65203105B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF65203C388 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF65203C388

        Stealing of Sensitive Information

        barindex
        Source: WaveExecutor.exeString found in binary or memory: \Electrum\wallets
        Source: WaveExecutor.exeString found in binary or memory: ElectronCash
        Source: WaveExecutor.exeString found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
        Source: WaveExecutor.exeString found in binary or memory: \Exodus\exodus.wallet
        Source: WaveExecutor.exeString found in binary or memory: \Ethereum\keystore
        Source: WaveExecutor.exeString found in binary or memory: Exodus
        Source: WaveExecutor.exeString found in binary or memory: \Ethereum\keystore
        Source: WaveExecutor.exeString found in binary or memory: \Coinomi\Coinomi\wallets
        Source: WaveExecutor.exeString found in binary or memory: \Ethereum\keystore
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kz8kl7vh.default\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: Yara matchFile source: 0.2.WaveExecutor.exe.2c33ae0f1d0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WaveExecutor.exe PID: 7516, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Input Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Deobfuscate/Decode Files or Information
        1
        Input Capture
        1
        Query Registry
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
        Obfuscated Files or Information
        Security Account Manager11
        Security Software Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
        Software Packing
        NTDS2
        Process Discovery
        Distributed Component Object Model3
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        WaveExecutor.exe21%ReversingLabs
        WaveExecutor.exe23%VirustotalBrowse
        WaveExecutor.exe100%AviraHEUR/AGEN.1314582
        WaveExecutor.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://https://https/:://websocketpp.processorGeneric0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.myip.com
        104.26.9.59
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://api.myip.com/false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://https://https/:://websocketpp.processorGenericWaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ac.ecosia.org/autocomplete?q=WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://duckduckgo.com/chrome_newtabWaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoWaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgWaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usageWaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmpfalse
                        high
                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchWaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&uWaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&ctaWaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpgWaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://api.myip.com/7WaveExecutor.exe, 00000000.00000003.1451712581.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1457751354.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1464996705.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3888813379.000002C33B170000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1462341885.000002C33B16F000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1468124629.000002C33B170000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://api.myip.com/RussiaWaveExecutor.exe, 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(HoldWaveExecutor.exe, 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmpfalse
                                          high
                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYiWaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.ecosia.org/newtab/WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=WaveExecutor.exe, 00000000.00000003.2088747718.000002C33B5C9000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1463509481.000002C33B4EA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3889125891.000002C33B361000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B36C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1453560608.000002C33B4B7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.1454931632.000002C33B4BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    104.26.9.59
                                                    api.myip.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1570766
                                                    Start date and time:2024-12-08 02:11:08 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 7m 45s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:7
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:WaveExecutor.exe
                                                    Detection:MAL
                                                    Classification:mal84.spyw.evad.winEXE@1/1@1/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 85%
                                                    • Number of executed functions: 28
                                                    • Number of non-executed functions: 153
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    TimeTypeDescription
                                                    20:12:44API Interceptor17718875x Sleep call for process: WaveExecutor.exe modified
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    104.26.9.59Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                      Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                          file.exeGet hashmaliciousLummaC, Ailurophile Stealer, Amadey, LummaC Stealer, StealcBrowse
                                                            ZoomInstaller.exeGet hashmaliciousUnknownBrowse
                                                              ZoomInstaller.exeGet hashmaliciousUnknownBrowse
                                                                file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC StealerBrowse
                                                                  eSLlhErJ0q.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                    iBO7gzlZr3.exeGet hashmaliciousLummaCBrowse
                                                                      5zFCjSBLvw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        api.myip.comFortexternal.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.26.9.59
                                                                        Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.26.9.59
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.26.9.59
                                                                        file.exeGet hashmaliciousAmadey, CryptbotBrowse
                                                                        • 172.67.75.163
                                                                        file.exeGet hashmaliciousAmadey, XWormBrowse
                                                                        • 172.67.75.163
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.26.8.59
                                                                        file.exeGet hashmaliciousLummaC, Ailurophile Stealer, Amadey, LummaC Stealer, StealcBrowse
                                                                        • 104.26.9.59
                                                                        file.exeGet hashmaliciousAilurophile StealerBrowse
                                                                        • 104.26.8.59
                                                                        installer.exeGet hashmaliciousUnknownBrowse
                                                                        • 172.67.75.163
                                                                        installer.exeGet hashmaliciousUnknownBrowse
                                                                        • 172.67.75.163
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        CLOUDFLARENETUSXeno Executor.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                        • 104.26.13.205
                                                                        Delta.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.16.9
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.165.166
                                                                        Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.36.51
                                                                        'Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.185.163
                                                                        Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.24.90
                                                                        Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.185.163
                                                                        meerkat.mips.elfGet hashmaliciousMiraiBrowse
                                                                        • 8.44.96.113
                                                                        file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                                                        • 172.67.165.166
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.16.9
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        37f463bf4616ecd445d4a1937da06e19Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.26.9.59
                                                                        Xeno Executor.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                        • 104.26.9.59
                                                                        file.exeGet hashmaliciousAmadey, CredGrabber, LummaC Stealer, Meduza Stealer, Stealc, VidarBrowse
                                                                        • 104.26.9.59
                                                                        file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                        • 104.26.9.59
                                                                        malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                                                        • 104.26.9.59
                                                                        INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        • 104.26.9.59
                                                                        Bank Swift and SOA PRN00720031415453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        • 104.26.9.59
                                                                        RFQ Order list #2667747.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        • 104.26.9.59
                                                                        Payment Details Ref#577767.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        • 104.26.9.59
                                                                        IBAN Payment confirmation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        • 104.26.9.59
                                                                        No context
                                                                        Process:C:\Users\user\Desktop\WaveExecutor.exe
                                                                        File Type:JSON data
                                                                        Category:dropped
                                                                        Size (bytes):57
                                                                        Entropy (8bit):4.3585198384225
                                                                        Encrypted:false
                                                                        SSDEEP:3:YMb1gXMlJ9eMfQxaNmGGL4:YMeX6uxaNmRL4
                                                                        MD5:E86153F34E01C5AED461F812D7472D86
                                                                        SHA1:CB4491FAC004B18059BA1BDDFE2CD5696CD94F87
                                                                        SHA-256:D174A4EFD5E9EAC12E0161D4C4A1D5C26122C4C5EA6A1BE49D7A277B535CB2DF
                                                                        SHA-512:CA8A07D9515808AC4331D1790F75C2A05672E299366DE0A0EE55698F8679B366428DFB18E8390FF034B58E3D0D05165F4C9EE8F7481B7509B51A18A84DF5F51B
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:{"ip":"8.46.123.228","country":"United States","cc":"US"}
                                                                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                        Entropy (8bit):7.942431434635199
                                                                        TrID:
                                                                        • Win64 Executable GUI (202006/5) 93.52%
                                                                        • Win64 Executable (generic) (12005/4) 5.56%
                                                                        • DOS Executable Generic (2002/1) 0.93%
                                                                        File name:WaveExecutor.exe
                                                                        File size:1'390'123 bytes
                                                                        MD5:20530c9bc61569e79d6ffece7f7e426a
                                                                        SHA1:fe3dca7b627e8d3ae49d2e9c9145581f108330f2
                                                                        SHA256:76dbac3dc4d2dc8aa1e0e8de0d8f4d57172a8be90fc3ef535159ef649d762dd5
                                                                        SHA512:b082c75d0cd5ce6249b06d814457352bf8f49d36fa2a9c697833ff0802e286f03b6bcf9edb2f3084fbfef876a6be37cec1ddd1747d90b1f772dee6b92cb23cce
                                                                        SSDEEP:24576:Ji25ZYwRgccqI/ZtjnftODZkIox/qLgzAlpe5Jwyytys4+/u9UkzVTMoxwz:BXmIdkf/qLg0Sf1duuBGUa
                                                                        TLSH:5855122FB3D42725D974D5B38AE7C30AB730A1A1D676CB6B09C14E5FA16A0026B47F1C
                                                                        File Content Preview:MZ......................@.2.92.UPX!._0x0023603..........................!..L.!This program cannot be run in DOS mode....$........z...............c.......................................c................................t.............Rich...................
                                                                        Icon Hash:00928e8e8686b000
                                                                        Entrypoint:0x1406d2210
                                                                        Entrypoint Section:bbbb
                                                                        Digitally signed:false
                                                                        Imagebase:0x140000000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x6753058D [Fri Dec 6 14:09:17 2024 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:6
                                                                        OS Version Minor:0
                                                                        File Version Major:6
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:6
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:bd2500bb87e3a94d2777b94c3c55a684
                                                                        Instruction
                                                                        push ebx
                                                                        push esi
                                                                        push edi
                                                                        push ebp
                                                                        dec eax
                                                                        lea esi, dword ptr [FFEBEDE5h]
                                                                        dec eax
                                                                        lea edi, dword ptr [esi-00590000h]
                                                                        push edi
                                                                        mov eax, 006D0D9Dh
                                                                        push eax
                                                                        dec eax
                                                                        mov ecx, esp
                                                                        dec eax
                                                                        mov edx, edi
                                                                        dec eax
                                                                        mov edi, esi
                                                                        mov esi, 00141201h
                                                                        push ebp
                                                                        dec eax
                                                                        mov ebp, esp
                                                                        inc esp
                                                                        mov ecx, dword ptr [ecx]
                                                                        dec ecx
                                                                        mov eax, edx
                                                                        dec eax
                                                                        mov edx, esi
                                                                        dec eax
                                                                        lea esi, dword ptr [edi+02h]
                                                                        push esi
                                                                        mov al, byte ptr [edi]
                                                                        dec edx
                                                                        mov cl, al
                                                                        and al, 07h
                                                                        shr cl, 00000003h
                                                                        dec eax
                                                                        mov ebx, FFFFFD00h
                                                                        dec eax
                                                                        shl ebx, cl
                                                                        mov cl, al
                                                                        dec eax
                                                                        lea ebx, dword ptr [esp+ebx*2-00000E78h]
                                                                        dec eax
                                                                        and ebx, FFFFFFC0h
                                                                        push 00000000h
                                                                        dec eax
                                                                        cmp esp, ebx
                                                                        jne 00007F3848D4C0ABh
                                                                        push ebx
                                                                        dec eax
                                                                        lea edi, dword ptr [ebx+08h]
                                                                        mov cl, byte ptr [esi-01h]
                                                                        dec edx
                                                                        mov byte ptr [edi+02h], al
                                                                        mov al, cl
                                                                        shr cl, 00000004h
                                                                        mov byte ptr [edi+01h], cl
                                                                        and al, 0Fh
                                                                        mov byte ptr [edi], al
                                                                        dec eax
                                                                        lea ecx, dword ptr [edi-04h]
                                                                        push eax
                                                                        inc ecx
                                                                        push edi
                                                                        dec eax
                                                                        lea eax, dword ptr [edi+04h]
                                                                        inc ebp
                                                                        xor edi, edi
                                                                        inc ecx
                                                                        push esi
                                                                        inc ecx
                                                                        mov esi, 00000001h
                                                                        inc ecx
                                                                        push ebp
                                                                        inc ebp
                                                                        xor ebp, ebp
                                                                        inc ecx
                                                                        push esp
                                                                        push ebp
                                                                        push ebx
                                                                        dec eax
                                                                        sub esp, 48h
                                                                        dec eax
                                                                        mov dword ptr [esp+38h], ecx
                                                                        dec eax
                                                                        mov dword ptr [esp+20h], eax
                                                                        mov eax, 00000001h
                                                                        dec eax
                                                                        mov dword ptr [esp+40h], esi
                                                                        dec esp
                                                                        mov dword ptr [esp+30h], eax
                                                                        mov ebx, eax
                                                                        inc esp
                                                                        mov dword ptr [esp+2Ch], ecx
                                                                        movzx ecx, byte ptr [edi+02h]
                                                                        shl ebx, cl
                                                                        mov ecx, ebx
                                                                        Programming Language:
                                                                        • [IMP] VS2008 SP1 build 30729
                                                                        • [IMP] VS2005 build 50727
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6e3c940x4c0b@b8
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6d30000x10c94b@b8
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3710000x43bc"aR
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e41540x20b@b8
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x6d2df00x28bbbb
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d2e200x140bbbb
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        "aR0x10000x5900000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        bbbb0x5910000x1420000x1420009cb2738f30eee3b9289923700fa0b1c5False0.999073478746118data7.9997575830156915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        b@b80x6d30000x120000x112007203ffef5d1e7538bd4a499cb093a19bFalse0.2558308622262774data3.946927594863314IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        None0x6e3ad00x2edata1.108695652173913
                                                                        RT_RCDATA0x386afc0x3201empty0
                                                                        RT_RCDATA0x389d000x3201empty0
                                                                        RT_RCDATA0x38cf040x3201empty0
                                                                        RT_RCDATA0x3901080x3201empty0
                                                                        RT_RCDATA0x39330c0x3201empty0
                                                                        RT_RCDATA0x3965100x3201empty0
                                                                        RT_RCDATA0x3997140x3201empty0
                                                                        RT_RCDATA0x39c9180x3201empty0
                                                                        RT_RCDATA0x39fb1c0x3201empty0
                                                                        RT_RCDATA0x3a2d200x3201empty0
                                                                        RT_RCDATA0x3a5f240x3201empty0
                                                                        RT_RCDATA0x3a91280x3201empty0
                                                                        RT_RCDATA0x3ac32c0x3201empty0
                                                                        RT_RCDATA0x3af5300x3201empty0
                                                                        RT_RCDATA0x3b27340x3201empty0
                                                                        RT_RCDATA0x3b59380x3201empty0
                                                                        RT_RCDATA0x3b8b3c0x3201empty0
                                                                        RT_RCDATA0x3bbd400x3201empty0
                                                                        RT_RCDATA0x3bef440x3201empty0
                                                                        RT_RCDATA0x3c21480x3201empty0
                                                                        RT_RCDATA0x3c534c0x3201empty0
                                                                        RT_RCDATA0x3c85500x3201empty0
                                                                        RT_RCDATA0x3cb7540x3201empty0
                                                                        RT_RCDATA0x3ce9580x3201empty0
                                                                        RT_RCDATA0x3d1b5c0x3201empty0
                                                                        RT_RCDATA0x3d4d600x3201empty0
                                                                        RT_RCDATA0x3d7f640x3201empty0
                                                                        RT_RCDATA0x3db1680x3201empty0
                                                                        RT_RCDATA0x3de36c0x3201empty0
                                                                        RT_RCDATA0x3e15700x3201empty0
                                                                        RT_RCDATA0x3e47740x3201empty0
                                                                        RT_RCDATA0x3e79780x76empty0
                                                                        RT_RCDATA0x3e79f00x22empty0
                                                                        RT_RCDATA0x3e7a140x3201empty0
                                                                        RT_RCDATA0x3eac180x3201empty0
                                                                        RT_RCDATA0x3ede1c0x3201empty0
                                                                        RT_RCDATA0x3f10200x3201empty0
                                                                        RT_RCDATA0x3f42240x3201empty0
                                                                        RT_RCDATA0x3f74280x3201empty0
                                                                        RT_RCDATA0x3fa62c0x3201empty0
                                                                        RT_RCDATA0x3fd8300x3201empty0
                                                                        RT_RCDATA0x400a340x3201empty0
                                                                        RT_RCDATA0x403c380x3201empty0
                                                                        RT_RCDATA0x406e3c0x3201empty0
                                                                        RT_RCDATA0x40a0400x3201empty0
                                                                        RT_RCDATA0x40d2440x740empty0
                                                                        RT_RCDATA0x40d9840xfempty0
                                                                        RT_RCDATA0x40d9940x3201empty0
                                                                        RT_RCDATA0x410b980x3201empty0
                                                                        RT_RCDATA0x413d9c0x3201empty0
                                                                        RT_RCDATA0x416fa00x3201empty0
                                                                        RT_RCDATA0x41a1a40xe96ceempty0
                                                                        RT_RCDATA0x5038740x3201empty0
                                                                        RT_RCDATA0x506a780x90edempty0
                                                                        RT_RCDATA0x50fb680x3201empty0
                                                                        RT_RCDATA0x512d6c0x3201empty0
                                                                        RT_RCDATA0x515f700x3201empty0
                                                                        RT_RCDATA0x5191740x3201empty0
                                                                        RT_RCDATA0x51c3780x3201empty0
                                                                        RT_RCDATA0x51f57c0x55empty0
                                                                        RT_RCDATA0x51f5d40x3201empty0
                                                                        RT_RCDATA0x5227d80x3201empty0
                                                                        RT_RCDATA0x5259dc0x3201empty0
                                                                        RT_RCDATA0x528be00x9eempty0
                                                                        RT_RCDATA0x528c800x1f2empty0
                                                                        RT_RCDATA0x528e740x3201empty0
                                                                        RT_RCDATA0x52c0780x3201empty0
                                                                        RT_RCDATA0x52f27c0x3201empty0
                                                                        RT_RCDATA0x5324800x3201empty0
                                                                        RT_RCDATA0x5356840x3201empty0
                                                                        RT_RCDATA0x5388880x3201empty0
                                                                        RT_RCDATA0x53ba8c0x3201empty0
                                                                        RT_RCDATA0x53ec900x7dempty0
                                                                        RT_RCDATA0x53ed100x7dempty0
                                                                        RT_RCDATA0x53ed900x7dempty0
                                                                        RT_RCDATA0x53ee100x7dempty0
                                                                        RT_RCDATA0x53ee900x7dempty0
                                                                        RT_RCDATA0x53ef100x7dempty0
                                                                        RT_RCDATA0x53ef900x7dempty0
                                                                        RT_RCDATA0x53f0100x7dempty0
                                                                        RT_RCDATA0x53f0900x7dempty0
                                                                        RT_RCDATA0x53f1100x7dempty0
                                                                        RT_RCDATA0x53f1900x7dempty0
                                                                        RT_RCDATA0x53f2100x7dempty0
                                                                        RT_RCDATA0x53f2900x7dempty0
                                                                        RT_RCDATA0x53f3100x7dempty0
                                                                        RT_RCDATA0x53f3900x7dempty0
                                                                        RT_RCDATA0x53f4100x3201empty0
                                                                        RT_RCDATA0x5426140x3201empty0
                                                                        RT_RCDATA0x5458180x3201empty0
                                                                        RT_RCDATA0x548a1c0x3201empty0
                                                                        RT_RCDATA0x54bc200x3201empty0
                                                                        RT_RCDATA0x54ee240x3201empty0
                                                                        RT_RCDATA0x5520280x3201empty0
                                                                        RT_RCDATA0x55522c0x3201empty0
                                                                        RT_RCDATA0x5584300x3201empty0
                                                                        RT_RCDATA0x55b6340x3201empty0
                                                                        RT_RCDATA0x55e8380x3201empty0
                                                                        RT_RCDATA0x561a3c0x3201empty0
                                                                        RT_RCDATA0x564c400x3201empty0
                                                                        RT_RCDATA0x567e440x3201empty0
                                                                        RT_RCDATA0x56b0480x3201empty0
                                                                        RT_RCDATA0x56e24c0x3201empty0
                                                                        RT_RCDATA0x5714500x3201empty0
                                                                        RT_RCDATA0x5746540x3201empty0
                                                                        RT_RCDATA0x5778580x3201empty0
                                                                        RT_RCDATA0x57aa5c0x3201empty0
                                                                        RT_RCDATA0x57dc600x3201empty0
                                                                        RT_RCDATA0x580e640x3201empty0
                                                                        RT_RCDATA0x5840680x3201empty0
                                                                        RT_RCDATA0x58726c0x3201empty0
                                                                        RT_RCDATA0x58a4700x3201empty0
                                                                        RT_RCDATA0x58d6740x3201empty0
                                                                        RT_RCDATA0x5908780x3201empty0
                                                                        RT_RCDATA0x593a7c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x596c800x3201data1.0008593078665728
                                                                        RT_RCDATA0x599e840x3201data1.0008593078665728
                                                                        RT_RCDATA0x59d0880x3201data1.0008593078665728
                                                                        RT_RCDATA0x5a028c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x5a34900x3201data1.0008593078665728
                                                                        RT_RCDATA0x5a66940x3201data1.0008593078665728
                                                                        RT_RCDATA0x5a98980x3201data1.0008593078665728
                                                                        RT_RCDATA0x5aca9c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x5afca00x3201data1.0008593078665728
                                                                        RT_RCDATA0x5b2ea40x3201data1.0008593078665728
                                                                        RT_RCDATA0x5b60a80x3201data1.0008593078665728
                                                                        RT_RCDATA0x5b92ac0x3201data1.0008593078665728
                                                                        RT_RCDATA0x5bc4b00x3201data1.0008593078665728
                                                                        RT_RCDATA0x5bf6b40x3201data1.0008593078665728
                                                                        RT_RCDATA0x5c28b80x3201data1.0008593078665728
                                                                        RT_RCDATA0x5c5abc0x3201data1.0008593078665728
                                                                        RT_RCDATA0x5c8cc00x3201data1.0008593078665728
                                                                        RT_RCDATA0x5cbec40x3201data1.0008593078665728
                                                                        RT_RCDATA0x5cf0c80x3201data1.0008593078665728
                                                                        RT_RCDATA0x5d22cc0x3201data1.0008593078665728
                                                                        RT_RCDATA0x5d54d00x3201data1.0008593078665728
                                                                        RT_RCDATA0x5d86d40x3201data1.0008593078665728
                                                                        RT_RCDATA0x5db8d80x3201data1.0008593078665728
                                                                        RT_RCDATA0x5deadc0x3201data1.0008593078665728
                                                                        RT_RCDATA0x5e1ce00x3201data1.0008593078665728
                                                                        RT_RCDATA0x5e4ee40x3201data1.0008593078665728
                                                                        RT_RCDATA0x5e80e80x3201data1.0008593078665728
                                                                        RT_RCDATA0x5eb2ec0x3201data1.0008593078665728
                                                                        RT_RCDATA0x5ee4f00x3201data1.0008593078665728
                                                                        RT_RCDATA0x5f16f40x3201data1.0008593078665728
                                                                        RT_RCDATA0x5f48f80x3201data1.0008593078665728
                                                                        RT_RCDATA0x5f7afc0x3201DOS executable (COM)1.0008593078665728
                                                                        RT_RCDATA0x5fad000x3201data1.0008593078665728
                                                                        RT_RCDATA0x5fdf040x3201data1.0008593078665728
                                                                        RT_RCDATA0x6011080x3201data1.0008593078665728
                                                                        RT_RCDATA0x60430c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6075100x3201data1.0008593078665728
                                                                        RT_RCDATA0x60a7140x3201data1.0008593078665728
                                                                        RT_RCDATA0x60d9180x3201data1.0008593078665728
                                                                        RT_RCDATA0x610b1c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x613d200x3201data1.0008593078665728
                                                                        RT_RCDATA0x616f240x3201data1.0008593078665728
                                                                        RT_RCDATA0x61a1280x3201data1.0008593078665728
                                                                        RT_RCDATA0x61d32c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6205300x3201data1.0008593078665728
                                                                        RT_RCDATA0x6237340x3201data1.0008593078665728
                                                                        RT_RCDATA0x6269380x3201data1.0008593078665728
                                                                        RT_RCDATA0x629b3c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x62cd400x3201data1.0008593078665728
                                                                        RT_RCDATA0x62ff440x3201data1.0008593078665728
                                                                        RT_RCDATA0x6331480x3201data1.0008593078665728
                                                                        RT_RCDATA0x63634c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6395500x3201data1.0008593078665728
                                                                        RT_RCDATA0x63c7540x3201data1.0008593078665728
                                                                        RT_RCDATA0x63f9580x3201data1.0008593078665728
                                                                        RT_RCDATA0x642b5c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x645d600x3201data1.0008593078665728
                                                                        RT_RCDATA0x648f640x3201data1.0008593078665728
                                                                        RT_RCDATA0x64c1680x3201data1.0008593078665728
                                                                        RT_RCDATA0x64f36c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6525700x3201data1.0008593078665728
                                                                        RT_RCDATA0x6557740x3201data1.0008593078665728
                                                                        RT_RCDATA0x6589780x3201data1.0008593078665728
                                                                        RT_RCDATA0x65bb7c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x65ed800x3201data1.0008593078665728
                                                                        RT_RCDATA0x661f840x3201data1.0008593078665728
                                                                        RT_RCDATA0x6651880x3201data1.0008593078665728
                                                                        RT_RCDATA0x66838c0x3201data1.0008593078665728
                                                                        RT_RCDATA0x66b5900x3201data1.0008593078665728
                                                                        RT_RCDATA0x66e7940x3201data1.0008593078665728
                                                                        RT_RCDATA0x6719980x3201data1.0008593078665728
                                                                        RT_RCDATA0x674b9c0x3201ARJ archive data, v65, multi-volume, slash-switched, backup, original name: \026)\246\274\303F"\306\005\301\206y\363\207\203X\304\254\227\252iV6\322\006\207\374\3137D\234T"\360;]w\263\233r\361\371\011<\337\274H\\234\220\365,1.0008593078665728
                                                                        RT_RCDATA0x677da00x3201data1.0008593078665728
                                                                        RT_RCDATA0x67afa40x3201data1.0008593078665728
                                                                        RT_RCDATA0x67e1a80x3201data1.0008593078665728
                                                                        RT_RCDATA0x6813ac0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6845b00x3201data1.0008593078665728
                                                                        RT_RCDATA0x6877b40x3201data1.0008593078665728
                                                                        RT_RCDATA0x68a9b80x3201data1.0008593078665728
                                                                        RT_RCDATA0x68dbbc0x3201data1.0008593078665728
                                                                        RT_RCDATA0x690dc00x3201data1.0008593078665728
                                                                        RT_RCDATA0x693fc40x3201data1.0008593078665728
                                                                        RT_RCDATA0x6971c80x3201data1.0008593078665728
                                                                        RT_RCDATA0x69a3cc0x3201data1.0008593078665728
                                                                        RT_RCDATA0x69d5d00x3201data1.0008593078665728
                                                                        RT_RCDATA0x6a07d40x3201data1.0008593078665728
                                                                        RT_RCDATA0x6a39d80x3201data1.0008593078665728
                                                                        RT_RCDATA0x6a6bdc0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6a9de00x3201data1.0008593078665728
                                                                        RT_RCDATA0x6acfe40x3201data1.0008593078665728
                                                                        RT_RCDATA0x6b01e80x3201OpenPGP Secret Key1.0008593078665728
                                                                        RT_RCDATA0x6b33ec0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6b65f00x3201OpenPGP Secret Key1.0008593078665728
                                                                        RT_RCDATA0x6b97f40x3201data1.0008593078665728
                                                                        RT_RCDATA0x6bc9f80x3201data1.0008593078665728
                                                                        RT_RCDATA0x6bfbfc0x3201data1.0008593078665728
                                                                        RT_RCDATA0x6c2e000x3201data1.0008593078665728
                                                                        RT_RCDATA0x6c60040x3201data1.0008593078665728
                                                                        RT_MANIFEST0x6e3b040x2data5.0
                                                                        RT_MANIFEST0x6e3b0c0x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                        None0x6c93940x110data1.0404411764705883
                                                                        None0x6c94a40xd6data1.0514018691588785
                                                                        None0x6c957c0xd2data1.0523809523809524
                                                                        None0x6c96500x88data1.0808823529411764
                                                                        None0x6c96d80x9cdata1.0705128205128205
                                                                        None0x6c97740x15adata1.0317919075144508
                                                                        None0x6c98d00x9cdata1.0705128205128205
                                                                        None0x6c996c0x11adata1.0390070921985815
                                                                        None0x6c9a880x96data1.0733333333333333
                                                                        None0x6c9b200xbedata1.0578947368421052
                                                                        None0x6c9be00xa2data1.0679012345679013
                                                                        None0x6c9c840xdcOpenPGP Secret Key1.05
                                                                        None0x6c9d600xd0data1.0528846153846154
                                                                        None0x6c9e300xf4data1.0450819672131149
                                                                        None0x6c9f240x114OpenPGP Public Key1.039855072463768
                                                                        None0x6ca0380x9cdata1.0705128205128205
                                                                        None0x6ca0d40x98data1.0723684210526316
                                                                        None0x6ca16c0xa6data1.0662650602409638
                                                                        None0x6ca2140xf6data1.0447154471544715
                                                                        None0x6ca30c0xccdata1.053921568627451
                                                                        None0x6ca3d80x158data1.0319767441860466
                                                                        None0x6ca5300xe0data1.0491071428571428
                                                                        None0x6ca6100xa2data1.0679012345679013
                                                                        None0x6ca6b40xbcdata1.0585106382978724
                                                                        None0x6ca7700xd8data1.0509259259259258
                                                                        None0x6ca8480xa6data1.0662650602409638
                                                                        None0x6ca8f00xeadata1.047008547008547
                                                                        None0x6ca9dc0xe0data1.0491071428571428
                                                                        None0x6caabc0xbadata1.0591397849462365
                                                                        None0x6cab780xbedata1.0578947368421052
                                                                        None0x6cac380x94data1.0743243243243243
                                                                        None0x6caccc0x13eOpenPGP Public Key Version 5, Created Sun Dec 7 14:05:53 2014, Unknown Algorithm (0x31)1.0345911949685536
                                                                        None0x6cae0c0xe8data1.0474137931034482
                                                                        None0x6caef40xc4data1.0561224489795917
                                                                        None0x6cafb80xcadata1.0544554455445545
                                                                        None0x6cb0840x16adata1.0303867403314917
                                                                        None0x6cb1f00xe4data1.0482456140350878
                                                                        None0x6cb2d40x12cdata1.0366666666666666
                                                                        None0x6cb4000xfedata1.0433070866141732
                                                                        None0x6cb5000x158data1.0319767441860466
                                                                        None0x6cb6580x116data1.039568345323741
                                                                        None0x6cb7700x10adata1.0413533834586466
                                                                        None0x6cb87c0x178data1.0292553191489362
                                                                        None0x6cb9f40x70data1.0982142857142858
                                                                        None0x6cba640x66data1.107843137254902
                                                                        None0x6cbacc0x9cdata1.0705128205128205
                                                                        None0x6cbb680x142data1.0341614906832297
                                                                        None0x6cbcac0x15adata1.0317919075144508
                                                                        None0x6cbe080x132data1.0359477124183007
                                                                        None0x6cbf3c0x96data1.0733333333333333
                                                                        None0x6cbfd40x160data1.03125
                                                                        None0x6cc1340xbadata1.0591397849462365
                                                                        None0x6cc1f00x182data1.028497409326425
                                                                        None0x6cc3740xbcdata1.0585106382978724
                                                                        None0x6cc4300xfcdata1.0436507936507937
                                                                        None0x6cc52c0xd4data1.0518867924528301
                                                                        None0x6cc6000x13cdata1.0348101265822784
                                                                        None0x6cc73c0x13adata1.035031847133758
                                                                        None0x6cc8780x86data1.0820895522388059
                                                                        None0x6cc9000xb2data1.0617977528089888
                                                                        None0x6cc9b40xe0data1.0491071428571428
                                                                        None0x6cca940x17edata1.0287958115183247
                                                                        None0x6ccc140xc0data1.0572916666666667
                                                                        None0x6cccd40xc6data1.0555555555555556
                                                                        None0x6ccd9c0xaedata1.0632183908045978
                                                                        None0x6cce4c0xd8data1.0509259259259258
                                                                        None0x6ccf240x9edata1.0696202531645569
                                                                        None0x6ccfc40xc6data1.0555555555555556
                                                                        None0x6cd08c0xa6data1.0662650602409638
                                                                        None0x6cd1340x88data1.0808823529411764
                                                                        None0x6cd1bc0x118data1.0392857142857144
                                                                        None0x6cd2d40xdadata1.0504587155963303
                                                                        None0x6cd3b00xe2data1.0486725663716814
                                                                        None0x6cd4940xccOpenPGP Secret Key1.053921568627451
                                                                        None0x6cd5600x146data1.0337423312883436
                                                                        None0x6cd6a80xdcdata1.05
                                                                        None0x6cd7840x156data1.0321637426900585
                                                                        None0x6cd8dc0xfcdata1.0436507936507937
                                                                        None0x6cd9d80xf0data1.0458333333333334
                                                                        None0x6cdac80xdedata1.0495495495495495
                                                                        None0x6cdba80x7cOpenPGP Public Key1.0887096774193548
                                                                        None0x6cdc240xd8data1.0509259259259258
                                                                        None0x6cdcfc0xacdata1.063953488372093
                                                                        None0x6cdda80x102data1.0426356589147288
                                                                        None0x6cdeac0x9adata1.0714285714285714
                                                                        None0x6cdf480xc2data1.056701030927835
                                                                        None0x6ce00c0xa2data1.0679012345679013
                                                                        None0x6ce0b00xcedata1.0533980582524272
                                                                        None0x6ce1800x9cdata1.0705128205128205
                                                                        None0x6ce21c0x144data1.0339506172839505
                                                                        None0x6ce3600xb6data1.0604395604395604
                                                                        None0x6ce4180x150data1.0327380952380953
                                                                        None0x6ce5680x126data1.0374149659863945
                                                                        None0x6ce6900xeadata1.047008547008547
                                                                        None0x6ce77c0x160data1.03125
                                                                        None0x6ce8dc0x14adata1.0333333333333334
                                                                        None0x6cea280xaadata1.0647058823529412
                                                                        None0x6cead40xaadata1.0647058823529412
                                                                        None0x6ceb800xb6data1.0604395604395604
                                                                        None0x6cec380x11cdata1.0387323943661972
                                                                        None0x6ced540xe4data1.0482456140350878
                                                                        None0x6cee380xbadata1.0591397849462365
                                                                        None0x6ceef40x192data1.027363184079602
                                                                        None0x6cf0880x102data1.0426356589147288
                                                                        None0x6cf18c0xd0data1.0528846153846154
                                                                        None0x6cf25c0xa0data1.06875
                                                                        None0x6cf2fc0x1b6data1.0251141552511416
                                                                        None0x6cf4b40x134data1.0357142857142858
                                                                        None0x6cf5e80xc6data1.0555555555555556
                                                                        None0x6cf6b00xd8data1.0509259259259258
                                                                        DLLImport
                                                                        api-ms-win-crt-heap-l1-1-0.dllfree
                                                                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                                        api-ms-win-crt-math-l1-1-0.dllcosf
                                                                        api-ms-win-crt-runtime-l1-1-0.dllexit
                                                                        api-ms-win-crt-stdio-l1-1-0.dllfseek
                                                                        api-ms-win-crt-string-l1-1-0.dllstrcmp
                                                                        api-ms-win-crt-utility-l1-1-0.dllqsort
                                                                        d3d9.dllDirect3DCreate9
                                                                        IMM32.dllImmGetContext
                                                                        kernEl32.dllLoadLibraryA, DeleteAtom, GetProcAddress, VirtualProtect
                                                                        MSVCP140.dll_Query_perf_counter
                                                                        Ole32.dllCoTaskMemFree
                                                                        SHELL32.dllShellExecuteA
                                                                        USER32.dllSetCursor
                                                                        VCRUNTIME140.dllmemcpy
                                                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishUnited States
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2024-12-08T02:12:09.105297+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849705104.26.9.59443TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 8, 2024 02:12:07.374892950 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:07.374914885 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:07.375066042 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:07.385560989 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:07.385576963 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:08.625339031 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:08.625427008 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:08.683504105 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:08.683517933 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:08.683886051 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:08.683952093 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:08.685735941 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:08.731329918 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:09.105317116 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:09.105416059 CET44349705104.26.9.59192.168.2.8
                                                                        Dec 8, 2024 02:12:09.105422020 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:09.105462074 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:09.106522083 CET49705443192.168.2.8104.26.9.59
                                                                        Dec 8, 2024 02:12:09.106534958 CET44349705104.26.9.59192.168.2.8
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 8, 2024 02:12:07.229907036 CET5729353192.168.2.81.1.1.1
                                                                        Dec 8, 2024 02:12:07.367870092 CET53572931.1.1.1192.168.2.8
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Dec 8, 2024 02:12:07.229907036 CET192.168.2.81.1.1.10xd4cStandard query (0)api.myip.comA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Dec 8, 2024 02:12:07.367870092 CET1.1.1.1192.168.2.80xd4cNo error (0)api.myip.com104.26.9.59A (IP address)IN (0x0001)false
                                                                        Dec 8, 2024 02:12:07.367870092 CET1.1.1.1192.168.2.80xd4cNo error (0)api.myip.com104.26.8.59A (IP address)IN (0x0001)false
                                                                        Dec 8, 2024 02:12:07.367870092 CET1.1.1.1192.168.2.80xd4cNo error (0)api.myip.com172.67.75.163A (IP address)IN (0x0001)false
                                                                        • api.myip.com
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.849705104.26.9.594437516C:\Users\user\Desktop\WaveExecutor.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-12-08 01:12:08 UTC182OUTGET / HTTP/1.1
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43
                                                                        Host: api.myip.com
                                                                        2024-12-08 01:12:09 UTC784INHTTP/1.1 200 OK
                                                                        Date: Sun, 08 Dec 2024 01:12:08 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        vary: Accept-Encoding
                                                                        CF-Cache-Status: DYNAMIC
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c3kpMN1cUR4Xoq3H0xg4I2DYMbC6fZhZq%2F5QJ8B%2FD9Cw20DVOYyca7v9%2BdUTlXY4lXF%2BWC5lZcVWTYT79CFhGYz6C5WNHU7dkieIV6i1WG%2FAYRL4zUjfVRyy%2F0fTYw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8ee8e2af9c08423a-EWR
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2224&min_rtt=2214&rtt_var=851&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=820&delivery_rate=1270670&cwnd=170&unsent_bytes=0&cid=d93003c86295a372&ts=491&x=0"
                                                                        2024-12-08 01:12:09 UTC63INData Raw: 33 39 0d 0a 7b 22 69 70 22 3a 22 38 2e 34 36 2e 31 32 33 2e 32 32 38 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 63 22 3a 22 55 53 22 7d 0d 0a
                                                                        Data Ascii: 39{"ip":"8.46.123.228","country":"United States","cc":"US"}
                                                                        2024-12-08 01:12:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:20:12:04
                                                                        Start date:07/12/2024
                                                                        Path:C:\Users\user\Desktop\WaveExecutor.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Users\user\Desktop\WaveExecutor.exe"
                                                                        Imagebase:0x7ff651fe0000
                                                                        File size:1'390'123 bytes
                                                                        MD5 hash:20530C9BC61569E79D6FFECE7F7E426A
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:low
                                                                        Has exited:false

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:2.7%
                                                                          Dynamic/Decrypted Code Coverage:9.2%
                                                                          Signature Coverage:26.2%
                                                                          Total number of Nodes:694
                                                                          Total number of Limit Nodes:26
                                                                          execution_graph 89128 2c33add10e0 89136 2c33acc52b0 89128->89136 89130 2c33add1106 CreateToolhelp32Snapshot 89131 2c33add1122 89130->89131 89132 2c33add1177 Process32NextW 89131->89132 89133 2c33add1129 89131->89133 89132->89133 89135 2c33add119d Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 89132->89135 89134 2c33add12d0 Process32NextW 89134->89133 89134->89135 89135->89134 89137 2c33acc52d2 Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 89136->89137 89137->89130 89236 2c33acc6fe0 89237 2c33acc7001 std::_Fac_node::_Fac_node Concurrency::details::stl_critical_section_vista::try_lock_for 89236->89237 89238 2c33acc75bc CreateToolhelp32Snapshot 89237->89238 89239 2c33acc7633 Process32FirstW 89238->89239 89242 2c33acc75d7 type_info::_name_internal_method 89238->89242 89241 2c33acc7659 89239->89241 89239->89242 89240 2c33acc779d Process32NextW 89240->89241 89240->89242 89241->89240 89241->89242 89243 2c33ad87750 89244 2c33ad877a4 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 89243->89244 89245 2c33ad8788c CryptUnprotectData 89244->89245 89246 2c33ad878cd type_info::_name_internal_method 89245->89246 89247 7ff65203bb9c 89248 7ff65203bbac 89247->89248 89256 7ff65203b96c 89248->89256 89251 7ff65203bc51 89252 7ff65203bbd0 Concurrency::details::ResourceManager::CreateNodeTopology _RTC_Initialize 89253 7ff65203bc1e 00007FFBC92F1B20 89252->89253 89254 7ff65203bc2a 89252->89254 89253->89254 89255 7ff65203bc41 89254->89255 89261 7ff65203c0f8 7 API calls 89254->89261 89257 7ff65203b97d 89256->89257 89260 7ff65203b982 __scrt_release_startup_lock 89256->89260 89257->89260 89262 7ff65203c0f8 7 API calls 89257->89262 89259 7ff65203b9f6 89260->89252 89261->89251 89262->89259 89263 2c33adaa2f0 89264 2c33accc520 Concurrency::details::WorkQueue::IsStructuredEmpty 89263->89264 89265 2c33adaa315 CreateFileA 89264->89265 89266 2c33adaa355 type_info::_name_internal_method 89265->89266 89267 2c33ada9e50 CreateFileA 89266->89267 89268 2c33adaa389 89267->89268 89269 2c33adaa470 89270 2c33adaa490 Concurrency::details::WorkQueue::IsStructuredEmpty 89269->89270 89271 2c33adaa4bb CreateFileA ReadFile 89270->89271 89272 2c33adaa525 type_info::_name_internal_method 89271->89272 89138 7ff652033b90 89139 7ff652033bcd 89138->89139 89140 7ff652033bd2 89139->89140 89141 7ff652033c9a PostQuitMessage 89139->89141 89142 7ff652033bf2 89139->89142 89141->89140 89143 7ff652033bf9 89142->89143 89144 7ff652033c24 89142->89144 89145 7ff652033cbe 89143->89145 89146 7ff652033c11 89143->89146 89144->89140 89152 7ff652033b20 89144->89152 89145->89140 89149 7ff652033ccd GetWindowRect 89145->89149 89146->89140 89148 7ff652033db1 NtdllDefWindowProc_A 89146->89148 89148->89140 89149->89140 89150 7ff652033d51 89149->89150 89150->89140 89151 7ff652033d76 SetWindowPos 89150->89151 89151->89140 89153 7ff652033b29 89152->89153 89156 7ff65202f630 89153->89156 89157 7ff65202f640 89156->89157 89158 7ff65202f657 89156->89158 89157->89158 89160 7ff65202f2f0 89157->89160 89158->89140 89161 7ff65202f313 89160->89161 89168 7ff652011770 89161->89168 89163 7ff65202f36a 89164 7ff65202f4b0 00007FFBBBD91310 89163->89164 89165 7ff65202f583 89163->89165 89167 7ff65202f4d3 89163->89167 89164->89164 89164->89167 89165->89158 89166 7ff65202f57a 00007FFBC92DF020 89166->89165 89167->89165 89167->89166 89169 7ff65201190a 89168->89169 89170 7ff6520117a6 89168->89170 89169->89163 89170->89169 89172 7ff6520121b0 89170->89172 89173 7ff6520121e2 89172->89173 89177 7ff652011ec0 89173->89177 89178 7ff652011f23 89177->89178 89180 7ff652012016 89178->89180 89185 7ff6520173d0 00007FFBBBD91310 89178->89185 89187 7ff652011d00 7 API calls 89180->89187 89182 7ff652012191 00007FFBC92DF020 89182->89169 89183 7ff652011fcf 89183->89180 89186 7ff6520173d0 00007FFBBBD91310 89183->89186 89185->89183 89186->89183 89187->89182 89188 7ff652031b90 89191 7ff652031c2c 89188->89191 89189 7ff652031eef 89190 7ff652031dbb LoadLibraryA 89190->89191 89191->89189 89191->89190 89192 2c33acef46a 89209 2c33accc520 89192->89209 89194 2c33acef480 FindFirstFileA 89195 2c33acef4e9 type_info::_name_internal_method 89194->89195 89208 2c33acef4a4 89194->89208 89197 2c33acef559 type_info::_name_internal_method 89195->89197 89217 2c33acefe00 CreateToolhelp32Snapshot Process32NextW Process32NextW type_info::_name_internal_method 89195->89217 89211 2c33addb740 89197->89211 89199 2c33acef5ea 89200 2c33acef6c1 type_info::_name_internal_method 89199->89200 89201 2c33acef5fb type_info::_name_internal_method 89199->89201 89200->89208 89219 2c33ad8a1f0 4 API calls 4 library calls 89200->89219 89201->89208 89218 2c33acefe00 CreateToolhelp32Snapshot Process32NextW Process32NextW type_info::_name_internal_method 89201->89218 89204 2c33acef773 type_info::_name_internal_method 89204->89208 89220 2c33ad8acd0 7 API calls 4 library calls 89204->89220 89206 2c33acef82c type_info::_name_internal_method 89206->89208 89221 2c33acee2c0 CreateToolhelp32Snapshot Process32NextW Process32NextW Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 89206->89221 89210 2c33accc536 Concurrency::details::WorkQueue::IsStructuredEmpty 89209->89210 89210->89194 89212 2c33addb770 type_info::_name_internal_method 89211->89212 89222 2c33ada9e50 89212->89222 89214 2c33addb797 type_info::_name_internal_method 89214->89199 89215 2c33addb780 std::_Facet_Register type_info::_name_internal_method 89215->89214 89226 2c33add7650 89215->89226 89217->89197 89218->89208 89219->89204 89220->89206 89221->89208 89223 2c33ada9e72 Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 89222->89223 89224 2c33ada9f5b CreateFileA 89223->89224 89225 2c33ada9f93 89224->89225 89225->89215 89227 2c33add767e std::_Fac_node::_Fac_node type_info::_name_internal_method Concurrency::details::stl_critical_section_vista::try_lock_for 89226->89227 89228 2c33ada9e50 CreateFileA 89227->89228 89229 2c33add7793 89228->89229 89231 2c33add77a0 type_info::_name_internal_method 89229->89231 89232 2c33adaa3d0 89229->89232 89231->89214 89233 2c33accc520 Concurrency::details::WorkQueue::IsStructuredEmpty 89232->89233 89234 2c33adaa3fc CreateFileA ReadFile 89233->89234 89235 2c33adaa45f 89234->89235 89235->89231 89273 7ff65202f7a0 89275 7ff65202f7b6 89273->89275 89274 7ff65202f7fb QueryPerformanceFrequency 89276 7ff65202f811 QueryPerformanceCounter 89274->89276 89277 7ff65202fa2e 89274->89277 89275->89274 89276->89277 89278 7ff65202f827 89276->89278 89279 7ff65202f8cc GetKeyboardLayout GetLocaleInfoA 89278->89279 89282 7ff65202f936 89279->89282 89280 7ff65202f9c0 LoadLibraryA 89281 7ff65202f9ef GetProcAddress GetProcAddress 89280->89281 89280->89282 89282->89280 89283 7ff65202f9dc 89282->89283 89284 7ff65203bc80 89285 7ff65203bc94 89284->89285 89286 7ff65203bdcc 89285->89286 89287 7ff65203bc9c 89285->89287 89336 7ff65203c0f8 7 API calls 89286->89336 89289 7ff65203bdd6 89287->89289 89295 7ff65203bcba __scrt_release_startup_lock 89287->89295 89337 7ff65203c0f8 7 API calls 89289->89337 89291 7ff65203bcdf 89292 7ff65203bde1 89338 7ff65203c388 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 89292->89338 89294 7ff65203bdfd __scrt_common_main_seh 89295->89291 89303 7ff65203c240 89295->89303 89297 7ff65203bd6a 89306 7ff652036800 89297->89306 89301 7ff65203bd8d 89301->89292 89302 7ff65203bd91 89301->89302 89302->89291 89304 7ff65203c525 89303->89304 89305 7ff65203c257 GetStartupInfoW 89304->89305 89305->89297 89307 7ff65203682f 89306->89307 89339 7ff652037c90 89307->89339 89309 7ff652036945 89343 7ff652033de0 7 API calls 89309->89343 89311 7ff652036972 89312 7ff652037c90 00007FFBC92DF020 89311->89312 89313 7ff65203697f 89312->89313 89314 7ff652037c90 00007FFBC92DF020 89313->89314 89315 7ff65203698d 89314->89315 89344 7ff652033f70 00007FFBAAC45F50 89315->89344 89319 7ff652036998 89351 7ff6520358d0 GetModuleFileNameA 89319->89351 89321 7ff652036ab4 89551 7ff652034120 109 API calls 89321->89551 89324 7ff652036ab9 89552 7ff652033f40 DestroyWindow UnregisterClassA 89324->89552 89325 7ff65203699d 89325->89321 89332 7ff652037c90 00007FFBC92DF020 89325->89332 89333 7ff652036a48 MessageBoxA 89325->89333 89435 7ff652034140 89325->89435 89444 7ff652034320 89325->89444 89533 7ff6520341d0 89325->89533 89542 7ff652038480 89325->89542 89546 7ff652038810 89325->89546 89329 7ff652036ac3 89335 7ff65203c288 GetModuleHandleW 89329->89335 89332->89325 89334 7ff652037c90 00007FFBC92DF020 89333->89334 89334->89325 89335->89301 89336->89289 89337->89292 89338->89294 89341 7ff652037cb0 Concurrency::details::ResourceManager::CreateNodeTopology 89339->89341 89340 7ff652037d61 89340->89309 89341->89340 89553 7ff65203b808 89341->89553 89343->89311 89345 7ff652033f92 89344->89345 89346 7ff6520340a0 89345->89346 89556 7ff651ff7c60 00007FFBC92F5630 89346->89556 89348 7ff6520340dc 89559 7ff651fe5be0 89348->89559 89350 7ff6520340e3 89350->89319 89353 7ff652035921 89351->89353 89352 7ff652037c90 00007FFBC92DF020 89370 7ff652035a3a 89352->89370 89353->89352 89354 7ff652035bef 89355 7ff652035c98 89354->89355 89357 7ff652037c90 00007FFBC92DF020 89354->89357 89356 7ff652035cb6 89355->89356 89358 7ff652037c90 00007FFBC92DF020 89355->89358 89359 7ff652035cd4 89356->89359 89360 7ff652037c90 00007FFBC92DF020 89356->89360 89357->89355 89358->89356 89361 7ff652035cf2 89359->89361 89362 7ff652037c90 00007FFBC92DF020 89359->89362 89360->89359 89363 7ff6520361c6 89361->89363 89375 7ff652035d00 89361->89375 89362->89361 89364 7ff65203620a 89363->89364 89365 7ff652036411 89363->89365 89589 7ff652037650 00007FFBBBD91310 00007FFBC92DF020 89364->89589 89371 7ff6520377a0 00007FFBC92DF020 89365->89371 89367 7ff65203621e 89590 7ff652037650 00007FFBBBD91310 00007FFBC92DF020 89367->89590 89368 7ff652037c90 00007FFBC92DF020 89368->89354 89370->89354 89370->89368 89373 7ff652036494 89371->89373 89372 7ff652036232 89391 7ff652037c90 00007FFBC92DF020 89372->89391 89374 7ff652037c90 00007FFBC92DF020 89373->89374 89377 7ff6520364a1 89374->89377 89376 7ff652037c90 00007FFBC92DF020 89375->89376 89378 7ff652035e44 89376->89378 89383 7ff6520377a0 00007FFBC92DF020 89377->89383 89390 7ff652036554 89377->89390 89585 7ff6520377a0 89378->89585 89381 7ff652035e79 89384 7ff652037c90 00007FFBC92DF020 89381->89384 89382 7ff652036569 89593 7ff652037650 00007FFBBBD91310 00007FFBC92DF020 89382->89593 89386 7ff652036547 89383->89386 89387 7ff652035e86 89384->89387 89388 7ff652037c90 00007FFBC92DF020 89386->89388 89389 7ff652037c90 00007FFBC92DF020 89387->89389 89388->89390 89408 7ff652035e94 89389->89408 89592 7ff652037650 00007FFBBBD91310 00007FFBC92DF020 89390->89592 89392 7ff652036378 89391->89392 89591 7ff652038af0 00007FFBBBD91310 00007FFBC92DF020 89392->89591 89394 7ff6520363c6 89395 7ff6520377a0 00007FFBC92DF020 89394->89395 89396 7ff6520363e2 89395->89396 89397 7ff652037c90 00007FFBC92DF020 89396->89397 89398 7ff6520363ef 89397->89398 89399 7ff652037c90 00007FFBC92DF020 89398->89399 89401 7ff6520363fd 89399->89401 89400 7ff652037c90 00007FFBC92DF020 89403 7ff6520366c3 89400->89403 89404 7ff652037c90 00007FFBC92DF020 89401->89404 89402 7ff65203657d 89402->89400 89594 7ff652038af0 00007FFBBBD91310 00007FFBC92DF020 89403->89594 89407 7ff65203640b 89404->89407 89405 7ff652037c90 00007FFBC92DF020 89409 7ff652035fda 89405->89409 89411 7ff652037c90 00007FFBC92DF020 89407->89411 89408->89405 89412 7ff6520377a0 00007FFBC92DF020 89409->89412 89410 7ff652036711 89413 7ff6520377a0 00007FFBC92DF020 89410->89413 89414 7ff6520361c0 GetCurrentDirectoryA 89411->89414 89415 7ff65203600f 89412->89415 89416 7ff65203672d 89413->89416 89426 7ff652036788 89414->89426 89418 7ff652037c90 00007FFBC92DF020 89415->89418 89419 7ff652037c90 00007FFBC92DF020 89416->89419 89420 7ff65203601c 89418->89420 89421 7ff65203673a 89419->89421 89422 7ff652037c90 00007FFBC92DF020 89420->89422 89423 7ff652037c90 00007FFBC92DF020 89421->89423 89428 7ff65203602a 89422->89428 89424 7ff652036748 89423->89424 89425 7ff652037c90 00007FFBC92DF020 89424->89425 89425->89407 89426->89325 89426->89426 89427 7ff652037c90 00007FFBC92DF020 89429 7ff652036170 89427->89429 89428->89427 89430 7ff6520377a0 00007FFBC92DF020 89429->89430 89431 7ff6520361a5 89430->89431 89432 7ff652037c90 00007FFBC92DF020 89431->89432 89433 7ff6520361b2 89432->89433 89434 7ff652037c90 00007FFBC92DF020 89433->89434 89434->89414 89436 7ff652034144 PeekMessageA 89435->89436 89437 7ff6520341ad 89436->89437 89438 7ff652034163 TranslateMessage DispatchMessageA 89436->89438 89595 7ff652030330 89437->89595 89439 7ff6520341ab 89438->89439 89441 7ff652034181 89438->89441 89439->89436 89441->89325 89445 7ff652034358 89444->89445 89447 7ff652034619 89445->89447 89710 7ff6520326c0 89445->89710 89448 7ff652034f7c 89447->89448 89451 7ff652034659 89447->89451 89449 7ff652038480 2 API calls 89448->89449 89450 7ff652034fce 89449->89450 89452 7ff652037c90 00007FFBC92DF020 89450->89452 89453 7ff6520346c0 SHBrowseForFolder 89451->89453 89456 7ff65203480d 89451->89456 89461 7ff652034fdc 89452->89461 89454 7ff652034722 SHGetPathFromIDList 89453->89454 89453->89456 89455 7ff6520347fe CoTaskMemFree 89454->89455 89460 7ff652034740 89454->89460 89455->89456 89457 7ff652038480 2 API calls 89456->89457 89458 7ff65203485f 89457->89458 89459 7ff652037c90 00007FFBC92DF020 89458->89459 89463 7ff65203486d 89459->89463 89460->89455 89819 7ff6520102a0 6 API calls 89461->89819 89787 7ff6520102a0 6 API calls 89463->89787 89465 7ff652035101 89820 7ff6520102a0 6 API calls 89465->89820 89467 7ff6520349b8 89788 7ff6520102a0 6 API calls 89467->89788 89469 7ff6520351d3 89821 7ff6520102a0 6 API calls 89469->89821 89471 7ff652034a9d 89789 7ff6520102a0 6 API calls 89471->89789 89473 7ff6520352a5 89822 7ff6520102a0 6 API calls 89473->89822 89475 7ff652034b6f 89790 7ff6520102a0 6 API calls 89475->89790 89477 7ff652035377 89823 7ff6520102a0 6 API calls 89477->89823 89479 7ff65203544e 89824 7ff65201f580 8 API calls __swprintf_l 89479->89824 89481 7ff652034c41 89791 7ff6520102a0 6 API calls 89481->89791 89482 7ff652035486 89825 7ff651ff92e0 00007FFBBBD91310 00007FFBC92DF020 89482->89825 89485 7ff6520354a0 89826 7ff652021520 14 API calls 89485->89826 89486 7ff652034d18 89792 7ff651ff92e0 00007FFBBBD91310 00007FFBC92DF020 89486->89792 89489 7ff6520354cc 89827 7ff651ff9390 46 API calls 89489->89827 89490 7ff652034d51 89793 7ff65201f580 8 API calls __swprintf_l 89490->89793 89493 7ff652034d5d 89794 7ff651ff9390 46 API calls 89493->89794 89495 7ff6520354d2 89501 7ff6520355b3 89495->89501 89828 7ff651fe39b0 00007FFBBBD91310 00007FFBC92DF020 89495->89828 89496 7ff652034d62 89795 7ff651ff92e0 00007FFBBBD91310 00007FFBC92DF020 89496->89795 89499 7ff652034d9b 89796 7ff6520232d0 61 API calls 89499->89796 89500 7ff65203552b 89829 7ff651fe39b0 00007FFBBBD91310 00007FFBC92DF020 89500->89829 89502 7ff652035631 89501->89502 89505 7ff652035628 ExitProcess 89501->89505 89506 7ff652035660 89502->89506 89831 7ff651fe3a20 46 API calls 89502->89831 89504 7ff652034dcc 89797 7ff651ff9390 46 API calls 89504->89797 89505->89502 89507 7ff652037c90 00007FFBC92DF020 89506->89507 89511 7ff652034f76 89507->89511 89804 7ff651ff2ba0 89511->89804 89512 7ff65203564c 89832 7ff651fe3a20 46 API calls 89512->89832 89515 7ff652035656 89833 7ff651fe3a20 46 API calls 89515->89833 89516 7ff652035674 89516->89325 89517 7ff652034dd1 89798 7ff651ff92e0 00007FFBBBD91310 00007FFBC92DF020 89517->89798 89518 7ff65203556f 89830 7ff651fe39b0 00007FFBBBD91310 00007FFBC92DF020 89518->89830 89522 7ff652034e0a 89799 7ff651ff9390 46 API calls 89522->89799 89524 7ff652034e0f 89525 7ff652034f1a 89524->89525 89526 7ff652034e77 RemoveDirectoryA CreateDirectoryA 89524->89526 89529 7ff652037c90 00007FFBC92DF020 89525->89529 89527 7ff652034e98 MessageBoxA 89526->89527 89528 7ff652034ebf 89526->89528 89527->89525 89800 7ff65203bb34 89528->89800 89529->89511 89936 7ff651febc50 89533->89936 89537 7ff652034297 89989 7ff65202ea60 89537->89989 89538 7ff6520342a4 89540 7ff652033b20 11 API calls 89538->89540 89541 7ff652034312 89538->89541 89540->89541 89541->89325 89543 7ff6520384b1 89542->89543 89543->89543 90014 7ff65203a000 89543->90014 89545 7ff6520384f4 89545->89325 90021 7ff652038840 89546->90021 89548 7ff652038828 90024 7ff65203a2d0 89548->90024 89551->89324 89552->89329 89554 7ff65203be08 00007FFBC92DF020 89553->89554 89557 7ff651ff7c98 00007FFBC92F5630 89556->89557 89558 7ff651ff7cad 89556->89558 89557->89558 89558->89348 89561 7ff651fe5bfd 89559->89561 89560 7ff651fe5c91 89565 7ff651fe6cb0 89560->89565 89561->89560 89577 7ff651fe5d90 00007FFBC92DF020 00007FFBC92FA0D0 89561->89577 89564 7ff651fe5ca0 89564->89350 89566 7ff651fe6cda 89565->89566 89578 7ff6520026b0 89566->89578 89568 7ff651fe6e3e 89569 7ff6520026b0 2 API calls 89568->89569 89572 7ff651fe6f6c 89569->89572 89570 7ff651fe722d 89573 7ff651fe728a 89570->89573 89584 7ff652003900 00007FFBBBD91310 00007FFBC92DF020 89570->89584 89572->89570 89574 7ff651fe7199 00007FFBBBD91310 89572->89574 89573->89564 89575 7ff651fe7224 00007FFBC92DF020 89574->89575 89576 7ff651fe71b8 89574->89576 89575->89570 89576->89575 89577->89560 89579 7ff6520026d2 89578->89579 89580 7ff6520027ac 89578->89580 89579->89580 89581 7ff65200271a 00007FFBBBD91310 89579->89581 89580->89568 89582 7ff6520027a3 00007FFBC92DF020 89581->89582 89583 7ff652002736 89581->89583 89582->89580 89583->89582 89584->89573 89586 7ff6520377cb 89585->89586 89587 7ff6520377c4 89585->89587 89588 7ff652037c90 00007FFBC92DF020 89586->89588 89587->89381 89588->89587 89589->89367 89590->89372 89591->89394 89592->89382 89593->89402 89594->89410 89596 7ff652030344 89595->89596 89597 7ff65203039b GetClientRect QueryPerformanceCounter 89596->89597 89598 7ff65203042b 89597->89598 89599 7ff652030445 GetForegroundWindow 89597->89599 89598->89599 89600 7ff652030457 89599->89600 89601 7ff6520304df 89599->89601 89603 7ff652030460 ClientToScreen 89600->89603 89604 7ff652030495 89600->89604 89602 7ff652030526 89601->89602 89606 7ff6520304f8 GetKeyState 89601->89606 89607 7ff65203056d 89602->89607 89612 7ff65203053f GetKeyState 89602->89612 89603->89604 89608 7ff652030487 SetCursorPos 89603->89608 89604->89601 89605 7ff6520304a4 GetCursorPos 89604->89605 89605->89601 89609 7ff6520304b3 ScreenToClient 89605->89609 89606->89602 89611 7ff65203050a 89606->89611 89610 7ff6520305b4 89607->89610 89614 7ff652030586 GetKeyState 89607->89614 89608->89604 89609->89601 89613 7ff6520304c5 89609->89613 89618 7ff6520305cd GetKeyState 89610->89618 89622 7ff6520305fb 89610->89622 89611->89602 89681 7ff651fe1f90 00007FFBC92DF020 89611->89681 89612->89607 89615 7ff652030551 89612->89615 89680 7ff651fe2260 00007FFBC92DF020 89613->89680 89614->89610 89617 7ff652030598 89614->89617 89615->89607 89682 7ff651fe1f90 00007FFBC92DF020 89615->89682 89617->89610 89683 7ff651fe1f90 00007FFBC92DF020 89617->89683 89620 7ff6520305df 89618->89620 89618->89622 89620->89622 89684 7ff651fe1f90 00007FFBC92DF020 89620->89684 89623 7ff652030625 89622->89623 89685 7ff65202fb70 LoadCursorA SetCursor SetCursor 89622->89685 89630 7ff65202fce0 89623->89630 89629 7ff651fe9e10 75 API calls 89629->89441 89631 7ff65202fd07 89630->89631 89632 7ff65202fdd3 89631->89632 89679 7ff652030301 89631->89679 89686 7ff651fe1f90 00007FFBC92DF020 89631->89686 89635 7ff65202fe0a 89632->89635 89687 7ff651fe1f90 00007FFBC92DF020 89632->89687 89636 7ff65202fe41 89635->89636 89688 7ff651fe1f90 00007FFBC92DF020 89635->89688 89639 7ff65202fe79 89636->89639 89689 7ff651fe1f90 00007FFBC92DF020 89636->89689 89640 7ff65202feae 89639->89640 89690 7ff651fe1f90 00007FFBC92DF020 89639->89690 89643 7ff65202fee6 89640->89643 89691 7ff651fe1f90 00007FFBC92DF020 89640->89691 89646 7ff65202ff1c 89643->89646 89692 7ff651fe1f90 00007FFBC92DF020 89643->89692 89644 7ff65202ff53 89651 7ff65202ff86 89644->89651 89694 7ff651fe1f90 00007FFBC92DF020 89644->89694 89646->89644 89693 7ff651fe1f90 00007FFBC92DF020 89646->89693 89649 7ff65202fff8 89650 7ff652030025 89649->89650 89697 7ff651fe1f90 00007FFBC92DF020 89649->89697 89698 7ff651fe1f90 00007FFBC92DF020 89650->89698 89654 7ff65202ffbc 89651->89654 89695 7ff651fe1f90 00007FFBC92DF020 89651->89695 89654->89649 89696 7ff651fe1f90 00007FFBC92DF020 89654->89696 89657 7ff652030070 89699 7ff651fe1f90 00007FFBC92DF020 89657->89699 89659 7ff65203010d 89702 7ff651fe1f90 00007FFBC92DF020 89659->89702 89660 7ff6520300a9 89661 7ff6520300dd 89660->89661 89700 7ff651fe1f90 00007FFBC92DF020 89660->89700 89661->89659 89701 7ff651fe1f90 00007FFBC92DF020 89661->89701 89665 7ff652030151 89703 7ff651fe1f90 00007FFBC92DF020 89665->89703 89667 7ff652030195 89704 7ff651fe1f90 00007FFBC92DF020 89667->89704 89669 7ff6520301d0 89705 7ff651fe1f90 00007FFBC92DF020 89669->89705 89671 7ff65203020b 89706 7ff651fe1f90 00007FFBC92DF020 89671->89706 89673 7ff652030246 89707 7ff651fe1f90 00007FFBC92DF020 89673->89707 89675 7ff652030281 89708 7ff651fe1f90 00007FFBC92DF020 89675->89708 89677 7ff6520302c2 89709 7ff651fe1f90 00007FFBC92DF020 89677->89709 89679->89629 89680->89601 89681->89602 89682->89607 89683->89610 89684->89622 89685->89623 89686->89632 89687->89635 89688->89636 89689->89639 89690->89640 89691->89643 89692->89646 89693->89644 89694->89651 89695->89654 89696->89649 89697->89650 89698->89657 89699->89660 89700->89661 89701->89659 89702->89665 89703->89667 89704->89669 89705->89671 89706->89673 89707->89675 89708->89677 89709->89679 89711 7ff6520326e5 89710->89711 89737 7ff6520326de 89710->89737 89834 7ff6520332e0 89711->89834 89713 7ff6520327a4 89840 7ff6520331c0 89713->89840 89715 7ff6520327db 89716 7ff652032805 GetModuleHandleA 89715->89716 89717 7ff652032831 89716->89717 89718 7ff652032865 89716->89718 89719 7ff652037c90 00007FFBC92DF020 89717->89719 89720 7ff652032872 GetProcAddress 89718->89720 89721 7ff652032847 89719->89721 89722 7ff652037c90 00007FFBC92DF020 89720->89722 89723 7ff652037c90 00007FFBC92DF020 89721->89723 89724 7ff6520328b5 89722->89724 89727 7ff652032852 89723->89727 89725 7ff652037c90 00007FFBC92DF020 89724->89725 89726 7ff6520328c0 89725->89726 89726->89727 89846 7ff652032150 89727->89846 89730 7ff652037c90 00007FFBC92DF020 89731 7ff65203298a VirtualAlloc 89730->89731 89733 7ff652032b69 89731->89733 89734 7ff652032b4c 89731->89734 89860 7ff652033520 89733->89860 89735 7ff652037b60 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFBC92DF020 89734->89735 89735->89737 89737->89447 89738 7ff652032bc9 89866 7ff652033400 89738->89866 89740 7ff652032c03 89741 7ff652032c33 GetModuleHandleA 89740->89741 89742 7ff652032c99 89741->89742 89743 7ff652032c5f 89741->89743 89746 7ff652032ca9 GetProcAddress 89742->89746 89744 7ff652037c90 00007FFBC92DF020 89743->89744 89745 7ff652032c78 89744->89745 89747 7ff652037c90 00007FFBC92DF020 89745->89747 89748 7ff652037c90 00007FFBC92DF020 89746->89748 89750 7ff652032c86 89747->89750 89749 7ff652032cef 89748->89749 89751 7ff652037c90 00007FFBC92DF020 89749->89751 89872 7ff652033760 89750->89872 89752 7ff652032cfd 89751->89752 89752->89750 89754 7ff652032d6a 89878 7ff652033640 89754->89878 89756 7ff652032da4 89757 7ff652032dd4 GetModuleHandleA 89756->89757 89758 7ff652032e3a 89757->89758 89759 7ff652032e00 89757->89759 89762 7ff652032e4a GetProcAddress 89758->89762 89760 7ff652037c90 00007FFBC92DF020 89759->89760 89761 7ff652032e19 89760->89761 89763 7ff652037c90 00007FFBC92DF020 89761->89763 89764 7ff652037c90 00007FFBC92DF020 89762->89764 89768 7ff652032e27 89763->89768 89765 7ff652032e90 89764->89765 89766 7ff652037c90 00007FFBC92DF020 89765->89766 89767 7ff652032e9e 89766->89767 89767->89768 89884 7ff6520339b0 89768->89884 89770 7ff652033014 89890 7ff652033890 89770->89890 89772 7ff65203304e 89773 7ff65203307e GetModuleHandleA 89772->89773 89774 7ff6520330aa 89773->89774 89775 7ff6520330e4 89773->89775 89776 7ff652037c90 00007FFBC92DF020 89774->89776 89778 7ff6520330f4 GetProcAddress 89775->89778 89777 7ff6520330c3 89776->89777 89779 7ff652037c90 00007FFBC92DF020 89777->89779 89780 7ff652037c90 00007FFBC92DF020 89778->89780 89781 7ff6520330d1 89779->89781 89782 7ff65203313a 89780->89782 89783 7ff652033159 CreateThread 89781->89783 89784 7ff652037c90 00007FFBC92DF020 89782->89784 89896 7ff652037b60 89783->89896 89785 7ff652033148 89784->89785 89785->89783 89787->89467 89788->89471 89789->89475 89790->89481 89791->89486 89792->89490 89793->89493 89794->89496 89795->89499 89796->89504 89797->89517 89798->89522 89799->89524 89801 7ff65203bb3f Concurrency::cancel_current_task 89800->89801 89802 7ff652034ed0 89801->89802 89803 7ff65203b808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFBC92DF020 89801->89803 89802->89525 89818 7ff65203a100 00007FFBC92DF020 89802->89818 89803->89802 89805 7ff651ff2bc3 89804->89805 89808 7ff651ff2bd8 89804->89808 89805->89808 89930 7ff651ff85b0 46 API calls 89805->89930 89807 7ff651ff2c6a 89809 7ff651ff2ca0 89807->89809 89932 7ff65201e910 46 API calls 89807->89932 89808->89807 89817 7ff651ff2e24 89808->89817 89931 7ff651ff85b0 46 API calls 89808->89931 89933 7ff651ff4290 46 API calls 89809->89933 89813 7ff651ff2cb3 89815 7ff651ff2d12 89813->89815 89934 7ff652000d50 00007FFBBBD91310 00007FFBC92DF020 89813->89934 89815->89817 89935 7ff651ff80d0 46 API calls 89815->89935 89817->89516 89818->89525 89819->89465 89820->89469 89821->89473 89822->89477 89823->89479 89824->89482 89825->89485 89826->89489 89827->89495 89828->89500 89829->89518 89830->89501 89831->89512 89832->89515 89833->89506 89835 7ff6520333ee 89834->89835 89836 7ff65203335f 89834->89836 89835->89713 89900 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89836->89900 89841 7ff6520332ce 89840->89841 89842 7ff65203323f 89840->89842 89841->89715 89901 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89842->89901 89847 7ff6520321bb Concurrency::details::ResourceManager::CreateNodeTopology 89846->89847 89848 7ff652037c90 00007FFBC92DF020 89847->89848 89849 7ff6520322d7 89848->89849 89850 7ff6520377a0 00007FFBC92DF020 89849->89850 89851 7ff65203230c 89850->89851 89852 7ff652037c90 00007FFBC92DF020 89851->89852 89858 7ff652032319 89852->89858 89853 7ff652032674 89854 7ff652037b60 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFBC92DF020 89853->89854 89855 7ff6520326a1 89854->89855 89855->89730 89856 7ff65203252c 89856->89853 89857 7ff652038c80 2 API calls 89856->89857 89857->89856 89858->89856 89902 7ff652038c80 89858->89902 89861 7ff65203362e 89860->89861 89862 7ff65203359f 89860->89862 89861->89738 89924 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89862->89924 89867 7ff65203347f 89866->89867 89871 7ff65203350e 89866->89871 89925 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89867->89925 89871->89740 89873 7ff6520337e9 89872->89873 89877 7ff652033878 89872->89877 89926 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89873->89926 89877->89754 89879 7ff65203374e 89878->89879 89880 7ff6520336bf 89878->89880 89879->89756 89927 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89880->89927 89885 7ff652033a2f 89884->89885 89889 7ff652033abe 89884->89889 89928 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89885->89928 89889->89770 89891 7ff65203390f 89890->89891 89895 7ff65203399e 89890->89895 89929 7ff65203b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 89891->89929 89895->89772 89898 7ff652037bca Concurrency::details::ResourceManager::CreateNodeTopology 89896->89898 89897 7ff652037c5a 89897->89737 89898->89897 89899 7ff65203b808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFBC92DF020 89898->89899 89899->89897 89903 7ff652038cd7 89902->89903 89905 7ff652038cb9 89902->89905 89906 7ff65203a4b0 89903->89906 89905->89858 89907 7ff65203a5bb 89906->89907 89908 7ff65203a719 89907->89908 89909 7ff65203a73b 89907->89909 89921 7ff65203b2b0 00007FFBBBD91310 89908->89921 89922 7ff65203b2b0 00007FFBBBD91310 89909->89922 89912 7ff65203a738 89917 7ff65203aba0 89912->89917 89913 7ff65203a75a 89923 7ff65203b2b0 00007FFBBBD91310 89913->89923 89918 7ff65203ac19 Concurrency::details::ResourceManager::CreateNodeTopology 89917->89918 89919 7ff65203b808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFBC92DF020 89918->89919 89920 7ff65203a7b3 89918->89920 89919->89920 89920->89905 89921->89912 89922->89913 89923->89912 89930->89808 89931->89807 89932->89809 89933->89813 89934->89815 89935->89817 89942 7ff651febc62 89936->89942 89937 7ff651febdb5 89943 7ff651febdc8 89937->89943 89994 7ff651ff80d0 46 API calls 89937->89994 89939 7ff651ff85b0 46 API calls 89939->89942 89940 7ff651ff2ba0 46 API calls 89940->89942 89942->89937 89942->89939 89942->89940 89942->89943 89965 7ff651fec1ec 89942->89965 89993 7ff651fecd70 46 API calls 89942->89993 89995 7ff651ff87d0 49 API calls 89943->89995 89945 7ff651ff2ba0 46 API calls 89947 7ff651febf96 89945->89947 89946 7ff651febecf 89949 7ff651febf2e 89946->89949 89996 7ff652001f40 00007FFBBBD91310 00007FFBC92DF020 00007FFBBBD91310 00007FFBC92DF020 printf 89946->89996 89955 7ff651febfae 89947->89955 89997 7ff652000500 46 API calls 89947->89997 89949->89945 89951 7ff651fec076 90000 7ff651fe94d0 12 API calls 89951->90000 89953 7ff651fec095 89954 7ff651fec0bc 89953->89954 90001 7ff652003400 00007FFBBBD91310 00007FFBC92DF020 89953->90001 90002 7ff652003400 00007FFBBBD91310 00007FFBC92DF020 89954->90002 89955->89951 89960 7ff651fec041 89955->89960 89998 7ff6520008d0 00007FFBC92DF020 00007FFBBBD91310 00007FFBC92DF020 00007FFBBBD91310 00007FFBC92DF020 89955->89998 89959 7ff651fec11a 89959->89965 90004 7ff6520039e0 00007FFBBBD91310 00007FFBC92DF020 89959->90004 89960->89951 89999 7ff651ffa780 46 API calls 89960->89999 89962 7ff651fec0d5 89962->89959 90003 7ff651feb200 00007FFBC92E49A0 00007FFBBBD91310 00007FFBC92DF020 89962->90003 89965->89538 89966 7ff651fec240 89965->89966 89967 7ff651fec254 89966->89967 89968 7ff651febc50 51 API calls 89967->89968 89971 7ff651fec283 89967->89971 89968->89971 89969 7ff651fec414 90007 7ff651feb850 12 API calls 89969->90007 89971->89969 89972 7ff652003400 00007FFBBBD91310 00007FFBC92DF020 89971->89972 89984 7ff651fec6ba 89971->89984 90005 7ff651fe9280 15 API calls 89971->90005 90006 7ff652010e30 00007FFBBBD91310 00007FFBC92DF020 89971->90006 89972->89971 89974 7ff651fec4fc 89988 7ff651fec524 89974->89988 90011 7ff651fe57a0 15 API calls 89974->90011 89976 7ff651fec4ac 89978 7ff651fec4d4 89976->89978 90009 7ff651feb310 9 API calls 89976->90009 89978->89974 90010 7ff651feb310 9 API calls 89978->90010 89981 7ff651fec598 00007FFBBBD91310 89981->89988 89982 7ff651fec419 89982->89976 90008 7ff651feb310 9 API calls 89982->90008 89984->89537 89985 7ff652003400 00007FFBBBD91310 00007FFBC92DF020 89985->89988 89988->89981 89988->89984 89988->89985 90012 7ff651fe9280 15 API calls 89988->90012 90013 7ff652010e30 00007FFBBBD91310 00007FFBC92DF020 89988->90013 89991 7ff65202ea84 89989->89991 89992 7ff65202ec57 89989->89992 89990 7ff65202ed5f 00007FFBBBD91310 89990->89991 89990->89992 89991->89990 89991->89991 89991->89992 89992->89538 89993->89942 89994->89943 89995->89946 89996->89949 89997->89955 89998->89960 89999->89951 90000->89953 90001->89954 90002->89962 90003->89962 90004->89965 90005->89971 90006->89971 90007->89982 90008->89982 90009->89978 90010->89974 90011->89988 90012->89988 90013->89988 90015 7ff65203a0b8 90014->90015 90016 7ff65203a03a 90014->90016 90020 7ff65203a7d0 00007FFBC92DF020 Concurrency::details::ResourceManager::CreateNodeTopology 90015->90020 90018 7ff65203a060 00007FFBBBD91310 90016->90018 90019 7ff65203a0ed 90018->90019 90019->89545 90020->90019 90028 7ff652031ab0 90021->90028 90023 7ff652038864 90023->89548 90026 7ff65203a2dc 90024->90026 90025 7ff652031ab0 00007FFBAB7936D0 90025->90026 90026->90025 90027 7ff652038830 90026->90027 90027->89325 90032 7ff65203d168 90028->90032 90031 7ff652031ad8 _Subatomic 90031->90023 90033 7ff652031ac3 00007FFBAB7936D0 90032->90033 90033->90031

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 7ff652034320-7ff6520345ff call 7ff652031840 call 7ff652004a60 call 7ff651fe3880 call 7ff652031840 call 7ff652004a60 call 7ff651fe3880 call 7ff652031840 call 7ff652004a60 call 7ff651fe3880 call 7ff652031840 call 7ff652004a60 call 7ff651fe3880 call 7ff652031840 call 7ff652004a60 call 7ff651fe3880 call 7ff652031840 call 7ff652004a60 call 7ff651fe3880 call 7ff651fe1080 * 2 call 7ff651ff40a0 call 7ff651fe1080 call 7ff651ff4130 47 7ff65203461a-7ff652034653 call 7ff652038250 call 7ff651ff0340 0->47 48 7ff652034601-7ff652034614 call 7ff6520326c0 0->48 55 7ff652034659-7ff6520346ba call 7ff651fe1080 call 7ff651ff9240 call 7ff651fe1080 call 7ff6520204f0 47->55 56 7ff652034f7c-7ff6520354e2 call 7ff651ff41b0 call 7ff6520379b0 call 7ff652038480 call 7ff652037c90 call 7ff652037480 call 7ff651fec720 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff651fe1080 call 7ff651ff9240 call 7ff65201f580 call 7ff651ff92a0 call 7ff651ff92e0 call 7ff651fe1080 call 7ff652021520 call 7ff651ff9390 47->56 51 7ff652034619 48->51 51->47 74 7ff65203480d-7ff652034e71 call 7ff651ff41b0 call 7ff6520379b0 call 7ff652038480 call 7ff652037c90 call 7ff652038250 call 7ff651fec720 call 7ff652038250 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652038250 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff652037480 call 7ff652004a30 call 7ff652004a50 call 7ff651fe1080 call 7ff651ff41e0 call 7ff6520102a0 call 7ff651fe1080 call 7ff651ff9240 call 7ff651ff92e0 call 7ff65201f580 call 7ff651ff9390 call 7ff651fe1080 call 7ff651ff9240 call 7ff651ff92e0 call 7ff6520232d0 call 7ff651ff9390 call 7ff651fe1080 call 7ff651ff9240 call 7ff651ff92e0 call 7ff651ff9390 call 7ff651fe1080 call 7ff651ff9240 call 7ff651fe1080 call 7ff6520204f0 55->74 75 7ff6520346c0-7ff65203471c SHBrowseForFolder 55->75 245 7ff6520354e8-7ff6520355b3 call 7ff652031840 call 7ff652004a60 call 7ff651fe39b0 call 7ff652031840 call 7ff652004a60 call 7ff651fe39b0 call 7ff652031840 call 7ff652004a60 call 7ff651fe39b0 56->245 246 7ff6520355b4-7ff652035615 call 7ff651fe1080 call 7ff651ff9240 call 7ff651fe1080 call 7ff6520204f0 56->246 317 7ff652034f69-7ff652034f77 call 7ff652037c90 74->317 318 7ff652034e77-7ff652034e96 RemoveDirectoryA CreateDirectoryA 74->318 75->74 78 7ff652034722-7ff65203473a SHGetPathFromIDList 75->78 81 7ff652034740-7ff65203477b 78->81 82 7ff6520347fe-7ff65203480c CoTaskMemFree 78->82 85 7ff652034780-7ff65203478d 81->85 82->74 85->85 88 7ff65203478f-7ff6520347d3 call 7ff652038250 85->88 96 7ff6520347d8-7ff6520347e5 88->96 96->96 99 7ff6520347e7-7ff6520347ec 96->99 102 7ff6520347ee-7ff6520347fc 99->102 102->82 102->102 245->246 272 7ff652035617-7ff652035626 246->272 273 7ff652035631-7ff652035640 246->273 272->273 277 7ff652035628-7ff652035630 ExitProcess 272->277 278 7ff652035661-7ff65203566e call 7ff652037c90 273->278 279 7ff652035642-7ff652035660 call 7ff651fe3a20 * 3 273->279 277->273 288 7ff65203566f-7ff65203567e call 7ff651ff2ba0 278->288 279->278 317->288 319 7ff652034e98-7ff652034eba MessageBoxA 318->319 320 7ff652034ebf-7ff652034ecb call 7ff65203bb34 318->320 319->317 324 7ff652034ed0-7ff652034ee1 320->324 325 7ff652034f3d 324->325 326 7ff652034ee3-7ff652034f3b call 7ff65203a100 324->326 328 7ff652034f49-7ff652034f61 325->328 326->328 328->317
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Directory$BrowseCreateExitFolderFreeFromListMessagePathProcessRemoveTask
                                                                          • String ID: Loader$...$C:\Users\user\Desktop\WaveExecutor$Fail$Failed to create setup directory$Install$P$WaveExecutor$WaveExecutor$choose install folder$continue$destinatinal folder$f$installation...
                                                                          • API String ID: 3810817069-47129801
                                                                          • Opcode ID: 07efe965cc40bf00cbb360a237ecad9b1944d4cf306ea226f799986d2252d6e3
                                                                          • Instruction ID: d12feafffb1f952b4bab0507fff67de7eb1f43f02cb494983843ed753210d4e4
                                                                          • Opcode Fuzzy Hash: 07efe965cc40bf00cbb360a237ecad9b1944d4cf306ea226f799986d2252d6e3
                                                                          • Instruction Fuzzy Hash: 54A2683290E78695E761DB22F8503AAB360FFD9344F484235D98DA76A9DF7CE148CB40

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: AddressPerformanceProcQuery$CounterFrequencyInfoKeyboardLayoutLibraryLoadLocale
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$XInputGetCapabilities$XInputGetState$i >= 0 && i < Size$imgui_impl_win32$io.BackendPlatformUserData == nullptr && "Already initialized a platform backend!"$xinput1_1.dll$xinput1_2.dll$xinput1_3.dll$xinput1_4.dll$xinput9_1_0.dll
                                                                          • API String ID: 2839060773-805143068
                                                                          • Opcode ID: 260d99728c683016137ac75114b4de807555a0406b12ed98fa5fd299fab68a23
                                                                          • Instruction ID: c7890772c19f3537688a10972a09fd7c0ef11e2a3048eb1bea90ab819c5b0558
                                                                          • Opcode Fuzzy Hash: 260d99728c683016137ac75114b4de807555a0406b12ed98fa5fd299fab68a23
                                                                          • Instruction Fuzzy Hash: F2717572A0AF8686D7148F15ED442A973B5FB54B88F485136CB8D93760EFBCE06AC740

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 359 7ff652030330-7ff652030342 360 7ff652030344-7ff65203034e 359->360 361 7ff652030352 359->361 363 7ff652030350 360->363 364 7ff652030375-7ff652030378 360->364 362 7ff652030354-7ff65203036e call 7ff65203d440 361->362 362->364 363->362 366 7ff65203037a-7ff652030394 call 7ff65203d440 364->366 367 7ff65203039b-7ff652030429 GetClientRect QueryPerformanceCounter 364->367 366->367 370 7ff65203042b-7ff65203043f call 7ff65203d440 367->370 371 7ff652030445-7ff652030451 GetForegroundWindow 367->371 370->371 374 7ff652030457-7ff65203045e 371->374 375 7ff6520304df-7ff6520304ed 371->375 378 7ff652030460-7ff652030485 ClientToScreen 374->378 379 7ff65203049e-7ff6520304a2 374->379 376 7ff652030526-7ff652030534 375->376 377 7ff6520304ef-7ff6520304f6 375->377 382 7ff652030536-7ff65203053d 376->382 383 7ff65203056d-7ff65203057b 376->383 377->376 381 7ff6520304f8-7ff652030508 GetKeyState 377->381 384 7ff652030487-7ff65203048f SetCursorPos 378->384 385 7ff652030495-7ff65203049c 378->385 379->375 380 7ff6520304a4-7ff6520304b1 GetCursorPos 379->380 380->375 386 7ff6520304b3-7ff6520304c3 ScreenToClient 380->386 381->376 389 7ff65203050a-7ff652030511 381->389 382->383 390 7ff65203053f-7ff65203054f GetKeyState 382->390 387 7ff65203057d-7ff652030584 383->387 388 7ff6520305b4-7ff6520305c2 383->388 384->385 385->375 385->379 386->375 391 7ff6520304c5-7ff6520304da call 7ff651fe2260 386->391 387->388 392 7ff652030586-7ff652030596 GetKeyState 387->392 393 7ff6520305fb-7ff6520305ff 388->393 394 7ff6520305c4-7ff6520305cb 388->394 389->376 395 7ff652030513-7ff652030521 call 7ff651fe1f90 389->395 390->383 396 7ff652030551-7ff652030558 390->396 391->375 392->388 398 7ff652030598-7ff65203059f 392->398 401 7ff652030608-7ff65203060f 393->401 402 7ff652030601-7ff652030606 393->402 394->393 399 7ff6520305cd-7ff6520305dd GetKeyState 394->399 395->376 396->383 403 7ff65203055a-7ff652030568 call 7ff651fe1f90 396->403 398->388 404 7ff6520305a1-7ff6520305af call 7ff651fe1f90 398->404 399->393 405 7ff6520305df-7ff6520305e6 399->405 406 7ff652030615-7ff652030618 401->406 402->406 403->383 404->388 405->393 411 7ff6520305e8-7ff6520305f6 call 7ff651fe1f90 405->411 408 7ff65203061a-7ff652030620 call 7ff65202fb70 406->408 409 7ff652030625-7ff652030628 call 7ff65202fce0 406->409 408->409 415 7ff65203062d-7ff652030634 409->415 411->393
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: State$Client$CursorScreen$CounterForegroundPerformanceQueryRectWindow
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "Context or backend not initialized? Did you call ImGui_ImplWin32_Init()?"$bd->hWnd != 0
                                                                          • API String ID: 1576454153-990843061
                                                                          • Opcode ID: b15be0b44c692230b85c4defaefc4a5a4583acdefd80d0cc3f04028913e3d836
                                                                          • Instruction ID: 7bda9616b07d76cba8d73462779a79247c677dd036cb28cd2ed0c21061a8c7bc
                                                                          • Opcode Fuzzy Hash: b15be0b44c692230b85c4defaefc4a5a4583acdefd80d0cc3f04028913e3d836
                                                                          • Instruction Fuzzy Hash: C791A362A0E68646FB518B25DC4477A63A2FFA5B8CF0C4131D94DA7595CFBCE489CB00

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 636 7ff65202f2f0-7ff65202f311 637 7ff65202f339-7ff65202f340 636->637 638 7ff65202f313-7ff65202f337 call 7ff65203d440 636->638 640 7ff65202f344-7ff65202f365 call 7ff652011770 637->640 638->637 644 7ff65202f342 638->644 643 7ff65202f36a-7ff65202f388 640->643 646 7ff65202f38e-7ff65202f3ae 643->646 647 7ff65202f594-7ff65202f597 643->647 644->640 652 7ff65202f58a-7ff65202f58e 646->652 653 7ff65202f3b4-7ff65202f3c5 646->653 648 7ff65202f59b-7ff65202f5a3 647->648 650 7ff65202f5a9-7ff65202f5ce call 7ff651fe9150 648->650 651 7ff65202f416 648->651 655 7ff65202f41a-7ff65202f46c 650->655 659 7ff65202f5d4-7ff65202f5db 650->659 651->655 652->647 653->652 662 7ff65202f3cb-7ff65202f410 653->662 660 7ff65202f60d 655->660 661 7ff65202f472-7ff65202f48e 655->661 663 7ff65202f5e0-7ff65202f606 659->663 665 7ff65202f60f-7ff65202f628 660->665 661->660 668 7ff65202f494-7ff65202f497 661->668 662->648 662->651 663->663 664 7ff65202f608 663->664 664->655 669 7ff65202f4d8-7ff65202f4f6 668->669 670 7ff65202f499-7ff65202f4a8 668->670 675 7ff65202f4fc-7ff65202f504 669->675 676 7ff65202f583-7ff65202f585 669->676 672 7ff65202f4b0-7ff65202f4d1 00007FFBBBD91310 670->672 672->672 673 7ff65202f4d3 672->673 673->669 675->676 677 7ff65202f506-7ff65202f509 675->677 676->665 678 7ff65202f57a-7ff65202f57d 00007FFBC92DF020 677->678 679 7ff65202f50b-7ff65202f515 677->679 678->676 679->678 680 7ff65202f517-7ff65202f534 679->680 681 7ff65202f536-7ff65202f568 680->681 682 7ff65202f56f-7ff65202f573 680->682 681->682 682->678
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$D91310F020
                                                                          • String ID: $C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"
                                                                          • API String ID: 3519738495-1764846569
                                                                          • Opcode ID: 5397640f03628bea786c5d9e820ab445c411807759423a60697ec29a5e8f1976
                                                                          • Instruction ID: 7555987cf19e1fd34e16aa471dc949ef65283e4055291bac648f7ea05d409649
                                                                          • Opcode Fuzzy Hash: 5397640f03628bea786c5d9e820ab445c411807759423a60697ec29a5e8f1976
                                                                          • Instruction Fuzzy Hash: DC917D72705A858AEB10CF25D8943AD77A5FB88B88F488136DE4E93B64DF78D449C700

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: NtdllProc_Window
                                                                          • String ID: E
                                                                          • API String ID: 4255912815-3568589458
                                                                          • Opcode ID: d9f9fd3d91a60987a5f48f68ece85a5dcac14300b8f46c6e9c972fc7a4a4e4b9
                                                                          • Instruction ID: a1dae69c5590962ea21b78c49f1a08991b10a5595387733403ac5e614f15a241
                                                                          • Opcode Fuzzy Hash: d9f9fd3d91a60987a5f48f68ece85a5dcac14300b8f46c6e9c972fc7a4a4e4b9
                                                                          • Instruction Fuzzy Hash: 0851663171D6828AE7748B18EC8477A73A0FB95758F140535EA8DE2694DFBDD488CB40

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 713 2c33acef46a-2c33acef4a2 call 2c33accc520 FindFirstFileA 716 2c33acef4e9-2c33acef520 713->716 717 2c33acef4a4-2c33acef4df call 2c33acc5180 call 2c33acca060 call 2c33acd1e90 call 2c33acca060 713->717 718 2c33acef522-2c33acef559 call 2c33acca170 call 2c33acefe00 716->718 719 2c33acef55d-2c33acef5e5 call 2c33acefcb0 call 2c33acf1a30 call 2c33acca110 call 2c33acca170 call 2c33addb740 716->719 739 2c33acefbf5-2c33acefbfd 717->739 718->719 742 2c33acef5ea-2c33acef5f5 719->742 743 2c33acef6c1-2c33acef6e3 call 2c33add7af0 742->743 744 2c33acef5fb-2c33acef642 call 2c33acefd60 call 2c33acf19a0 call 2c33acd1f30 742->744 752 2c33acefb69-2c33acefba4 call 2c33acc5180 call 2c33acca060 call 2c33acd1e90 call 2c33acca060 743->752 753 2c33acef6e9-2c33acef7aa call 2c33aced260 call 2c33add7960 call 2c33acca170 call 2c33ad8a1f0 call 2c33accc590 call 2c33acca060 call 2c33accc9c0 743->753 760 2c33acef681-2c33acef6bc call 2c33acc5180 call 2c33acca060 call 2c33acd1e90 call 2c33acca060 744->760 761 2c33acef644-2c33acef67d call 2c33acca170 call 2c33acefe00 744->761 752->739 793 2c33acef7b0-2c33acef863 call 2c33add7960 call 2c33acca170 call 2c33ad8acd0 call 2c33accc590 call 2c33acca060 call 2c33accc9c0 753->793 794 2c33acefa0f-2c33acefb63 call 2c33add7960 call 2c33accc590 call 2c33acca060 call 2c33add7960 call 2c33accc590 call 2c33acca060 call 2c33add7960 call 2c33accc590 call 2c33acca060 call 2c33add7960 call 2c33accc590 call 2c33acca060 call 2c33add7960 call 2c33accc590 call 2c33acca060 call 2c33acf28c0 call 2c33accd2a0 753->794 760->739 761->760 793->794 819 2c33acef869-2c33acef86e 793->819 794->752 822 2c33acef9fc-2c33acefa09 call 2c33accd2a0 819->822 823 2c33acef874-2c33acef903 call 2c33acca170 call 2c33ad90000 * 3 call 2c33ad07950 819->823 822->794 846 2c33acef925-2c33acef9f7 call 2c33acca170 call 2c33acee2c0 call 2c33acd1e50 call 2c33acc5180 call 2c33acd1e90 call 2c33acca060 call 2c33accd2a0 call 2c33acca060 call 2c33acd1e90 call 2c33acca060 823->846 847 2c33acef905-2c33acef920 call 2c33acca060 call 2c33accd2a0 823->847 846->739
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACEF47B
                                                                          • FindFirstFileA.KERNEL32 ref: 000002C33ACEF48B
                                                                            • Part of subcall function 000002C33ACC5180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC5217
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$FileFindFirst
                                                                          • String ID:
                                                                          • API String ID: 2113789597-0
                                                                          • Opcode ID: cfa9f5777d2db9ce4048483391da668259afc2d594878e3b9cda18768d7dc9b0
                                                                          • Instruction ID: 15da54d511c946ae0b6fa4141cbee027347d6db1893087a18dd11e7924f8e9e9
                                                                          • Opcode Fuzzy Hash: cfa9f5777d2db9ce4048483391da668259afc2d594878e3b9cda18768d7dc9b0
                                                                          • Instruction Fuzzy Hash: 99129D31158A888EE765FB54C499FDEB3E1FBD8741F508DADD08EC31A2DE309A458782

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyNextProcess32Queue::StructuredWork$CreateSnapshotToolhelp32
                                                                          • String ID:
                                                                          • API String ID: 2993956496-0
                                                                          • Opcode ID: e5cb6cc2a9d3f2d857daf4add4d4784c79b02a268af29c56eed9b1a154788f6c
                                                                          • Instruction ID: c4ef9c8fbe70cf8b44fa2cd0e8a20ffc9dfbd858d6f1b63ade20444758933c76
                                                                          • Opcode Fuzzy Hash: e5cb6cc2a9d3f2d857daf4add4d4784c79b02a268af29c56eed9b1a154788f6c
                                                                          • Instruction Fuzzy Hash: 9151FB30158B888BF7A5EB64C459BEEB7E1FFD4740F508A5DE08AC31A1DE349A45CB81

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1156 7ff65202ea60-7ff65202ea7e 1157 7ff65202ea84-7ff65202ea88 1156->1157 1158 7ff65202f082-7ff65202f08c 1156->1158 1157->1158 1159 7ff65202ea8e-7ff65202eaaf 1157->1159 1160 7ff65202eaba 1159->1160 1161 7ff65202eab1-7ff65202eab8 1159->1161 1162 7ff65202eabd-7ff65202ead7 1160->1162 1161->1162 1163 7ff65202ead9-7ff65202eadf 1162->1163 1164 7ff65202eaea-7ff65202eb26 1162->1164 1165 7ff65202eb2c-7ff65202eb3b 1163->1165 1166 7ff65202eae1-7ff65202eae7 1163->1166 1164->1165 1171 7ff65202f052-7ff65202f07a 1164->1171 1168 7ff65202eb3d-7ff65202eb43 1165->1168 1169 7ff65202eb52-7ff65202eb8a 1165->1169 1166->1164 1172 7ff65202eb90-7ff65202ebae 1168->1172 1173 7ff65202eb45-7ff65202eb4e 1168->1173 1169->1171 1169->1172 1171->1158 1172->1171 1177 7ff65202ebb4-7ff65202ebc1 1172->1177 1173->1169 1179 7ff65202ebc7-7ff65202ec32 1177->1179 1180 7ff65202ec61-7ff65202ec6c 1177->1180 1179->1180 1186 7ff65202ec34-7ff65202ec55 1179->1186 1180->1171 1188 7ff65202ec57-7ff65202ec5b 1186->1188 1189 7ff65202ec71-7ff65202ec88 1186->1189 1188->1180 1190 7ff65202ec8e 1189->1190 1191 7ff65202ed95-7ff65202ee1d call 7ff65202e5b0 1189->1191 1192 7ff65202ec91-7ff65202ec94 1190->1192 1207 7ff65202efe9-7ff65202f04a 1191->1207 1208 7ff65202ee23-7ff65202ee2b 1191->1208 1193 7ff65202ec96-7ff65202ec9a 1192->1193 1194 7ff65202ec9c-7ff65202ecb0 call 7ff65203d440 1192->1194 1193->1194 1196 7ff65202ecb6-7ff65202ecc9 1193->1196 1194->1196 1199 7ff65202ed5f-7ff65202ed8f 00007FFBBBD91310 1196->1199 1200 7ff65202eccf-7ff65202ecd6 1196->1200 1199->1191 1199->1192 1201 7ff65202ece0-7ff65202ed5d 1200->1201 1201->1199 1201->1201 1207->1171 1209 7ff65202ee30-7ff65202ee33 1208->1209 1211 7ff65202ee3b-7ff65202ee5b call 7ff65203d440 1209->1211 1212 7ff65202ee35-7ff65202ee39 1209->1212 1213 7ff65202ee61-7ff65202ee73 1211->1213 1212->1211 1212->1213 1215 7ff65202ee79 1213->1215 1216 7ff65202efb7-7ff65202efe3 1213->1216 1219 7ff65202ee80-7ff65202ee83 1215->1219 1216->1207 1216->1209 1220 7ff65202ee89-7ff65202ee9d call 7ff65203d440 1219->1220 1221 7ff65202ee85-7ff65202ee87 1219->1221 1224 7ff65202eea3-7ff65202eeb1 1220->1224 1221->1220 1221->1224 1226 7ff65202eed3-7ff65202eef9 1224->1226 1227 7ff65202eeb3-7ff65202eeb7 1224->1227 1230 7ff65202ef90-7ff65202ef9d 1226->1230 1231 7ff65202eeff-7ff65202ef02 1226->1231 1228 7ff65202eeb9-7ff65202eec1 call 7ff65202e5b0 1227->1228 1229 7ff65202eec6-7ff65202eece 1227->1229 1228->1230 1229->1230 1230->1219 1234 7ff65202efa3-7ff65202efb1 1230->1234 1231->1230 1232 7ff65202ef08-7ff65202ef85 1231->1232 1232->1230 1234->1216
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                          • API String ID: 1541411109-1817040388
                                                                          • Opcode ID: 7f0815f646b9be6a47ebf33997fd40430ce2371def073614a23dc5631ded96a8
                                                                          • Instruction ID: e3303d2b7622a733d13748121f311a36ad6e3a55d699cb6f75134fdc2850a827
                                                                          • Opcode Fuzzy Hash: 7f0815f646b9be6a47ebf33997fd40430ce2371def073614a23dc5631ded96a8
                                                                          • Instruction Fuzzy Hash: 31028976605B9586DB20CF26D884AAE37B4FB88B88F058126DF4D97764CF38E449CB00
                                                                          APIs
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD877E6
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD87864
                                                                          • CryptUnprotectData.CRYPT32 ref: 000002C33AD878BD
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$CryptDataUnprotect
                                                                          • String ID:
                                                                          • API String ID: 3418212865-0
                                                                          • Opcode ID: 51fe853a7d2b22d5b21b9f7a4f3a10a826fa85b530eb29a0291643d65522cfaf
                                                                          • Instruction ID: 6cec9a6aa59feec2fcbf31b9eb0c819f1f90696644c6e48491953a5b700dc8a2
                                                                          • Opcode Fuzzy Hash: 51fe853a7d2b22d5b21b9f7a4f3a10a826fa85b530eb29a0291643d65522cfaf
                                                                          • Instruction Fuzzy Hash: C451CD70558B888FE7A4EB68C458BAEB7E1FBD8301F50496DE08DC3261DB749985CB42
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 547d032ff03bed76e8d98501336aec72c7838b5fcf6afd06ef48b4c17f1abeb4
                                                                          • Instruction ID: 297c9ea45a9e5fcc6670f88890b07a2eaf9817feb7bcb537508ffb33d197b079
                                                                          • Opcode Fuzzy Hash: 547d032ff03bed76e8d98501336aec72c7838b5fcf6afd06ef48b4c17f1abeb4
                                                                          • Instruction Fuzzy Hash: 2E025C02E196BB85F75296328C417FE63819F7A388F1C8733ED58779D9DF6CA4868240

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 416 7ff6520326c0-7ff6520326dc 417 7ff6520326de-7ff6520326e0 416->417 418 7ff6520326e5-7ff652032717 416->418 419 7ff6520331ad-7ff6520331b6 417->419 420 7ff652032723-7ff652032730 418->420 421 7ff652032758-7ff65203282f call 7ff6520332e0 call 7ff652036d10 call 7ff6520378f0 call 7ff6520331c0 call 7ff652036d10 call 7ff6520378f0 call 7ff652038250 GetModuleHandleA 420->421 422 7ff652032732-7ff652032756 420->422 438 7ff652032831-7ff652032863 call 7ff652037c90 * 2 421->438 439 7ff652032865-7ff6520328c9 call 7ff652038250 GetProcAddress call 7ff652037c90 * 2 421->439 422->420 449 7ff6520328d1-7ff652032993 call 7ff652031a40 call 7ff6520390e0 call 7ff652039140 call 7ff652032150 call 7ff652037c90 438->449 439->449 461 7ff65203299f-7ff6520329e1 449->461 462 7ff652032a3e-7ff652032b4a VirtualAlloc 461->462 463 7ff6520329e3-7ff652032a39 461->463 464 7ff652032b69-7ff652032c5d call 7ff652033520 call 7ff652036c80 call 7ff6520378f0 call 7ff652033400 call 7ff652036c80 call 7ff6520378f0 call 7ff652038250 GetModuleHandleA 462->464 465 7ff652032b4c-7ff652032b64 call 7ff652037b60 462->465 463->461 483 7ff652032c99-7ff652032d06 call 7ff652038250 GetProcAddress call 7ff652037c90 * 2 464->483 484 7ff652032c5f-7ff652032c97 call 7ff652037c90 * 2 464->484 465->419 494 7ff652032d0e-7ff652032dfe call 7ff652033760 call 7ff652036b60 call 7ff6520378f0 call 7ff652033640 call 7ff652036bf0 call 7ff6520378f0 call 7ff652038250 GetModuleHandleA 483->494 484->494 510 7ff652032e3a-7ff652032ea7 call 7ff652038250 GetProcAddress call 7ff652037c90 * 2 494->510 511 7ff652032e00-7ff652032e38 call 7ff652037c90 * 2 494->511 520 7ff652032eaf-7ff652032f0b 510->520 511->520 523 7ff652032f25-7ff652032f35 520->523 524 7ff652032f37-7ff652032f40 523->524 525 7ff652032f7f-7ff6520330a8 call 7ff652036da0 call 7ff6520339b0 call 7ff652036ad0 call 7ff6520378f0 call 7ff652033890 call 7ff652036ad0 call 7ff6520378f0 call 7ff652038250 GetModuleHandleA 523->525 526 7ff652032f7d 524->526 527 7ff652032f42-7ff652032f7b 524->527 545 7ff6520330aa-7ff6520330e2 call 7ff652037c90 * 2 525->545 546 7ff6520330e4-7ff652033151 call 7ff652038250 GetProcAddress call 7ff652037c90 * 2 525->546 526->523 527->526 555 7ff652033159-7ff6520331a2 CreateThread call 7ff652037b60 545->555 546->555 559 7ff6520331a7-7ff6520331a8 555->559 559->419
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: a3eeb29371fb47a965077e410e082878baaf3524c6b8feef568940cf3953f533
                                                                          • Instruction ID: cddee4bd029b4d3d35db2bfe50ce5db275ecb9a1812c5d3b64be5a14ce16ef51
                                                                          • Opcode Fuzzy Hash: a3eeb29371fb47a965077e410e082878baaf3524c6b8feef568940cf3953f533
                                                                          • Instruction Fuzzy Hash: FB42D43260ABC585DAB0DB15F8947EAB3A4F7D9B84F044536DA8D93B69DF7CC4448B00

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Window$MetricsSystem$ClassCreateHandleModuleRegisterShowUpdate
                                                                          • String ID: class001
                                                                          • API String ID: 3666473625-3656631403
                                                                          • Opcode ID: c65b6a3a3c5298f372adfd29b74c1c22faed9294b5240e563b4d02c16027923c
                                                                          • Instruction ID: d165aa605992cc7a3298d6dc9df8d225c37e3600a255c02cba3ce3e6fcdd7263
                                                                          • Opcode Fuzzy Hash: c65b6a3a3c5298f372adfd29b74c1c22faed9294b5240e563b4d02c16027923c
                                                                          • Instruction Fuzzy Hash: 5E310A71A0DB428AE7408F24FC5872A77A0FB98308F5805B9D58DE6664DFFEE048CB40

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Message
                                                                          • String ID: v2.1.1 Setup$ v2.1.1 Setup!Before starting the installation, select the folder where the files will be installed$A$FrghcZrah$WaveExecutor$Welcome to
                                                                          • API String ID: 2030045667-1564511172
                                                                          • Opcode ID: 578fb85d05ac807efce2f1816e923275f42c98e49a4d3e3cb657846628bf40dd
                                                                          • Instruction ID: 5f07150da83db6d30672d6803fd51d359858632d1c3f09316ba737dc6e1f4b26
                                                                          • Opcode Fuzzy Hash: 578fb85d05ac807efce2f1816e923275f42c98e49a4d3e3cb657846628bf40dd
                                                                          • Instruction Fuzzy Hash: 4A71762260EB8681E660DB55FC516BE77A0FBA5348F484035E6CDD3B66DFACD149CB00

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 938 2c33acc6fe0-2c33acc75d5 call 2c33acc5740 call 2c33acc77f0 call 2c33acc9d80 call 2c33acca110 call 2c33acc78a0 call 2c33acc9cf0 call 2c33acca110 call 2c33acc7960 call 2c33acc9c60 call 2c33acca110 call 2c33acc7a10 call 2c33acc9c60 call 2c33acca110 call 2c33acc7ac0 call 2c33acc9c60 call 2c33acca110 call 2c33acc7b70 call 2c33acc9bd0 call 2c33acca110 call 2c33acc7c20 call 2c33acc9b40 call 2c33acca110 call 2c33acc7ce0 call 2c33acc9a00 call 2c33acca110 call 2c33acc7dc0 call 2c33acc98c0 call 2c33acca110 call 2c33acc7e90 call 2c33acc9830 call 2c33acca110 call 2c33acc7f60 call 2c33acc97a0 call 2c33acca110 call 2c33acc8010 call 2c33acc9bd0 call 2c33acca110 call 2c33acc80c0 call 2c33acc9710 call 2c33acca110 call 2c33acc8170 call 2c33acc95d0 call 2c33acca110 call 2c33acc8230 call 2c33acc9710 call 2c33acca110 call 2c33acc82e0 call 2c33acc9540 call 2c33acca110 call 2c33acc8390 call 2c33acc94b0 call 2c33acca110 call 2c33acc8450 call 2c33acc9370 call 2c33acca110 call 2c33acc8500 call 2c33acc9370 call 2c33acca110 call 2c33acc85b0 call 2c33acc9230 call 2c33acca110 call 2c33acc8670 call 2c33acc9230 call 2c33acca110 call 2c33acc8730 call 2c33acc91a0 call 2c33acca110 call 2c33acc8800 call 2c33acc9370 call 2c33acca110 call 2c33acc88b0 call 2c33acc9060 call 2c33acca110 call 2c33acc8960 call 2c33acc8f20 call 2c33acca110 call 2c33acc8a20 call 2c33acc8de0 call 2c33acca110 call 2c33acc8db0 call 2c33acc9e90 call 2c33acc8ba0 CreateToolhelp32Snapshot 1103 2c33acc75d7-2c33acc75df 938->1103 1104 2c33acc7633-2c33acc7653 Process32FirstW 938->1104 1107 2c33acc75e1-2c33acc75e6 1103->1107 1108 2c33acc75e8-2c33acc762e call 2c33acc8af0 call 2c33acc8c70 call 2c33acca110 call 2c33acc9e70 1103->1108 1105 2c33acc77b9-2c33acc77d8 call 2c33acca110 call 2c33acc9e70 1104->1105 1106 2c33acc7659-2c33acc76ab call 2c33acc5360 call 2c33ade5ac0 call 2c33ade5d80 1104->1106 1122 2c33acc77df-2c33acc77e8 1105->1122 1126 2c33acc76b7-2c33acc76d3 call 2c33acc9e40 1106->1126 1107->1108 1108->1122 1131 2c33acc7790-2c33acc77b3 call 2c33acca060 Process32NextW 1126->1131 1132 2c33acc76d9-2c33acc7702 call 2c33acc9e10 call 2c33acc9fe0 1126->1132 1131->1105 1131->1106 1139 2c33acc778b 1132->1139 1140 2c33acc7708-2c33acc7710 1132->1140 1139->1126 1142 2c33acc7712-2c33acc7719 1140->1142 1143 2c33acc771b-2c33acc7723 1140->1143 1144 2c33acc773a-2c33acc7789 call 2c33acca170 call 2c33acc6f30 call 2c33acca060 call 2c33acc9e70 1142->1144 1143->1144 1145 2c33acc7725-2c33acc772a 1143->1145 1144->1122 1145->1144 1146 2c33acc772c-2c33acc7738 1145->1146 1146->1145
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Process32$CreateFac_nodeFac_node::_FirstNextSnapshotToolhelp32char_traitsstd::_
                                                                          • String ID:
                                                                          • API String ID: 4114415025-0
                                                                          • Opcode ID: 2cf1e73a0f9107235ddbfb485c3595bfcba21e3825775f53e0b531762a104419
                                                                          • Instruction ID: 31eca5e99702b4d00581108708964e4a756de0dd9e5b6191adc43fc8b2b823ce
                                                                          • Opcode Fuzzy Hash: 2cf1e73a0f9107235ddbfb485c3595bfcba21e3825775f53e0b531762a104419
                                                                          • Instruction Fuzzy Hash: 1E3222316549888FF755FB64C469BDFB2D2FBD8B00F804DBAE14AC3192ED319A468781

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • type_info::_name_internal_method.LIBCMTD ref: 000002C33ADA9EF0
                                                                            • Part of subcall function 000002C33ACF6A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACF6AAB
                                                                            • Part of subcall function 000002C33ACF6A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACF6ABA
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ADA9F56
                                                                          • CreateFileA.KERNEL32 ref: 000002C33ADA9F82
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFiletype_info::_name_internal_method
                                                                          • String ID:
                                                                          • API String ID: 645652700-0
                                                                          • Opcode ID: f64b6eb87d80957077a350099af48cbfcdfbf435f0acf51f21d504348669a5e4
                                                                          • Instruction ID: 26197f88bfb649d73361486ba6abcc3909ebff60b1cf5c3f20626d851b0f3ed8
                                                                          • Opcode Fuzzy Hash: f64b6eb87d80957077a350099af48cbfcdfbf435f0acf51f21d504348669a5e4
                                                                          • Instruction Fuzzy Hash: 2481FD30259A888FF794FB68C859F9EB6E1FBD8710F408A6DE049C32D1DE35D9458B42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                                          • String ID:
                                                                          • API String ID: 586831839-0
                                                                          • Opcode ID: 02f2dc65f8decb4645fb847ec84ab164623bd49ce40520f2aa61d7a6ee298412
                                                                          • Instruction ID: 47bc82f6d7f15a890dac160374ace06841ce33e3487c743304e08f80303f8a9c
                                                                          • Opcode Fuzzy Hash: 02f2dc65f8decb4645fb847ec84ab164623bd49ce40520f2aa61d7a6ee298412
                                                                          • Instruction Fuzzy Hash: A021F270658B888FEB94EF2CC498B5ABBE0FB98301F50495DE489C3260DB75D944CB42
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC476C
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC477E
                                                                            • Part of subcall function 000002C33ACC53C0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC53DD
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC47BB
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                          • String ID:
                                                                          • API String ID: 1865873047-0
                                                                          • Opcode ID: 2bd40488f3e532a51d24b491183ad7726d9c7802e0b56b6519047ab1d83811bb
                                                                          • Instruction ID: 38a7ac616076f602310792176a975b16f3d08fa164795efd7e1d5712f6101725
                                                                          • Opcode Fuzzy Hash: 2bd40488f3e532a51d24b491183ad7726d9c7802e0b56b6519047ab1d83811bb
                                                                          • Instruction Fuzzy Hash: FD31DB70568B888FE794EF28C449B9EB7E1FBD4700F80495DF089C32A2DB749545CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                                          • String ID:
                                                                          • API String ID: 586831839-0
                                                                          • Opcode ID: 58da95cd914e928df27caef5f136864f76f7d90ee48b638eaa7250070e662160
                                                                          • Instruction ID: e07b5ec453423766d1705d788318c711dd96d86f9d087d4cfbc11eb7afb934bf
                                                                          • Opcode Fuzzy Hash: 58da95cd914e928df27caef5f136864f76f7d90ee48b638eaa7250070e662160
                                                                          • Instruction Fuzzy Hash: D201D374618B888FDB44EF28C49971ABBE1FB99305F50491DF48AC32A0DB79D945CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Message$DispatchPeekTranslate
                                                                          • String ID:
                                                                          • API String ID: 4217535847-0
                                                                          • Opcode ID: 592db406a15101d98d1bfc7a93d39be7e429bab12ec8d4365a76516f4c6005f4
                                                                          • Instruction ID: c6d91315ffaa6a24d06ffcef02facafc827716642ba197ece7b5ab1dffc5cb38
                                                                          • Opcode Fuzzy Hash: 592db406a15101d98d1bfc7a93d39be7e429bab12ec8d4365a76516f4c6005f4
                                                                          • Instruction Fuzzy Hash: 31018F2192E59282F7909B20AC51F7E7A60BFB1349F581031F68EE65A5CFACE00DDB10
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: gfff
                                                                          • API String ID: 2739980228-1553575800
                                                                          • Opcode ID: 75ee16a53b5f2482ab3f520c53e8ea14cbdc9166c07df525deeded777f2b7237
                                                                          • Instruction ID: 65ab2a7f244268f2d3dbafcd3c7b1bc35b226ef9c29d2ef4729f507013523559
                                                                          • Opcode Fuzzy Hash: 75ee16a53b5f2482ab3f520c53e8ea14cbdc9166c07df525deeded777f2b7237
                                                                          • Instruction Fuzzy Hash: CF518763709AD58AD7058F289D112BDBBB2FB88B44F4D8226DA48D3799CF3CD295C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007
                                                                          • String ID: @
                                                                          • API String ID: 3568877910-2766056989
                                                                          • Opcode ID: 25b0d2ce2a38a7156871d754f39201a56fb4b69c342f7591e255e8e05feafcfc
                                                                          • Instruction ID: dadf123614a29485f731926d58708d3d03ee558b88d9943c9f44d03b2d288c14
                                                                          • Opcode Fuzzy Hash: 25b0d2ce2a38a7156871d754f39201a56fb4b69c342f7591e255e8e05feafcfc
                                                                          • Instruction Fuzzy Hash: 7511A2B5B09B5686FB908F11EC5477527E0FB9879CF4841B5C90EA73A1DFBEA0498B00
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ADAA310
                                                                          • CreateFileA.KERNEL32 ref: 000002C33ADAA33F
                                                                            • Part of subcall function 000002C33ACCA170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACCA18D
                                                                            • Part of subcall function 000002C33ADA9E50: type_info::_name_internal_method.LIBCMTD ref: 000002C33ADA9EF0
                                                                            • Part of subcall function 000002C33ADA9E50: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ADA9F56
                                                                            • Part of subcall function 000002C33ADA9E50: CreateFileA.KERNEL32 ref: 000002C33ADA9F82
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFile$type_info::_name_internal_method
                                                                          • String ID:
                                                                          • API String ID: 2627539804-0
                                                                          • Opcode ID: 98ea87f00965d57ac3efe53a622e5d3c7e907a059cd269744f0d00fbdf9eee7f
                                                                          • Instruction ID: 1594f49f62c4fa070c047d851c2ef3803d3c2c49f2f8cc15f3634913fe154a5e
                                                                          • Opcode Fuzzy Hash: 98ea87f00965d57ac3efe53a622e5d3c7e907a059cd269744f0d00fbdf9eee7f
                                                                          • Instruction Fuzzy Hash: 2B111B70618B888FE794EF68C45DB6AB7E1FBD9341F40892DE08DC3261DB79C9458B42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007Initialize
                                                                          • String ID:
                                                                          • API String ID: 3598312978-0
                                                                          • Opcode ID: d68fa1dd1f25c5d9833bb5b41399011af0f0bca26c4982c59452d0f3d9cb9bed
                                                                          • Instruction ID: 6714d3a91f4771c4cfbaa44a744d39ce1346c15c70297c50540cfed303773e4a
                                                                          • Opcode Fuzzy Hash: d68fa1dd1f25c5d9833bb5b41399011af0f0bca26c4982c59452d0f3d9cb9bed
                                                                          • Instruction Fuzzy Hash: A311AF47E0A24342FA6877F14C62AB811847FB136CFAC0430E50DF62C7DD9CB99E4222
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                          • String ID:
                                                                          • API String ID: 1173176844-0
                                                                          • Opcode ID: 579fdc101cb57f0dd8a8ec204abd9f99143d0278c37e83ebbe356b3a60883766
                                                                          • Instruction ID: f212dac749981ce32ac92adc5471be7b8d80c7158cd5382227bee3c160ac5973
                                                                          • Opcode Fuzzy Hash: 579fdc101cb57f0dd8a8ec204abd9f99143d0278c37e83ebbe356b3a60883766
                                                                          • Instruction Fuzzy Hash: B7F05E11E1B20B41FD2936665C569F80250AF297BCE2C0630DD7CE57C6EEDCA4DD8210
                                                                          APIs
                                                                          • std::_Fac_node::_Fac_node.LIBCPMTD ref: 000002C33ADD76CA
                                                                            • Part of subcall function 000002C33ACCA170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACCA18D
                                                                            • Part of subcall function 000002C33ADA9E50: type_info::_name_internal_method.LIBCMTD ref: 000002C33ADA9EF0
                                                                            • Part of subcall function 000002C33ADA9E50: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ADA9F56
                                                                            • Part of subcall function 000002C33ADA9E50: CreateFileA.KERNEL32 ref: 000002C33ADA9F82
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFac_nodeFac_node::_Filestd::_type_info::_name_internal_method
                                                                          • String ID:
                                                                          • API String ID: 3000750846-0
                                                                          • Opcode ID: 00adcd673186d3be9c868df7961a00515725e50a38e87df9d4bbbf832d19ea52
                                                                          • Instruction ID: 276cdee9f0d3412512905d308a66853b90235ce1ea6da718f46a5e6a544aede6
                                                                          • Opcode Fuzzy Hash: 00adcd673186d3be9c868df7961a00515725e50a38e87df9d4bbbf832d19ea52
                                                                          • Instruction Fuzzy Hash: C8913B30299B888FE765EB68C458BDEB7E1FB99304F40499DE089C3292DA75DA41C742
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                                          • Instruction ID: 0c6a2da14006f3d0e6e6d106ae17352fc4bcf700bee524e92f9d4815025e413a
                                                                          • Opcode Fuzzy Hash: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                                          • Instruction Fuzzy Hash: 81A1B836619B8486DB60CB0AE49072AB7A4F7CDB98F144125EBCE83B68DF7DD455CB00
                                                                          APIs
                                                                          • Concurrency::cancel_current_task.LIBCPMT ref: 000002C33ADEF2EC
                                                                            • Part of subcall function 000002C33ADEFD70: std::bad_alloc::bad_alloc.LIBCMTD ref: 000002C33ADEFD79
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                          • String ID:
                                                                          • API String ID: 680105476-0
                                                                          • Opcode ID: 6b617ec2180372ffccc889888c4318af6079f51c42d92b87c56cb71e91508389
                                                                          • Instruction ID: 776388e5de87c8f3d35e0921e5ebeffd0a38e9f65dd902d7d64c9b1f73520966
                                                                          • Opcode Fuzzy Hash: 6b617ec2180372ffccc889888c4318af6079f51c42d92b87c56cb71e91508389
                                                                          • Instruction Fuzzy Hash: 6101D6101909890AFA9AF3F454BDF7D11C4BB4D3C1F948C94D815CF0E2EA148B8183D0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Concurrency::cancel_current_task
                                                                          • String ID:
                                                                          • API String ID: 118556049-0
                                                                          • Opcode ID: 68dcdc5df13b1305609106057423c5647b76bdd97cd7c73a0b3a13548c0169f4
                                                                          • Instruction ID: f08c7640692aab3105cea216c928e682591289c77fe58eaf5dc4a426a26eab30
                                                                          • Opcode Fuzzy Hash: 68dcdc5df13b1305609106057423c5647b76bdd97cd7c73a0b3a13548c0169f4
                                                                          • Instruction Fuzzy Hash: 22017561A19F4181D660AB19E840B1BA3E4FF987ACF440335E6DDD27E4DF7CD5148B04
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310$__swprintf_l
                                                                          • String ID: !((flags & ImGuiInputTextFlags_CallbackCompletion) && (flags & ImGuiInputTextFlags_AllowTabInput))$!((flags & ImGuiInputTextFlags_CallbackHistory) && (flags & ImGuiInputTextFlags_Multiline))$#SCROLLY$%*s%.*s$@$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$apply_new_text_length <= buf_size$apply_new_text_length >= 0$buf != 0 && buf_size >= 0$buf[0] != 0$callback != 0$callback_data.Buf == callback_buf$callback_data.BufSize == state->BufCapacity$callback_data.BufTextLen == (int)strlen(callback_data.Buf)$callback_data.Flags == flags$font->ContainerAtlas->TexID == _CmdHeader.TextureId$g.DragDropActive || g.ActiveId == id || g.ActiveId == 0 || g.ActiveIdPreviousFrame == id || (g.CurrentMultiSelect != 0 && g.BoxSel$i >= 0 && i < Size$idx <= obj->TextLen$password_font->Glyphs.empty() && password_font->IndexAdvanceX.empty() && password_font->IndexLookup.empty()$state != 0$state && state->ID == id
                                                                          • API String ID: 16103177-4266151527
                                                                          • Opcode ID: 305c6a2d5bde13b75109bbc060a96d180a3a505ac7283807dc5ecf498293a827
                                                                          • Instruction ID: d019c240149a15d3f7944abd15f1ca8abee5bb6f1a27068b00d1702d05148b47
                                                                          • Opcode Fuzzy Hash: 305c6a2d5bde13b75109bbc060a96d180a3a505ac7283807dc5ecf498293a827
                                                                          • Instruction Fuzzy Hash: A893E572A0A2858AE751CF35CC846B977A1FB5974CF1C8236DE4CA7695CFB8E449CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$D91310F020
                                                                          • String ID: (Debug Log: Auto-disabled some ImGuiDebugLogFlags after 2 frames)$333?$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$Click %s Button to break in debugger! (remap w/ Ctrl+Shift)$Debug##Default$GImGui != 0$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$GetCurrentWindowRead()->Flags & ImGuiWindowFlags_Tooltip$HoveredId: 0x%08X$Left$Middle$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right$Size > 0$g.CurrentWindow->IsFallbackWindow == true$g.Font->IsLoaded()$g.MovingWindow && g.MovingWindow->RootWindow$g.Viewports.Size == 1$g.WindowsFocusOrder.Size <= g.Windows.Size$gfff$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                          • API String ID: 3519738495-8291574
                                                                          • Opcode ID: ffb8797e1eb16f8155c6f2f688ecd77d435fdf8ab629db649c8d15db83102da1
                                                                          • Instruction ID: 9a222470230d6681a89cd4633c23b03f42f98ab4bdd867f31f0f606ab389fa94
                                                                          • Opcode Fuzzy Hash: ffb8797e1eb16f8155c6f2f688ecd77d435fdf8ab629db649c8d15db83102da1
                                                                          • Instruction Fuzzy Hash: 20C28232A096C68AEB65CF35C8442F837A1FF54748F0C8235DA0DAB6A9DF79E645C710
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: 0 && "stbtt_InitFont(): failed to parse FontData. It is correct and complete? Check FontDataSize."$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$atlas->ConfigData.Size > 0$cfg.DstFont && (!cfg.DstFont->IsLoaded() || cfg.DstFont->ContainerAtlas == atlas)$font->ConfigData == font_config$font_offset >= 0 && "FontData is incorrect, or FontNo cannot be found."$glyph_index_in_font != 0$i >= 0 && i < Size$n < (Storage.Size << 5)$src_range[0] <= src_range[1] && "Invalid range: is your glyph range array persistent? it is zero-terminated?"$src_tmp.DstIndex != -1$src_tmp.GlyphsList.Size == src_tmp.GlyphsCount
                                                                          • API String ID: 2739980228-2192739418
                                                                          • Opcode ID: c6bae62cf4d860f169560fa24d2b3f10bebd5f6796277dc105493d95423a3bbc
                                                                          • Instruction ID: 22f1bf58ac73627019800a4c6d82e4b2dfbdd958b59e328a621e40354924e130
                                                                          • Opcode Fuzzy Hash: c6bae62cf4d860f169560fa24d2b3f10bebd5f6796277dc105493d95423a3bbc
                                                                          • Instruction Fuzzy Hash: 07F20472B05A968AE715CF25DC842BD77B0FB5874CF188236DA4DA3690DF78E49AC700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: (g.IO.BackendPlatformUserData == 0) && "Forgot to shutdown Platform backend?"$(g.IO.BackendRendererUserData == 0) && "Forgot to shutdown Renderer backend?"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Forgot to shutdown Platform backend?$Forgot to shutdown Renderer backend?
                                                                          • API String ID: 2739980228-2716422499
                                                                          • Opcode ID: 8631f41f780fcb6922e1570db1d0de5d2e5d582f4444700ffc315402fe0eb1ef
                                                                          • Instruction ID: 4885a1fab54d17c37fc6b160797fcc90d73c8dd88b66166276c848c4af295173
                                                                          • Opcode Fuzzy Hash: 8631f41f780fcb6922e1570db1d0de5d2e5d582f4444700ffc315402fe0eb1ef
                                                                          • Instruction Fuzzy Hash: D4427C32709A8292D749DF24D5941FCB3B5FB54B88F884236DB0D97298DF38E66AC340
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (inner_window->IDStack.back() == table_instance->TableInstanceID) && "Mismatching PushID/PopID!"$(outer_window->DC.ItemWidthStack.Size >= temp_data->HostBackupItemWidthStackSize) && "Too many PopItemWidth!"$(table->Flags & ImGuiTableFlags_ScrollX) == 0$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$Calling PopStyleColor() too many times!$Mismatching PushID/PopID!$Size > 0$Too many PopItemWidth!$g.CurrentWindow == outer_window && g.CurrentTable == table$g.TablesTempDataStacked > 0$i >= 0 && i < Size$inner_window == g.CurrentWindow$outer_window == inner_window || outer_window == inner_window->ParentWindow$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table != 0 && "Only call EndTable() if BeginTable() returns true!"$table->RowPosY2 == inner_window->DC.CursorPos.y
                                                                          • API String ID: 0-2342475368
                                                                          • Opcode ID: e5b94c1b8dcf2da7007be3781829aa8966bd72bc356f6867aad3938fa65a2b63
                                                                          • Instruction ID: a3c5a9e99b1e989f6fdd8c396e4f355fbd0dcd1555c496b029693215a52ee061
                                                                          • Opcode Fuzzy Hash: e5b94c1b8dcf2da7007be3781829aa8966bd72bc356f6867aad3938fa65a2b63
                                                                          • Instruction Fuzzy Hash: 4172AF32A09A8A96EB15CB36CD853B97360FF5574CF0C8631DA59A31A1DFB8B1D9C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$D91310$F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$Calling PopStyleColor() too many times!$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$N/A$i >= 0 && i < Size$tab->LastFrameVisible >= tab_bar->PrevFrameVisible$tab->NameOffset < tab_bar->TabsNames.Buf.Size
                                                                          • API String ID: 2829325567-961183113
                                                                          • Opcode ID: 1dd7511a9398aec8ed7414ed426b944933fa59f1edda0e31c62fa7d12f7c8315
                                                                          • Instruction ID: 38b88cd745fcd2de1e016d9b43e1f0a50c7ccbf77c74d4d68dd1cb007d89fd3b
                                                                          • Opcode Fuzzy Hash: 1dd7511a9398aec8ed7414ed426b944933fa59f1edda0e31c62fa7d12f7c8315
                                                                          • Instruction Fuzzy Hash: 46B2C072A096858AE755CF36C84017977A0FF5878CF198736DA4DB36A4DF78E88AC700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: State
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$ImGui::IsNamedKey(key)
                                                                          • API String ID: 1649606143-1336968070
                                                                          • Opcode ID: 320e79d58a395caa32967525c0a4eeebff8b16c0838ad5b5bb5afecf55618b72
                                                                          • Instruction ID: 4441cee890af3732e426b6e4f854c2801d33072e3b9f71432f6d5b80911a8aaa
                                                                          • Opcode Fuzzy Hash: 320e79d58a395caa32967525c0a4eeebff8b16c0838ad5b5bb5afecf55618b72
                                                                          • Instruction Fuzzy Hash: 5091F310E5E29605FFA186355C01BBA22C2AF7574CF1D0635E84ABA5D9CFADB88B8250
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: 0 && "Unknown event!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Processed$Remaining$button >= 0 && button < ImGuiMouseButton_COUNT$i >= 0 && i < Size$it >= Data && it < Data + Size && it_last >= it && it_last <= Data + Size$key != ImGuiKey_None$n >= 0 && n < BITCOUNT
                                                                          • API String ID: 1541411109-1923509833
                                                                          • Opcode ID: da6d3a92aa33f98c79226d23127867b8a240d3247100d9651d618393ae0055c9
                                                                          • Instruction ID: 85200faf45bbafe51a5666453a02a44ee77d2ef3cb7716346452b430c077c826
                                                                          • Opcode Fuzzy Hash: da6d3a92aa33f98c79226d23127867b8a240d3247100d9651d618393ae0055c9
                                                                          • Instruction Fuzzy Hash: FB42F572B083C257EB28DB2595503B9BBD0FB51748F184235DAAD97698DFBCE468CB00
                                                                          APIs
                                                                          • 00007FFBBBD91310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF651FE5CA0), ref: 00007FF651FE71A7
                                                                          • 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE7227
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$D91310F020
                                                                          • String ID: !g.Initialized && !g.SettingsLoaded$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$FindSettingsHandler(handler->TypeName) == 0$Table$Window$n >= 0 && n < BITCOUNT
                                                                          • API String ID: 3519738495-416841283
                                                                          • Opcode ID: 4062fd74c71728996d8a688af9939b4e7822aed5dbbc0d4bdb3eeccc7cb9b2ac
                                                                          • Instruction ID: 51b512dffdf894270c098df304102773c14f9b3f79a9bcb625bbd89b9154c1b1
                                                                          • Opcode Fuzzy Hash: 4062fd74c71728996d8a688af9939b4e7822aed5dbbc0d4bdb3eeccc7cb9b2ac
                                                                          • Instruction Fuzzy Hash: 3412E432A0AB8686EB54CF24E8402B977F5FB54B48F584236DA8D933A4DF7CE159C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: ClipboardGlobal$ByteCharMultiWide$AllocCloseDataEmptyFreeLockOpenUnlock
                                                                          • String ID:
                                                                          • API String ID: 1965520120-0
                                                                          • Opcode ID: ebbd9d8b24dcedb596b0ca59058d4c86985b5e6383d3a38eef27f5b3966815bd
                                                                          • Instruction ID: 1a23acd1c0e2d7fef8a2b496cb63bae07ec23f9f66b34b76f00b51067881dca7
                                                                          • Opcode Fuzzy Hash: ebbd9d8b24dcedb596b0ca59058d4c86985b5e6383d3a38eef27f5b3966815bd
                                                                          • Instruction Fuzzy Hash: 9C11B620B0AB4242E7145F25BC14639A3A1BF58FD8F0C4234DE4D937A4DFBCD04A4700
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: !is_visible$#ContextMenu$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->IndexWithinEnabledSet <= column->DisplayOrder$i >= 0 && i < Size$p >= Data && p < DataEnd$table->IsLayoutLocked == false$table->LeftMostEnabledColumn >= 0 && table->RightMostEnabledColumn >= 0
                                                                          • API String ID: 0-1387518580
                                                                          • Opcode ID: 19ad48cc859dbbf9d7e2c9b3bb525ef016caea7ee0b204106524b712a34c540f
                                                                          • Instruction ID: d019c42c881f611d2571289c22ea2cde8713256987761d380d46042537aa7afd
                                                                          • Opcode Fuzzy Hash: 19ad48cc859dbbf9d7e2c9b3bb525ef016caea7ee0b204106524b712a34c540f
                                                                          • Instruction Fuzzy Hash: F4E2AE32A0968996E7198B36C9413B877A0FF5974CF0C8325DB48A35A5DFB8F5E9C700
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                                          • API String ID: 0-2705777111
                                                                          • Opcode ID: 19a88e1a9b5ab548e5e32b03ce6634717bf750d432390f921d47a077f58b5809
                                                                          • Instruction ID: 4c166fd700ba13a11120ec364e77232c7201db341560729ceeb8110f8655f4a6
                                                                          • Opcode Fuzzy Hash: 19a88e1a9b5ab548e5e32b03ce6634717bf750d432390f921d47a077f58b5809
                                                                          • Instruction Fuzzy Hash: A6727923A29BE845D3128B3694422B9B7A1EF6E784F5DC323ED44E6661EF3CE545C700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Clipboard$00007CloseDataF020Open
                                                                          • String ID:
                                                                          • API String ID: 2409120337-0
                                                                          • Opcode ID: 26d566c6706ed3b603c2ca6413b7fcc995dc930fd5e624c9433e805aea778b59
                                                                          • Instruction ID: 778335fb9c6b2575b64bbd480ab46a9fa8fe63378fc29e1b0f3440ece794a7aa
                                                                          • Opcode Fuzzy Hash: 26d566c6706ed3b603c2ca6413b7fcc995dc930fd5e624c9433e805aea778b59
                                                                          • Instruction Fuzzy Hash: D631E632B0AB8183E7549F25BC0456AB7E1FB88B94F580134DF8D97794DF3CE4559600
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                          • String ID:
                                                                          • API String ID: 3140674995-0
                                                                          • Opcode ID: 8964dd5a87bbd0479f9b080791705f60ec265abbfbc2f45a2eb81db15352648c
                                                                          • Instruction ID: 6ac8f9d192ee917d6b6ef00a1f08500a961ab7d0053e13d46e28fe19f1e5f9c2
                                                                          • Opcode Fuzzy Hash: 8964dd5a87bbd0479f9b080791705f60ec265abbfbc2f45a2eb81db15352648c
                                                                          • Instruction Fuzzy Hash: C8317E7260AB818AEB609F60EC407ED7360FB94758F48443ADA4E97B98DF78D14DC700
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: !scoring_rect.IsInverted()$<NULL>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: from move, window "%s", layer=%d$[nav] NavMoveRequest: clamp NavRectRel for gamepad move$[nav] NavMoveRequestForward %d$g.NavMoveDir != ImGuiDir_None && g.NavMoveClipDir != ImGuiDir_None$g.NavMoveFlags & ImGuiNavMoveFlags_Forwarded
                                                                          • API String ID: 0-1751011103
                                                                          • Opcode ID: ad27c87af09b4b14593f7e486a964ee187bae4ca7698edc377c855b789bca920
                                                                          • Instruction ID: a4d406505dab33fea4a03b9fb288fd3c36d8af2373578decbfec0d8449085e18
                                                                          • Opcode Fuzzy Hash: ad27c87af09b4b14593f7e486a964ee187bae4ca7698edc377c855b789bca920
                                                                          • Instruction Fuzzy Hash: F732E732D186CA46E3629B3680412F97390EF69758F1D9332DE68771EADFA8B1D1C700
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$dx >= 0$dy >= 0$e->ey >= y_top$e->sy <= y_bottom && e->ey >= y_top$fabsf(area) <= 1.01f$sy1 > y_final-0.01f$x >= 0 && x < len
                                                                          • API String ID: 0-3568222241
                                                                          • Opcode ID: 790997296c3ace0f49b917fc0f4bb1bfed2a2440f2ab62fef7e3b804057f5052
                                                                          • Instruction ID: 9fa1c18b767ee7283164cc90bed9b9f8cb58f3a19bdf5e1c7bacae232e647729
                                                                          • Opcode Fuzzy Hash: 790997296c3ace0f49b917fc0f4bb1bfed2a2440f2ab62fef7e3b804057f5052
                                                                          • Instruction Fuzzy Hash: DD12FC22D19F8D81F6129B3358820B5B250AFBF7C8F5DD732F948B25B2DF6871999600
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (0) && "Calling PopItemFlag() too many times!"$*Missing Text*$<Unknown>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Calling PopItemFlag() too many times!$p >= Data && p < DataEnd
                                                                          • API String ID: 0-3275063505
                                                                          • Opcode ID: 3f237b405e67921bd9baae32f9dd3e624540f6d79c49b90a67d27e0e418c0d1c
                                                                          • Instruction ID: 92c1c20e66c2503a744edf12f36509bd3c401bea9b7382bb00ba295a2f0fd4b6
                                                                          • Opcode Fuzzy Hash: 3f237b405e67921bd9baae32f9dd3e624540f6d79c49b90a67d27e0e418c0d1c
                                                                          • Instruction Fuzzy Hash: 98B1F473A0E68292EB148B14DD446B927A1FB45B9CF0C4135DE4CA3695DFBDE89EC301
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s"$g.NavActivateDownId == g.NavActivateId$g.NavLayer == ImGuiNavLayer_Main || g.NavLayer == ImGuiNavLayer_Menu$g.NavMoveDir == ImGuiDir_None$g.NavWindow != 0
                                                                          • API String ID: 0-2167808928
                                                                          • Opcode ID: 427d0da141f637192a49a342c54ed31517ac9e5b0644ee7899aab770a3be49cc
                                                                          • Instruction ID: f2d6e692edf9629940ddada9a2ef848a5834e48ce3b3c125f041723b69ee71e0
                                                                          • Opcode Fuzzy Hash: 427d0da141f637192a49a342c54ed31517ac9e5b0644ee7899aab770a3be49cc
                                                                          • Instruction Fuzzy Hash: AA72A936E086C689E7658F25C0443F92BE1EF45B48F1C4235DA6CA72E9DFF8A885C701
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$button >= 0 && button < ((int)(sizeof(g.IO.MouseDown) / sizeof(*(g.IO.MouseDown))))$button >= 0 && button < ImGuiMouseButton_COUNT$id != 0
                                                                          • API String ID: 1541411109-2768765550
                                                                          • Opcode ID: 3900b037c2da2cdda5bc8362f99d76c0409d858221d9f0606cb69f2f5720e628
                                                                          • Instruction ID: 2eac30570d334de077b89cbcab7280b3b08c04031eb0c87780ed012f0cea782e
                                                                          • Opcode Fuzzy Hash: 3900b037c2da2cdda5bc8362f99d76c0409d858221d9f0606cb69f2f5720e628
                                                                          • Instruction Fuzzy Hash: 8F220132E0D38646FB689A259C443BA6692BF5534CF0C4235DE5DA72E6CFBDB498C700
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: #RESIZE$5$6$C:\Users\55yar\Desktop\imgui-master\imgui.h$idx == 0 || idx == 1
                                                                          • API String ID: 0-650503096
                                                                          • Opcode ID: 116432343c9dd05c69f452d8b133a1a96b05ce90b026dd6bd93dd86571db12b9
                                                                          • Instruction ID: 870656314a2f34b7d92b224c181b76148e27ab66d642d548810ea9452cec6d05
                                                                          • Opcode Fuzzy Hash: 116432343c9dd05c69f452d8b133a1a96b05ce90b026dd6bd93dd86571db12b9
                                                                          • Instruction Fuzzy Hash: 7AB2FB32D1868A85E392CB36A4452B977A0EF59348F1C8731DA4CB75AADF38F585CB00
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$p >= begin() && p < end()$settings->ColumnsCount == table->ColumnsCount && settings->ColumnsCountMax >= settings->ColumnsCount$settings->ID == table->ID
                                                                          • API String ID: 0-2168725360
                                                                          • Opcode ID: 81fdfe0895e2e1dec32a2632009a5933e542f692bb517f10a4627c86eb4c6a01
                                                                          • Instruction ID: ee18d61bde7a5888cc019c745b7b7a39afb1166d3bb4baf83280f63df11ae97f
                                                                          • Opcode Fuzzy Hash: 81fdfe0895e2e1dec32a2632009a5933e542f692bb517f10a4627c86eb4c6a01
                                                                          • Instruction Fuzzy Hash: 7261A133A19A8186EB51CF25E8842A977A0FB5174CF18C436DB8D97291DF7CE58ACB01
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                          • String ID:
                                                                          • API String ID: 2933794660-0
                                                                          • Opcode ID: 68b080e5c74ecdc989d9497fb427bfec2812cf223949a70a0905cf8ba2b6c893
                                                                          • Instruction ID: c2290ec1f0126bfdefb3445c43aade35696345a3cef2313ae91ce37750114197
                                                                          • Opcode Fuzzy Hash: 68b080e5c74ecdc989d9497fb427bfec2812cf223949a70a0905cf8ba2b6c893
                                                                          • Instruction Fuzzy Hash: 48112122B15F018AEB00CF60EC547B933A4FB59B58F481D31DA5D96754DF7CD1598380
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ##NavUpdateWindowing$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0$shared_mods != 0
                                                                          • API String ID: 0-1670481530
                                                                          • Opcode ID: d6e076c0ac488d410e9a78e98a7fd59ac4bda507aceceb91430f4d5e6cb44405
                                                                          • Instruction ID: 6a15f403c692c1b0122f0739f61673ed2d4afb79b2f795c770be4100bd435cbf
                                                                          • Opcode Fuzzy Hash: d6e076c0ac488d410e9a78e98a7fd59ac4bda507aceceb91430f4d5e6cb44405
                                                                          • Instruction Fuzzy Hash: 3462C232A0968696F7698B3184443BA63D1FF55748F4C8235CA6DB32D6DFBCB4A8C701
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: #CLOSE$#COLLAPSE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                          • API String ID: 0-766050946
                                                                          • Opcode ID: 9ccbf3832dd879df979d0510c95930e81aaf760122ae5999722055eed8b2c8c9
                                                                          • Instruction ID: 034bb6f64c6f5f49d9ae7223cfde1ff7c1210426ab5e9b81638327c5cebe5f62
                                                                          • Opcode Fuzzy Hash: 9ccbf3832dd879df979d0510c95930e81aaf760122ae5999722055eed8b2c8c9
                                                                          • Instruction Fuzzy Hash: 1E121A32E08B8985E311CB3694416F977A0EF6A348F189732EE5CB32A5DF69E585C740
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$ImMax(size_contents_v, size_visible_v) > 0.0f$idx == 0 || idx == 1
                                                                          • API String ID: 0-3128625980
                                                                          • Opcode ID: 9aa9ca5f5fb1dfc7c2ff6d298503054f82a894e230bacc3a804948fe63dc92af
                                                                          • Instruction ID: 8a65b5529242c415a84002764b7bfe6fc06f187c6e5b0128738542951c107c2c
                                                                          • Opcode Fuzzy Hash: 9aa9ca5f5fb1dfc7c2ff6d298503054f82a894e230bacc3a804948fe63dc92af
                                                                          • Instruction Fuzzy Hash: EE120862D197DD85E213C63798412B9E351AF6E388F1CC733FD58729A6DF68B0D98600
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ##v$#ComboPopup$C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                          • API String ID: 0-2429816084
                                                                          • Opcode ID: 7f38be3dd6622036638159a4989da26a2b1f188278f5f2b1d16b63fbcbe0086e
                                                                          • Instruction ID: b7452937f4909519f86db5e7e6b11125db1f8910f9510b602b88ba236d4edbe2
                                                                          • Opcode Fuzzy Hash: 7f38be3dd6622036638159a4989da26a2b1f188278f5f2b1d16b63fbcbe0086e
                                                                          • Instruction Fuzzy Hash: A6E11533E09B898AE321CB76C8402E97360FF6934CF189722EE48775A5DF78A059D740
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (0) && "Calling PopItemFlag() too many times!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Calling PopItemFlag() too many times!
                                                                          • API String ID: 0-102052167
                                                                          • Opcode ID: 5c341cd6e1511ed2b285bccf83dd54460226a3d6e45a8981b339dc82e5f08e18
                                                                          • Instruction ID: 51d1df7ec22f1a54d8b415d925fac0947820a8e85076e5c165a8b5b61215c19a
                                                                          • Opcode Fuzzy Hash: 5c341cd6e1511ed2b285bccf83dd54460226a3d6e45a8981b339dc82e5f08e18
                                                                          • Instruction Fuzzy Hash: BBE1F8729186C985E3268B35D8413F9B3A0FF59758F0C8332EA88B71A5DF79A1D9C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID:
                                                                          • API String ID: 2739980228-0
                                                                          • Opcode ID: a2a33c03c673fc3db5b0a7af2bb4ad5d87ef3dece1cacefedc8f0cb3854d976e
                                                                          • Instruction ID: c34210efd2d686af556f2574a493c324131b862c08a6dbdf395210457abf3a31
                                                                          • Opcode Fuzzy Hash: a2a33c03c673fc3db5b0a7af2bb4ad5d87ef3dece1cacefedc8f0cb3854d976e
                                                                          • Instruction Fuzzy Hash: C1B12933A18AD586E721DF3594442BEB7A4FF59B48F088322EB8562654EF78E486C700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: InfoKeyboardLayoutLocale
                                                                          • String ID:
                                                                          • API String ID: 1218629382-0
                                                                          • Opcode ID: 9e33f65f36021c76e3ce5085f13d9bf961fb33b85001965e3fe80dccfd441406
                                                                          • Instruction ID: 1912a7d9314e2acff168cca7fb1bfcfc36f9f027808d232b0c151e4e7d4fd82d
                                                                          • Opcode Fuzzy Hash: 9e33f65f36021c76e3ce5085f13d9bf961fb33b85001965e3fe80dccfd441406
                                                                          • Instruction Fuzzy Hash: 0BF0E526715A8186E7628B66A800AAEB394FB5CB58F184037CF8DA3310DE7DD48BC740
                                                                          Strings
                                                                          • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF651FFC2DD
                                                                          • (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened, xrefs: 00007FF651FFC2E4
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened$C:\Users\55yar\Desktop\imgui-master\imgui.cpp
                                                                          • API String ID: 0-3836044477
                                                                          • Opcode ID: fd5fe447b9d7518a35cc5895bd672c193580b2feb93a140ec6dd6fc64d8195f5
                                                                          • Instruction ID: 3f85a5327f4232055055dac7c339def23fc8e933f629a3d3144bfb0a7bdaaa75
                                                                          • Opcode Fuzzy Hash: fd5fe447b9d7518a35cc5895bd672c193580b2feb93a140ec6dd6fc64d8195f5
                                                                          • Instruction Fuzzy Hash: D0D1E963D2C6AD81E322963740424B863D09F7E389F1D9F32ED6CB35A5DF98B5858740
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: !(o > b->size || o < 0)$C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                                          • API String ID: 0-2013812653
                                                                          • Opcode ID: 338cbcf2d73f435f5922b98e8238c06777b811b88471036ee86486d399c18bc5
                                                                          • Instruction ID: f5491227508b8a849dfe76b5025329294cedd01a4787c5d0d2a711b9d5b4d8d0
                                                                          • Opcode Fuzzy Hash: 338cbcf2d73f435f5922b98e8238c06777b811b88471036ee86486d399c18bc5
                                                                          • Instruction Fuzzy Hash: CAB1B032A08AD88AF701CF7A94411BDB7B0FB99389F145325EF8972675DF78A585CB00
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i*stride_in_bytes] == 0
                                                                          • API String ID: 0-15633718
                                                                          • Opcode ID: 31de7da7b85a2ca0f7b465d4c6b43859fb456ff60d2410b47046c024e5081591
                                                                          • Instruction ID: 0f8e9a654ac78f5313ae9ba2de77d3d2b252c996092bd2c9111b81303e77088e
                                                                          • Opcode Fuzzy Hash: 31de7da7b85a2ca0f7b465d4c6b43859fb456ff60d2410b47046c024e5081591
                                                                          • Instruction Fuzzy Hash: EA71187360D2E247E3264B2CAC4136EAED1B79A358F5C4235EAC9D3B45CD7CE515CA40
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i] == 0
                                                                          • API String ID: 0-2060079458
                                                                          • Opcode ID: 00354369be909df9498fe21faccccd311e8301600fa052487b4864d57ac2e6d2
                                                                          • Instruction ID: 0a6a64e83b7abc164428ec1f094f654a0ddbe9abe39047fca294e0801d8aac83
                                                                          • Opcode Fuzzy Hash: 00354369be909df9498fe21faccccd311e8301600fa052487b4864d57ac2e6d2
                                                                          • Instruction Fuzzy Hash: 3871D26362D6E286D7218F79980067EBFE5E795348F4C4236EA8893B45CE7DE118CB00
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$text_end != 0
                                                                          • API String ID: 0-48455972
                                                                          • Opcode ID: 337525c904e070bd42df79c0a6487294a94bd2ebcfc3121796ca707f84feba5e
                                                                          • Instruction ID: 03c8b011e01b25c42bbc24430d386aed4eb6a612aecaca8a15c8eb7589189dd6
                                                                          • Opcode Fuzzy Hash: 337525c904e070bd42df79c0a6487294a94bd2ebcfc3121796ca707f84feba5e
                                                                          • Instruction Fuzzy Hash: 3841E921B4E65A46E96189239CC0179AA61AF6978CF9CC732DD0C7B6D4DFBCE4C98600
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                          • API String ID: 0-1180621679
                                                                          • Opcode ID: 6ed20166e65553b91257ace29f513335ab454b8572dbed2f61cfc2601968656f
                                                                          • Instruction ID: 264d2c3895ebfcb24cfeb4049bdb327dd8e5c5a93ce5497d7caac6a040398f3e
                                                                          • Opcode Fuzzy Hash: 6ed20166e65553b91257ace29f513335ab454b8572dbed2f61cfc2601968656f
                                                                          • Instruction Fuzzy Hash: 46318E72B141E58FEB98CB62A854F7D7B60E3D5782B896121EFC067A48C73CD511CB50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                          • API String ID: 0-1180621679
                                                                          • Opcode ID: 440f36ff81ebcb3adc85cc04d88a8c0a58b369e470e635c1928618b8866c0834
                                                                          • Instruction ID: 19075b2ab0f1e291aa1a97fafd24f054b045b7f15cde5a17298550c2f100513b
                                                                          • Opcode Fuzzy Hash: 440f36ff81ebcb3adc85cc04d88a8c0a58b369e470e635c1928618b8866c0834
                                                                          • Instruction Fuzzy Hash: 541159B160869186EB08CB21E8E007973A0F394786F45103BEBDA47648DE3CD185C750
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: P
                                                                          • API String ID: 0-3110715001
                                                                          • Opcode ID: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                                          • Instruction ID: 5f1c3e9186a8e9691e5333081fb3756cb76a4d43ce9e6cfbb900152b332c1f28
                                                                          • Opcode Fuzzy Hash: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                                          • Instruction Fuzzy Hash: 1012D0302587898FD348DF28C490A6AB7E2FBCD308F504A6DF48AD7765D634EA41CB42
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @
                                                                          • API String ID: 0-2766056989
                                                                          • Opcode ID: af22b2a64cd9b34464c746f31960b8c553625a99857650b96e506a8a1dbf1dca
                                                                          • Instruction ID: 8d39a64b74d77ae21423f447306f5b9bd0b98a53fb0a265c529c47dcb502e0d2
                                                                          • Opcode Fuzzy Hash: af22b2a64cd9b34464c746f31960b8c553625a99857650b96e506a8a1dbf1dca
                                                                          • Instruction Fuzzy Hash: D7E10F7421CB888FE7A8DF18C458B6AB7E1FB99305F10891DE08EC3260DB75D985CB46
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                                          • API String ID: 0-2705777111
                                                                          • Opcode ID: 64546066472ca3b8349dd8d249968d4cd0d82be6d00cd49db611cd94df8f4d3b
                                                                          • Instruction ID: 7924848363486da09d770220c8ab4941626c49f9cacf8b6673f8dce2cf4dd00b
                                                                          • Opcode Fuzzy Hash: 64546066472ca3b8349dd8d249968d4cd0d82be6d00cd49db611cd94df8f4d3b
                                                                          • Instruction Fuzzy Hash: C6513AA6B254B183EB248F2AC8D15BC3BD1F74A746FD88476D65CC2E91C93DC14A9F10
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 19d529cf8631021c5dd542a830c84e469b7f6db80fccbf318bd5255d4788bf88
                                                                          • Instruction ID: 2f482ad9b1fd292d995525a962cc0b6d0573ba70eb3d393c221b6b1fb605de89
                                                                          • Opcode Fuzzy Hash: 19d529cf8631021c5dd542a830c84e469b7f6db80fccbf318bd5255d4788bf88
                                                                          • Instruction Fuzzy Hash: A3926B33925B8886D716CF37948106DBB60FFADB88B19D716EE0863761EB35E494DB00
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007
                                                                          • String ID:
                                                                          • API String ID: 3568877910-0
                                                                          • Opcode ID: 0272e996983db26e572b41d2953600904384c8fc52a617507253f3357cb87ccd
                                                                          • Instruction ID: 9c739e366e1138d33c6c8b9d07ce72f331b45f103475fc254695a117189144dc
                                                                          • Opcode Fuzzy Hash: 0272e996983db26e572b41d2953600904384c8fc52a617507253f3357cb87ccd
                                                                          • Instruction Fuzzy Hash: F2829F73815BC187D328CF30B9981DAB7A8FB55344F105219DBF623A61DB78E1A6E708
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c56d570ab54005e0ebe5a6e5812436a4f6b652bcd2b91132ad8201dc9bb1d3d0
                                                                          • Instruction ID: 315f8a48f5b5c879785e9b118704061efbc545ee3383e09bc6301545d4334c32
                                                                          • Opcode Fuzzy Hash: c56d570ab54005e0ebe5a6e5812436a4f6b652bcd2b91132ad8201dc9bb1d3d0
                                                                          • Instruction Fuzzy Hash: 6D22C373E096958AE711CA36D8403BEB7B0EF5934CF184736EE48B6595DFB8A458CB00
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c56881822656bce64306f4bdbbfd4d3a54c53e1fbf9d1ba752f976963bfc6c0c
                                                                          • Instruction ID: 3ffdbff9ba9254cb097bdad1c103ebee23de5074470ad8d741dc083893148f4d
                                                                          • Opcode Fuzzy Hash: c56881822656bce64306f4bdbbfd4d3a54c53e1fbf9d1ba752f976963bfc6c0c
                                                                          • Instruction Fuzzy Hash: 2C02E633A186C486E325CF36944167DB7E0FF5D798F188326EB89A3655EB38E591CB00
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5cdcacff072863030bac574a795dcf5713a463dc51147c05da48169f858605a4
                                                                          • Instruction ID: e2a0ba2f564178d6d7947b9f565f7d4563496066846af6f94acec6320b569028
                                                                          • Opcode Fuzzy Hash: 5cdcacff072863030bac574a795dcf5713a463dc51147c05da48169f858605a4
                                                                          • Instruction Fuzzy Hash: 5602FD33E19B8986E2119B379C421B9B360FFAE38CF185721FE44725B1DF69F1959600
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 36815946f53eb744c7e6b2d6d659516926bc1e14d115f35c3d92e5c89833b246
                                                                          • Instruction ID: 7ce23f588a88d7ed3dbf3ea172e03cf8f354aaf19d1e433d2c96a0d420ba8a3b
                                                                          • Opcode Fuzzy Hash: 36815946f53eb744c7e6b2d6d659516926bc1e14d115f35c3d92e5c89833b246
                                                                          • Instruction Fuzzy Hash: 73F1D37290A6828AEB71EA25DC403BD77A0EB4474CF1C4136DE89A76D5DFBDE449C700
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2f2afc71bcb6e60fe6b48f1fd428c52dd563754f62c92c5580ba7913ac805761
                                                                          • Instruction ID: 012f7190429cfbba7b846fc07d36cca8efd2a7d94cbe68a07a0cd29c0fc3fe45
                                                                          • Opcode Fuzzy Hash: 2f2afc71bcb6e60fe6b48f1fd428c52dd563754f62c92c5580ba7913ac805761
                                                                          • Instruction Fuzzy Hash: A7D16C6290D6C396EFE68E3540002BD27D1BF12B48F5C4335ED89AB59ACF2DEB459231
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 921d0129446da77aaddaa4aa987365c8784144cb00f78a1ee875d2a03e3975c2
                                                                          • Instruction ID: e54fd8894988dd67248fddf40a688080aa7c01eb062b669a2b6ad65f8664c70a
                                                                          • Opcode Fuzzy Hash: 921d0129446da77aaddaa4aa987365c8784144cb00f78a1ee875d2a03e3975c2
                                                                          • Instruction Fuzzy Hash: 41C12B36750B8982E7148F3BD454BAD2761EB9EF98F09D231CE0A17B64DF3AD1458700
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 562b7d3f91c9f74b619fe1397834ae2ab76450cf0a24359a5ff58522b0b22631
                                                                          • Instruction ID: 5f65d2d95faa777c738e9e95c0aa3e7aaa731f01363ceee8bdc9eadb6d249729
                                                                          • Opcode Fuzzy Hash: 562b7d3f91c9f74b619fe1397834ae2ab76450cf0a24359a5ff58522b0b22631
                                                                          • Instruction Fuzzy Hash: 9BB1A622E28BCC81E223963754825FAE250AF7F3C5F2DDB23FD84756B29F6461D55500
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4a80b03f7bc89fefc7a1c72021f62cde799e707efb33d253c2770a742c07cca4
                                                                          • Instruction ID: a7bdaea942706108a9e7b3565a6cff3fcdbb60ed4d64b47766a4bfc059f1e44d
                                                                          • Opcode Fuzzy Hash: 4a80b03f7bc89fefc7a1c72021f62cde799e707efb33d253c2770a742c07cca4
                                                                          • Instruction Fuzzy Hash: 1AD1F633E0A7C199E3518F3584807F83BD4FB66B08F0D827ADB986765ACF689450DB61
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 64ea5ef9b4145974ce1aca6257ee471b40ef25de3a4544f3e9e6309c1d7e7050
                                                                          • Instruction ID: 9a5ed40e8a14cabe3c5d001a30875d33127ae4e9c808c2ceae89307b4aff5882
                                                                          • Opcode Fuzzy Hash: 64ea5ef9b4145974ce1aca6257ee471b40ef25de3a4544f3e9e6309c1d7e7050
                                                                          • Instruction Fuzzy Hash: 0B91BF339186C596E3568F3690443EA77E0FF44758F1C8336DA69A72E9DFB8A584CB00
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                                          • Instruction ID: 8f60a195d6f7ff8a9d00f3ef039faeb7920a6cf85c5f7e98934ea5b2fa68ee25
                                                                          • Opcode Fuzzy Hash: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                                          • Instruction Fuzzy Hash: 48410DDFC0DAC51BC7428664ACAA6827F709A2324EBCF58DBD498CA587F048D409D712
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3b1cbfc256745a41373ab982e6b066a4e4986348924d812dd01365a69b9172fb
                                                                          • Instruction ID: 0b8c262bd31554d784fc85a2a79a1c657d3875aa40628a584bc82343b995d675
                                                                          • Opcode Fuzzy Hash: 3b1cbfc256745a41373ab982e6b066a4e4986348924d812dd01365a69b9172fb
                                                                          • Instruction Fuzzy Hash:
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f7b779b2a95b4f300d0ae6a9b3ef9dedb5f3a86a9cee5a172e0f78046b74256c
                                                                          • Instruction ID: 66e4aaf4312735dc546ff477af0efbe1747efa09a2892316617352e5cecb37ff
                                                                          • Opcode Fuzzy Hash: f7b779b2a95b4f300d0ae6a9b3ef9dedb5f3a86a9cee5a172e0f78046b74256c
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                            • Part of subcall function 000002C33ACC5360: _WChar_traits.LIBCPMTD ref: 000002C33ACC538D
                                                                            • Part of subcall function 000002C33ACC4AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC4AD0
                                                                            • Part of subcall function 000002C33ACC4AA0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33ACC4B2F
                                                                            • Part of subcall function 000002C33ACC4AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC4B41
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33ACC48B8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::Concurrency::details::_CriticalEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWork$Char_traits
                                                                          • String ID: $ $ $B$D$K$KDBM$M$a$a$a$b$c$e$g$i$l$o$t$y
                                                                          • API String ID: 1777712374-1292890139
                                                                          • Opcode ID: c02a726d3c2bd88a4534588b83aa4fca235328903684469cf21292f4d99c4a12
                                                                          • Instruction ID: d9a0fc87192b81c1058513830f1fa3c18287c8e7f8de41083ba33988f843711f
                                                                          • Opcode Fuzzy Hash: c02a726d3c2bd88a4534588b83aa4fca235328903684469cf21292f4d99c4a12
                                                                          • Instruction Fuzzy Hash: FC61D77050CB848FE760EB68C448B9ABBE1FBA9704F04495DE0C9C7261DBB99488CB53
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F5630
                                                                          • String ID: 1.91.6 WIP$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$strcmp(version, "1.91.6 WIP") == 0 && "Mismatched version string!"$sz_idx == sizeof(ImDrawIdx) && "Mismatched struct layout!"$sz_io == sizeof(ImGuiIO) && "Mismatched struct layout!"$sz_style == sizeof(ImGuiStyle) && "Mismatched struct layout!"$sz_vec2 == sizeof(ImVec2) && "Mismatched struct layout!"$sz_vec4 == sizeof(ImVec4) && "Mismatched struct layout!"$sz_vert == sizeof(ImDrawVert) && "Mismatched struct layout!"
                                                                          • API String ID: 1938522722-1295771896
                                                                          • Opcode ID: 81d2e9201c58c4257a11a08258dd765dc5fa7c07bb397093847fbf6462c9f984
                                                                          • Instruction ID: 2ed73370e715d600205872a5cb4423e2b80109ee1f9f3e6a990005f1931ae3ad
                                                                          • Opcode Fuzzy Hash: 81d2e9201c58c4257a11a08258dd765dc5fa7c07bb397093847fbf6462c9f984
                                                                          • Instruction Fuzzy Hash: 91318031B0AA0281F714AB01EC446B57361FB65B8CF8C4435D84DA3AA4DFEDE15EC780
                                                                          APIs
                                                                          • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000002C33AD46BDD
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD46C5A
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD46C73
                                                                          • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000002C33AD46CB3
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD46D12
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD46D2B
                                                                          • _Min_value.LIBCPMTD ref: 000002C33AD46D62
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD46D7E
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD46D97
                                                                          • _Max_value.LIBCPMTD ref: 000002C33AD46DCE
                                                                          • _Min_value.LIBCPMTD ref: 000002C33AD46DEB
                                                                            • Part of subcall function 000002C33AD4F140: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000002C33AD4F165
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Affinity::operator!=Concurrency::details::HardwareMin_value$Max_valueSchedulerScheduler::_
                                                                          • String ID:
                                                                          • API String ID: 2048856540-0
                                                                          • Opcode ID: e866146c94e960af1540157134187f2a0fce7dbc0c02fbcd93b84c3e2d61bdcf
                                                                          • Instruction ID: cfc6ea34865f99da8a5338392fc648e444087e218c60997649b962db8ccf6a97
                                                                          • Opcode Fuzzy Hash: e866146c94e960af1540157134187f2a0fce7dbc0c02fbcd93b84c3e2d61bdcf
                                                                          • Instruction Fuzzy Hash: 6902CB7015CB888FE7B5EB58C498BDEB3E1FBA8301F40495E958EC3291DE749585CB82
                                                                          APIs
                                                                          • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000002C33AD4722D
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD472AA
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD472C3
                                                                          • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000002C33AD47303
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD47362
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD4737B
                                                                          • _Min_value.LIBCPMTD ref: 000002C33AD473B2
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD473CE
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD473E7
                                                                          • _Max_value.LIBCPMTD ref: 000002C33AD4741E
                                                                          • _Min_value.LIBCPMTD ref: 000002C33AD4743B
                                                                            • Part of subcall function 000002C33AD4F190: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000002C33AD4F1B5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Affinity::operator!=Concurrency::details::HardwareMin_value$Max_valueSchedulerScheduler::_
                                                                          • String ID:
                                                                          • API String ID: 2048856540-0
                                                                          • Opcode ID: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                                          • Instruction ID: 58e9f6b75b8db293e9d76648804f805b34b5a0a092627240131a4af32848d918
                                                                          • Opcode Fuzzy Hash: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                                          • Instruction Fuzzy Hash: 4602C97015CB888FE7B5EB58C498BDEB7E1FBA8300F40495E958EC3291DE749585CB82
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: ##Background$##Foreground$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$Size > 0$draw_data->CmdLists.Size == draw_data->CmdListsCount$g.Initialized
                                                                          • API String ID: 1541411109-3285338674
                                                                          • Opcode ID: 3eddb23e6f65979a2f4295522fa07fb78cbb8d6acc2174c13f76836e2abaee22
                                                                          • Instruction ID: 9cb7601b87a44ff75364757fd2cea063cb3bf8f8194171d193d54ea0e64066f5
                                                                          • Opcode Fuzzy Hash: 3eddb23e6f65979a2f4295522fa07fb78cbb8d6acc2174c13f76836e2abaee22
                                                                          • Instruction Fuzzy Hash: 48E1CB32B09A8686EB90CF25C9446B937E5FB84B88F4C4635EA0DE7759DF38E945C300
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: ((char*)(state->undo_rec + state->redo_point + 1) + move_size) <= buf_end$((char*)(state->undo_rec + state->redo_point)) >= buf_begin$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$C:\Users\55yar\Desktop\imgui-master\imstb_textedit.h$i >= 0 && i < Size$idx <= obj->TextLen
                                                                          • API String ID: 1541411109-1648308927
                                                                          • Opcode ID: cba7749c605e8c7e24c6b8a343890df7f9a2b9aba5917ea33c91d25d186e9d41
                                                                          • Instruction ID: 29bc885444d47dc5985d1a8756a6731c3f2327e92884d8b4c9b21e61d07b5805
                                                                          • Opcode Fuzzy Hash: cba7749c605e8c7e24c6b8a343890df7f9a2b9aba5917ea33c91d25d186e9d41
                                                                          • Instruction Fuzzy Hash: B791FEB2B1679582EB08CF24D8443BC3B62FB95B88F088135CA4DA7645DF7CE54AC714
                                                                          APIs
                                                                          • 00007FFBBBD91310.VCRUNTIME140(00000000,?,00000000,?,00007FF652011E8F), ref: 00007FF652011C6E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$Fonts.Size > 0 && "Cannot use MergeMode for the first font"$Size > 0$font_cfg->FontData != 0 && font_cfg->FontDataSize > 0$font_cfg->OversampleH > 0 && font_cfg->OversampleV > 0 && "Is ImFontConfig struct correctly initialized?"$font_cfg->SizePixels > 0.0f && "Is ImFontConfig struct correctly initialized?"
                                                                          • API String ID: 1541411109-1408190167
                                                                          • Opcode ID: 948f9d0b89698d981a0300441c81e106b63c47d57a014fc4e40133443b453c44
                                                                          • Instruction ID: ee9b58349e8b0e4fe1c09f65156d7e0f37b5ed6ecc6ec17b0b89b6589670f330
                                                                          • Opcode Fuzzy Hash: 948f9d0b89698d981a0300441c81e106b63c47d57a014fc4e40133443b453c44
                                                                          • Instruction Fuzzy Hash: 6791C132609B8296EB54DF25EC8076873B4FB14B8CF484536CA4DA32A5DFB8D5ADC341
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$std::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 2527301759-0
                                                                          • Opcode ID: 71ef438b1bb58b4182dc28e9ffd7d5b29104a32867a1bdd3a258c92d20c36c8b
                                                                          • Instruction ID: e97cd9e581f63ce5617c5dba642904c761e1838623199b71ccb89e87710faee7
                                                                          • Opcode Fuzzy Hash: 71ef438b1bb58b4182dc28e9ffd7d5b29104a32867a1bdd3a258c92d20c36c8b
                                                                          • Instruction Fuzzy Hash: BC6143306986954BF259EB99C469F2FB7E1FBD5340F508C98F089C71E2DA24DE01C792
                                                                          APIs
                                                                          • 00007FFBBBD91310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF65200D0B7), ref: 00007FF652010A83
                                                                          • 00007FFBBBD91310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF65200D0B7), ref: 00007FF652010C0C
                                                                          • 00007FFBBBD91310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF65200D0B7), ref: 00007FF652010C2C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: $C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                          • API String ID: 1541411109-669993125
                                                                          • Opcode ID: 71389e765cdf82a4882dcaf081e1e13a47cd802ca95431e42650f4a32f630d61
                                                                          • Instruction ID: 24ba234f86d0930ee8736fbe499a9d346bfa334a5cb34d690a3fca74635313e8
                                                                          • Opcode Fuzzy Hash: 71389e765cdf82a4882dcaf081e1e13a47cd802ca95431e42650f4a32f630d61
                                                                          • Instruction Fuzzy Hash: 72E1CD72B09A8686EB14CF15DC4076A33A1FB94B8CF498135DE8ED7694DFB8E489C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: <NULL>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$[focus] FocusWindow("%s", UnlessBelowModal): prevented by "%s".$i >= 0 && i < Size$window == 0 || window->RootWindow != 0
                                                                          • API String ID: 1541411109-1613245857
                                                                          • Opcode ID: 0de476a2f64df0a755ba6e5737fd8eb24f836f4b030cf11e6ebc8070b5858ee1
                                                                          • Instruction ID: 9a5787960c14dd2bc59d6c7cd292fcec33ff191de4bddc640671f4f1348c0ae3
                                                                          • Opcode Fuzzy Hash: 0de476a2f64df0a755ba6e5737fd8eb24f836f4b030cf11e6ebc8070b5858ee1
                                                                          • Instruction Fuzzy Hash: 31A1AF72B0968286EB69CF25E544AB9A3E1FF40B84F4C0135DA6DA7799DFACF454C300
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$i >= 0 && i < Size$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table->MemoryCompacted == false
                                                                          • API String ID: 2739980228-1783795845
                                                                          • Opcode ID: fc0a72d210a41ad6fc96d4dd79000ba97f4ed6267a4d297a9d124af00df6f25a
                                                                          • Instruction ID: f1b6b3457268e61ffccff2c3231441f1fd82b78ab968a10580250e49de016079
                                                                          • Opcode Fuzzy Hash: fc0a72d210a41ad6fc96d4dd79000ba97f4ed6267a4d297a9d124af00df6f25a
                                                                          • Instruction Fuzzy Hash: 6451C272A0AA8286DB14CF15EC542E877A0FB55B4CF480132CE4C977A4DFBDE19AC340
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Decorator::getTableTypeshared_ptr
                                                                          • String ID: d
                                                                          • API String ID: 143873753-2564639436
                                                                          • Opcode ID: 69cead7afb0e039ecb5138173952be44cfc6b8be8a7abe79b5a91df074882742
                                                                          • Instruction ID: 60e2754373e60e53fbb70ece5289229a49512edffc67678d0a841c4a813cf692
                                                                          • Opcode Fuzzy Hash: 69cead7afb0e039ecb5138173952be44cfc6b8be8a7abe79b5a91df074882742
                                                                          • Instruction Fuzzy Hash: D29130305587888FE795EB68C058B9EBBE1FBD9300F544D9DF089C32A2DA349A45DB42
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Decorator::getTableTypeshared_ptr
                                                                          • String ID: d
                                                                          • API String ID: 143873753-2564639436
                                                                          • Opcode ID: 1a6a6722034d945976169db871c6d8bc4f2ed9e348582280147d843b730620fb
                                                                          • Instruction ID: 7a6e5732ecd04e6bb800ab8b9c4757ab79a9e370e7a6ea551f092bf70572adfb
                                                                          • Opcode Fuzzy Hash: 1a6a6722034d945976169db871c6d8bc4f2ed9e348582280147d843b730620fb
                                                                          • Instruction Fuzzy Hash: 4A9121305587888FE795EB68C058B9EB7E1FBD9300F544D9DF089C32A1DA349A45DB42
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Decorator::getTableTypeshared_ptr
                                                                          • String ID: d
                                                                          • API String ID: 143873753-2564639436
                                                                          • Opcode ID: 2612a0b920fc091130e9c3c3613e0ec6eef3206baac283914f1a5a83fc148c58
                                                                          • Instruction ID: 7d5ff02190664c0c6f4584b3c4124cdf598266ab5879110ead33a8430605d0f4
                                                                          • Opcode Fuzzy Hash: 2612a0b920fc091130e9c3c3613e0ec6eef3206baac283914f1a5a83fc148c58
                                                                          • Instruction Fuzzy Hash: 7D9130301187C48FE395EB68C458BAEBBE1FBD9300F444D9DF089C72A2DA349A45DB42
                                                                          APIs
                                                                            • Part of subcall function 00007FF6520050E0: 00007FFBC92E49A0.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF652005139
                                                                          • 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6520143A0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$i >= 0 && i < Size$pack_context != 0$pack_rects[i].w == user_rects[i].Width && pack_rects[i].h == user_rects[i].Height$user_rects.Size >= 1
                                                                          • API String ID: 4100318414-766226355
                                                                          • Opcode ID: f3745da6aa7887e7c659632f348144b4e38ccf6ef361ce7be0997c7e4011c5c9
                                                                          • Instruction ID: 3093d431653d28e59054fd3d0fc9cf457a4e809d9e5f03037561f2dcb4672750
                                                                          • Opcode Fuzzy Hash: f3745da6aa7887e7c659632f348144b4e38ccf6ef361ce7be0997c7e4011c5c9
                                                                          • Instruction Fuzzy Hash: F3A1AF32B0AA5296EB44DF15DC445B87360FB90B8CF488136CE4DA76A4DFBCE59AC740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: !g.WindowsFocusOrder.contains(window)$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$g.WindowsFocusOrder[window->FocusOrder] == window$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                          • API String ID: 1541411109-3130785268
                                                                          • Opcode ID: 51fa6353a5e719cb7f80786e05cf48ca506108d67d08d8a577123632a494ddae
                                                                          • Instruction ID: 8bed9b5681fc5ef6980c13f95c11d7e30281e661f86b8f6c91ee0c3dffe50375
                                                                          • Opcode Fuzzy Hash: 51fa6353a5e719cb7f80786e05cf48ca506108d67d08d8a577123632a494ddae
                                                                          • Instruction Fuzzy Hash: 0171B43670A68386EB24CF15D8406F83761FB94B98F584132CA4DA7B98CF7DE696C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$cmd.ElemCount == 6$i >= 0 && i < Size$it >= Data && it <= Data + Size
                                                                          • API String ID: 1541411109-3684587188
                                                                          • Opcode ID: 28aed653d5d53d3af5ea67f15fe131aa0ac912b20bf8b35b3c199dbb44b19b6e
                                                                          • Instruction ID: 55dcd0e4c64b88735dbddaa2170a181a98324798a8ee16f14235ed4d917c8e8a
                                                                          • Opcode Fuzzy Hash: 28aed653d5d53d3af5ea67f15fe131aa0ac912b20bf8b35b3c199dbb44b19b6e
                                                                          • Instruction Fuzzy Hash: 6E819532A18AC682E7508F29D8403B97370FFA8748F489331DA8D67664DF7DE59AC740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$char_traits
                                                                          • String ID: $'
                                                                          • API String ID: 2432257368-2481900351
                                                                          • Opcode ID: 52a6df86987effc56c3942b1dc471f96e7d443776264125f91504f2597ebadb0
                                                                          • Instruction ID: 7546a2ac1962c802496b815f31e747a93687e248f562e63695811f749b4d24b8
                                                                          • Opcode Fuzzy Hash: 52a6df86987effc56c3942b1dc471f96e7d443776264125f91504f2597ebadb0
                                                                          • Instruction Fuzzy Hash: B9511F31558AC88FE395FB54C499BDEB7E1FBD8700F40895DE48AC31A2DE349645CB82
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: EventMouseTrack$ClientExtraInfoMessageScreen
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                          • API String ID: 3561655495-3890275027
                                                                          • Opcode ID: abe9a299fd20b9a6fbd2fc3767dffb8d4ebf984e011b516c80763c98f3087046
                                                                          • Instruction ID: 8fab4a5a8a71f296ae02397c040bc790723b3e2cc21f6b6411cb02b5305820b8
                                                                          • Opcode Fuzzy Hash: abe9a299fd20b9a6fbd2fc3767dffb8d4ebf984e011b516c80763c98f3087046
                                                                          • Instruction Fuzzy Hash: 2B61AF72A096428BE750CF65D8406BD77B5FB68748F1C8136DE0AA3A94CFBCE55AC700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: __swprintf_l
                                                                          • String ID: #Child$%s/%08X$%s/%s_%08X$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$id != 0
                                                                          • API String ID: 1488884202-1586801193
                                                                          • Opcode ID: bdd4c8a56be0493f01b00d6cc279636af3cb9b378932b88e7a53b070b5721d9e
                                                                          • Instruction ID: 5ccef60fc0176071170b3a55caf94f7ded775cf5dbf215e6fb9d68f2dbfc0fd5
                                                                          • Opcode Fuzzy Hash: bdd4c8a56be0493f01b00d6cc279636af3cb9b378932b88e7a53b070b5721d9e
                                                                          • Instruction Fuzzy Hash: 7051E332A0868696E754DF26D4402E977E0FF98748F0C8636EA4DA3695CF7CE1A5C700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID:
                                                                          • API String ID: 2739980228-0
                                                                          • Opcode ID: 57775b08057a0cb686b1252a14b079b2badbfb1439e6d4f1093d26c913e37d6c
                                                                          • Instruction ID: cb4072a2afcde86af7a1d94ed82764def0f4afffa5c657bc1814d358ee8b399b
                                                                          • Opcode Fuzzy Hash: 57775b08057a0cb686b1252a14b079b2badbfb1439e6d4f1093d26c913e37d6c
                                                                          • Instruction Fuzzy Hash: CC02D17271998292DB99EF24C9954FC73B0FB54B44B984232D70ED72A1DF38E66AC300
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$z != 0$z->direction$z->ey >= scan_y_top
                                                                          • API String ID: 0-479673919
                                                                          • Opcode ID: 207b780c0f846decccf7b2c64cf49cdc236c3d2dc65c4374e3ac0e9dfbeac955
                                                                          • Instruction ID: 2088103acc0d9f991a3a79035c03c2d47d2f5171e4fa0b1a7d8a92d2b1cc07f7
                                                                          • Opcode Fuzzy Hash: 207b780c0f846decccf7b2c64cf49cdc236c3d2dc65c4374e3ac0e9dfbeac955
                                                                          • Instruction Fuzzy Hash: EE12EA3290ABC586E752CF35D4412A9B360FF58788F5C8322DB49B3664EF78E599C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$it >= Data && it <= Data + Size$off >= 4 && off < Buf.Size$p >= begin() && p < end()
                                                                          • API String ID: 1541411109-15920025
                                                                          • Opcode ID: f146da49762cb8cd1275c042e6d03367f461630165a1e30583ec68414f4dae0a
                                                                          • Instruction ID: 99c4fe7f320a4724cb8cb589b8ad0f43e91f60bb57f6316658ddf8c9ccfe232c
                                                                          • Opcode Fuzzy Hash: f146da49762cb8cd1275c042e6d03367f461630165a1e30583ec68414f4dae0a
                                                                          • Instruction Fuzzy Hash: 4891E3B6B19A8786EB548F25D8405B873A1FF44B88F488235DA0ED7B98DF3CE955C700
                                                                          APIs
                                                                          • 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE8442
                                                                          • 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE84FA
                                                                          • 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE858A
                                                                            • Part of subcall function 00007FF651FE81E0: 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE8269
                                                                            • Part of subcall function 00007FF651FE81E0: 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE82E9
                                                                            • Part of subcall function 00007FF651FE81E0: 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE836A
                                                                          • 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF651FE8624
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$DrawList == &DrawListInst
                                                                          • API String ID: 2739980228-20161693
                                                                          • Opcode ID: c8be5354a01ef17ca92d8d4e428b236ce82e9f2ba0a2a98cb91df7b37cfa96f1
                                                                          • Instruction ID: b95c36af6f430d04b1ef853ec43f2e6a3b15bea586490d009f96d0eea4e7c34a
                                                                          • Opcode Fuzzy Hash: c8be5354a01ef17ca92d8d4e428b236ce82e9f2ba0a2a98cb91df7b37cfa96f1
                                                                          • Instruction Fuzzy Hash: 6871F173609A8286C785EF24E4951FC73B5FB58B48F584236DA0ED7264DF38D69AC340
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$D91310F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->SortOrder < table->SortSpecsCount$p >= Data && p < DataEnd
                                                                          • API String ID: 3519738495-2291414753
                                                                          • Opcode ID: c98e87dfe587c474b0860b6d55d617259ab1cc65025dcbfab041ced95545847a
                                                                          • Instruction ID: bd2e593211d1ca8b0bb8f77a2aa660d2987a2fe4d3b09664e71d51d499a791b2
                                                                          • Opcode Fuzzy Hash: c98e87dfe587c474b0860b6d55d617259ab1cc65025dcbfab041ced95545847a
                                                                          • Instruction Fuzzy Hash: C161AE3360AA9296DB08DF29D9842BC73B0FB44B48F484136DB5DD7254DFB8E5AAC341
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$i >= 0 && i < Size$pos <= text_len
                                                                          • API String ID: 1541411109-3124524525
                                                                          • Opcode ID: 43148d90905608da133ba6f2dc9b7995a38c7d11a5028563e3b51f33180f49da
                                                                          • Instruction ID: 7311fab317086b481b3a6220a20664cda0c48484970f540ee2d503f2d98fa29d
                                                                          • Opcode Fuzzy Hash: 43148d90905608da133ba6f2dc9b7995a38c7d11a5028563e3b51f33180f49da
                                                                          • Instruction Fuzzy Hash: E141F773B0964687E7288F19ED4027A7761FB44798F084036CE8DE3695DEBCF58A8740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$Decorator::getTableTypebool_shared_ptr
                                                                          • String ID:
                                                                          • API String ID: 2413108386-0
                                                                          • Opcode ID: 860d05d0c23d945e2812b9969cd3f9d0f2eb79ac7c3eafe6dc3321d711d52ae6
                                                                          • Instruction ID: 5d5c578a44d183e1014a4fa544e6921a6854fd44cdcf66f9ac2c14826c2078a6
                                                                          • Opcode Fuzzy Hash: 860d05d0c23d945e2812b9969cd3f9d0f2eb79ac7c3eafe6dc3321d711d52ae6
                                                                          • Instruction Fuzzy Hash: 72F10130158AC88FF765EB58C458FDEB7E0FBD9700F508D99E08AC71A6DA749A44C782
                                                                          APIs
                                                                          • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000002C33AD2E0A3
                                                                          • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000002C33AD2E0B7
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD2E0D0
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD2E132
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD2E300
                                                                            • Part of subcall function 000002C33ACD6020: Concurrency::details::_ReaderWriterLock::_ReaderWriterLock.LIBCMTD ref: 000002C33ACD602E
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD2E1B7
                                                                            • Part of subcall function 000002C33ACD8FE0: std::error_condition::error_condition.LIBCPMTD ref: 000002C33ACD8FFE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupReaderScheduleSegmentUnrealizedWriter$Concurrency::details::_LockLock::_std::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 3233732842-0
                                                                          • Opcode ID: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                                          • Instruction ID: 1533fc2b49286b86821c12b77678ebf3edb80f88bc5ddd0667d55f21683bc281
                                                                          • Opcode Fuzzy Hash: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                                          • Instruction Fuzzy Hash: 50F1ED301587C84EE6A5EB58C469FDEB7E1FBD9700F408D9DE089C3296DE349A41C782
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::$Base::ContextIdentityQueueWork$Affinity::operator!=HardwareList
                                                                          • String ID:
                                                                          • API String ID: 2242293343-0
                                                                          • Opcode ID: 88a63c18065b4d406e2cb50c44761dcb7cf26b639b903796a9ee2bdb5b598967
                                                                          • Instruction ID: 7072928fcb091ac0290a2ca1829647ce5106fb2f1249ef702a323e436a9f8a91
                                                                          • Opcode Fuzzy Hash: 88a63c18065b4d406e2cb50c44761dcb7cf26b639b903796a9ee2bdb5b598967
                                                                          • Instruction Fuzzy Hash: D4410D30158A884FEA94FB58D459BDEB7E0FBE4701F808E59E08AD3295DE74DA44C782
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                          • String ID:
                                                                          • API String ID: 1588182640-0
                                                                          • Opcode ID: aeb162027570cbcb45857eaeecfccc621a0a56d2e3941c5bc9fa514a50d9ad9c
                                                                          • Instruction ID: 9d71a3bfa1c9fb20b9f60679c976671256fce39ea57fdeaf5d8296875d921aff
                                                                          • Opcode Fuzzy Hash: aeb162027570cbcb45857eaeecfccc621a0a56d2e3941c5bc9fa514a50d9ad9c
                                                                          • Instruction Fuzzy Hash: 77319B34658B888FE695EF68C059B5EF7E1FBD9340F504D5DE08DC3262DA309981CB82
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$D91310F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$p < end()$p >= begin() && p < end()
                                                                          • API String ID: 3519738495-1901453082
                                                                          • Opcode ID: cf2c493598631b777911c369357c2c8d88ea23896cc8ed727317d93ff17d9880
                                                                          • Instruction ID: 403cfa85028894e0728a05bd20963793bd99b790f440b93368ef826c25d64658
                                                                          • Opcode Fuzzy Hash: cf2c493598631b777911c369357c2c8d88ea23896cc8ed727317d93ff17d9880
                                                                          • Instruction Fuzzy Hash: 2A81A172706A5296EB188F14ED582ACB3A1FB44B8DF488135DA4D97290EF7CE5A9C300
                                                                          APIs
                                                                          Strings
                                                                          • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF6520113D3
                                                                          • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF6520113DA
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                                          • API String ID: 2739980228-3599239301
                                                                          • Opcode ID: a27dbbe3b8e8369e739a25ded0ea2982dee22f6b7ac45c46d309ae0859b59bb8
                                                                          • Instruction ID: 51ad0258a5c696b11cfd96280392be85e425db63d6fa666232a528b481f9cc41
                                                                          • Opcode Fuzzy Hash: a27dbbe3b8e8369e739a25ded0ea2982dee22f6b7ac45c46d309ae0859b59bb8
                                                                          • Instruction Fuzzy Hash: 6E61C372A0AA45C7DB49DF14D9552BCB3B1FB14B88F588226C70E93354DF78D5AAC340
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$E8950$F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$filename && mode
                                                                          • API String ID: 3346678122-1878659873
                                                                          • Opcode ID: 4098060a98a758b466de7112bd39a24fe73d93be71fe8198c069658b61a7736b
                                                                          • Instruction ID: e544caa34f9476dfbc3a17b26cc97854e830d05cbeaa85b27d874d481d5d0b00
                                                                          • Opcode Fuzzy Hash: 4098060a98a758b466de7112bd39a24fe73d93be71fe8198c069658b61a7736b
                                                                          • Instruction Fuzzy Hash: 8941B421B0AA5382EB98DF19A85417D63A0FF54B98F5C0231D94EA37D8EF3CE55B8300
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Capture$ExtraInfoMessage
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                          • API String ID: 2172523684-3890275027
                                                                          • Opcode ID: 923c053ce066281c7ac671ef25c172f5d6b9f676048f14a3257d116d11b5ca04
                                                                          • Instruction ID: 3cb07f79f11125dac84249ee9d4a2df9ac21fd07ffed7624081accb20d1ffa05
                                                                          • Opcode Fuzzy Hash: 923c053ce066281c7ac671ef25c172f5d6b9f676048f14a3257d116d11b5ca04
                                                                          • Instruction Fuzzy Hash: 29210776606B4283E711CB25E800AAD73A0FB58BBCF880132DE1ED7394DF78E54A8740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: printf
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$[%05d] $[%s] [%05d]
                                                                          • API String ID: 3524737521-3476604433
                                                                          • Opcode ID: d970e6bb0d4a413c039538619d901c7932e0038d053f9d91cdc7bebea93272d9
                                                                          • Instruction ID: 05c189562f980020251b20e90f3f7492fdadcd1eb5b36ec6ce6e7119f3e38a62
                                                                          • Opcode Fuzzy Hash: d970e6bb0d4a413c039538619d901c7932e0038d053f9d91cdc7bebea93272d9
                                                                          • Instruction Fuzzy Hash: 4C21C272709A4295EB219F11FC449A9B7A0FF44788F884131EE4DA7259CF7CE589C740
                                                                          APIs
                                                                          Strings
                                                                          • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF65202FAAA
                                                                          • C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp, xrefs: 00007FF65202FA84
                                                                          • GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?", xrefs: 00007FF65202FAB1
                                                                          • bd != nullptr && "No platform backend to shutdown, or already shutdown?", xrefs: 00007FF65202FA8B
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "No platform backend to shutdown, or already shutdown?"
                                                                          • API String ID: 3664257935-1332676508
                                                                          • Opcode ID: a88f10e153ff5662c3eda2797c9295a1957fe6c79fdca9ae89574122b0fd71b3
                                                                          • Instruction ID: 12d3d23b6a4289ebb535110d2bbf703a38cf439cbf2361d413f6d6d0ff7b2f14
                                                                          • Opcode Fuzzy Hash: a88f10e153ff5662c3eda2797c9295a1957fe6c79fdca9ae89574122b0fd71b3
                                                                          • Instruction Fuzzy Hash: 3A316EB2B0AA4282EB048F14ED946787370FB54B88F4C8136DA4D93760DF7CE46AC740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: Capture$ExtraInfoMessageRelease
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                          • API String ID: 1767768705-3890275027
                                                                          • Opcode ID: cb19a9e6c1605ae45a3bbd78077dd2cfbef91a2a50fb1b9c956a217acb42d625
                                                                          • Instruction ID: 2179b5d64441030a451be826d20e90fa7cb32aede36c3f87177acd6f880c9688
                                                                          • Opcode Fuzzy Hash: cb19a9e6c1605ae45a3bbd78077dd2cfbef91a2a50fb1b9c956a217acb42d625
                                                                          • Instruction Fuzzy Hash: 4C210462A1664282E7518F65DC00AB962A1FB68BDCF881031DD0FA7794CFBDE58A8740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$Base::ChoresConcurrency::details::Func_classGroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 831135708-0
                                                                          • Opcode ID: 63f4ccc0c719f990fd2cecc369a8989cbc0d16d11778b62a075870b531d386af
                                                                          • Instruction ID: c7fc12a2f8a1fc30b5f2e35395e601b1afd4928df46c2648d9036cea6090e111
                                                                          • Opcode Fuzzy Hash: 63f4ccc0c719f990fd2cecc369a8989cbc0d16d11778b62a075870b531d386af
                                                                          • Instruction Fuzzy Hash: CEF1EF30158B884FF7A5FB68C459FDEB2E1FBD4700F908DA9E049C3296DE789A458781
                                                                          APIs
                                                                          • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000002C33AD127C5
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD12810
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD12904
                                                                          • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000002C33AD12BB3
                                                                            • Part of subcall function 000002C33AD1F6A0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000002C33AD1F6CB
                                                                          • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000002C33AD12C8E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::$Scheduler$ProcessorProxyRoot::Virtual$Base::ChoresConcurrency::details::_EmptyGroupQueue::ScheduleScheduler::_SegmentStructuredUnrealizedWorkstd::make_error_code
                                                                          • String ID:
                                                                          • API String ID: 1866601945-0
                                                                          • Opcode ID: 1c48c8f7abf4ee09f37d3fb5ff55bc5fc80e92da85bd99eabbe83459b1591442
                                                                          • Instruction ID: fbfd91ebc8f01e0f6b3a5a9245900595f9c8e16b04b6d32d8aa8428259010ad7
                                                                          • Opcode Fuzzy Hash: 1c48c8f7abf4ee09f37d3fb5ff55bc5fc80e92da85bd99eabbe83459b1591442
                                                                          • Instruction Fuzzy Hash: 1FF1BD31658B888FE7A5FB68C459FDEB3E1FBD8700F404D6AA08DC3291DE7496458B42
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 28bcf8cbf4f9d8ee0fb80cf63995194d2d98c00cad99854f8db27e055435d40e
                                                                          • Instruction ID: 0d3f67f96c05ed9ee20ab34c15a64785a9061a3a6c38f3dfac9592a5dcd4b307
                                                                          • Opcode Fuzzy Hash: 28bcf8cbf4f9d8ee0fb80cf63995194d2d98c00cad99854f8db27e055435d40e
                                                                          • Instruction Fuzzy Hash: 6AB1CE3015CA888FDBA4EB58C095F9AB7E1FBA8344F508D5DE08EC7261DB74D981CB42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: fpos
                                                                          • String ID:
                                                                          • API String ID: 1083263101-0
                                                                          • Opcode ID: 3f23ec98ed8d0db8145a29062c11fbcc78a6c96a5bf2dc5e6165215fd931549f
                                                                          • Instruction ID: 32cf1a91c989b8ea13eb80e6a655cc8bebc84245519ed50bd85cec7a0b0f9cc4
                                                                          • Opcode Fuzzy Hash: 3f23ec98ed8d0db8145a29062c11fbcc78a6c96a5bf2dc5e6165215fd931549f
                                                                          • Instruction Fuzzy Hash: 51B12B30258B888FE7A4EB58C458B6EB7E0FBD8701F544E5DE48AC32A5C774D980CB42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 1851498522-0
                                                                          • Opcode ID: 216af3604e034a8d617a86ff12bb7c94723bc8f844cd3d72ff026fb2d344c1b4
                                                                          • Instruction ID: 2ee03e50778e3fdfbfb3e0892eb8dda2a023349bb33f327068ff62f8e9c4ecd6
                                                                          • Opcode Fuzzy Hash: 216af3604e034a8d617a86ff12bb7c94723bc8f844cd3d72ff026fb2d344c1b4
                                                                          • Instruction Fuzzy Hash: 67A12031198A884BF762EB54C469FEEB3D1FB94740F448E99E08AC31E1DE74DA4587C1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$std::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 2527301759-0
                                                                          • Opcode ID: 52cd85fabb40296642562d013464caab3b67d2761199756b925dca6721a50769
                                                                          • Instruction ID: 38e292aa7d9103fab8b2bbab1089e1456580a86d05913d49dd0ce5ac42b4569f
                                                                          • Opcode Fuzzy Hash: 52cd85fabb40296642562d013464caab3b67d2761199756b925dca6721a50769
                                                                          • Instruction Fuzzy Hash: 6F91CD311586C88AE365FB64C459FDEB7E1FBD4740F408D59E08AC71A2DE349A45CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Mailbox
                                                                          • String ID:
                                                                          • API String ID: 1763892119-0
                                                                          • Opcode ID: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                                          • Instruction ID: 7ae59cdc84099ace41114cbc95256d0be25131f34b81bd558e42953540592190
                                                                          • Opcode Fuzzy Hash: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                                          • Instruction Fuzzy Hash: 8361133110CB888FE755EA58C458BEFB7E1FBA8301F444E5EE48AD31A1DA74DA45C742
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::_SchedulerScheduler::_$std::error_condition::error_condition$std::bad_exception::bad_exception
                                                                          • String ID:
                                                                          • API String ID: 3801495819-0
                                                                          • Opcode ID: 855e9fad3cf8b62679a3ed4dce5103e3daddbb4618be66b587f956b2a1f93412
                                                                          • Instruction ID: ceb5bb512b75eb6b37ff1a5194c53acc6f0151d0a6f0beeef539a1a520048f1b
                                                                          • Opcode Fuzzy Hash: 855e9fad3cf8b62679a3ed4dce5103e3daddbb4618be66b587f956b2a1f93412
                                                                          • Instruction Fuzzy Hash: A1610F34658B888FE7A4EB68C448F9EB7E1FBD8301F50895DE089C32A1DB74D945CB42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork__crt_scoped_stack_ptr$Decorator::getTableTypeshared_ptr
                                                                          • String ID:
                                                                          • API String ID: 2480882750-0
                                                                          • Opcode ID: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                                          • Instruction ID: 20d16d5134295e6ad09cb50f4dae38f6ae3e5d46b7b66f76a7844f18e212f63f
                                                                          • Opcode Fuzzy Hash: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                                          • Instruction Fuzzy Hash: 5361B870558B888FE7A0EB68C459F9EB7E0FBA8341F50495EE48DC3261DB34D985CB42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork__crt_scoped_stack_ptr$Decorator::getTableTypeshared_ptr
                                                                          • String ID:
                                                                          • API String ID: 2480882750-0
                                                                          • Opcode ID: 91d403a99b0aa0b9c84ca8b623b580e6659b45cf93c11dcecb02eb8a3e2d9174
                                                                          • Instruction ID: e9dda87a13f1275f199e34cbbf5a1fbef13587f467e938add687903ec74397a3
                                                                          • Opcode Fuzzy Hash: 91d403a99b0aa0b9c84ca8b623b580e6659b45cf93c11dcecb02eb8a3e2d9174
                                                                          • Instruction Fuzzy Hash: 5861D930558B888FE7A0EB68C459F9EB7E0FBA8341F50495EE48DC3261DB34D985CB42
                                                                          APIs
                                                                          • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000002C33AD2FF83
                                                                          • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000002C33AD2FF97
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD2FFB0
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD30003
                                                                            • Part of subcall function 000002C33ACD6020: Concurrency::details::_ReaderWriterLock::_ReaderWriterLock.LIBCMTD ref: 000002C33ACD602E
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD30067
                                                                            • Part of subcall function 000002C33ACD8FE0: std::error_condition::error_condition.LIBCPMTD ref: 000002C33ACD8FFE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupReaderScheduleSegmentUnrealizedWriter$Concurrency::details::_LockLock::_std::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 3233732842-0
                                                                          • Opcode ID: 8fc910353a04408718612e5cf30e4eda843c1b23e99fc2a10d87dd0fa77c1dfc
                                                                          • Instruction ID: 36cd62219ed3be75010375e70bf9a4e8369e34d9fce749d85b6ea0514190fb4b
                                                                          • Opcode Fuzzy Hash: 8fc910353a04408718612e5cf30e4eda843c1b23e99fc2a10d87dd0fa77c1dfc
                                                                          • Instruction Fuzzy Hash: 2751BF301586884FF2A4FB58C859F9EB7E2FBD4700F508D99E08DC32A6DE749945CB46
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_conditiontype_info::_name_internal_method
                                                                          • String ID:
                                                                          • API String ID: 2306575402-0
                                                                          • Opcode ID: 4b51986160a4cd423a99c67445d446e796d3c0d4e65a0d82bc8bd3ca371d903f
                                                                          • Instruction ID: 5e2fe686c158c4a649c4873bfe899a8d637f275984cdc6a4f8376c6b488f4bc1
                                                                          • Opcode Fuzzy Hash: 4b51986160a4cd423a99c67445d446e796d3c0d4e65a0d82bc8bd3ca371d903f
                                                                          • Instruction Fuzzy Hash: 63512F302587C48BF755EBA4D469BAF77E1FBD4704F408E99E0C9D71D2DA24DA048782
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$00007F020
                                                                          • String ID:
                                                                          • API String ID: 2477082939-0
                                                                          • Opcode ID: 6f38d78b5a1f04dc295c27fbc0c8007995e79b69b265c0d250188913823da770
                                                                          • Instruction ID: e4c385f6f34b98d6bdac69f202e0f5ff7725c28461994122d353b559ff8b8322
                                                                          • Opcode Fuzzy Hash: 6f38d78b5a1f04dc295c27fbc0c8007995e79b69b265c0d250188913823da770
                                                                          • Instruction Fuzzy Hash: A341C172609A4186D324EF16B8545A977A2FB48BE8F088236DE5D93BA4DF3CC55A8700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                          • String ID:
                                                                          • API String ID: 1588182640-0
                                                                          • Opcode ID: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                                          • Instruction ID: 5355ab1c9d80800737b0c6840cad22e8f302cb752e3dba214985f7c7801c1d2a
                                                                          • Opcode Fuzzy Hash: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                                          • Instruction Fuzzy Hash: 8621B134658B844FD6D5FB68C459B5EB7E1FBD9340F808D5DE08DC3262DA309945CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_conditiontype_info::_name_internal_method
                                                                          • String ID:
                                                                          • API String ID: 2306575402-0
                                                                          • Opcode ID: 18c570fd0deab407a0f837e49046f6b791d582b1a6d6ce112fe98874db57e66e
                                                                          • Instruction ID: fdc462c29f8602d961f4e8dd4cd78a4c6f4f89a8db9c96e5891c30aa34c840da
                                                                          • Opcode Fuzzy Hash: 18c570fd0deab407a0f837e49046f6b791d582b1a6d6ce112fe98874db57e66e
                                                                          • Instruction Fuzzy Hash: E6210330198B884BF645FBA4C469FAE77E2FBD4740F408D99E085C72A2DA24DA41DBD1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                          • String ID:
                                                                          • API String ID: 1588182640-0
                                                                          • Opcode ID: 815c5ab9791d234820be11a13cdb67723ff592c1cb60b69b78e51ea6d37036d7
                                                                          • Instruction ID: b05a1ee379dd97b3a16c26a6945236b260560ef957c6110762abdeec1d1839ec
                                                                          • Opcode Fuzzy Hash: 815c5ab9791d234820be11a13cdb67723ff592c1cb60b69b78e51ea6d37036d7
                                                                          • Instruction Fuzzy Hash: 6221A034658B844FD6D5FB68C459B5EB7E1FBD9340F808D5DE08DC3262DA309941CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: shared_ptr$allocator$Affinity::operator!=Concurrency::details::Hardware
                                                                          • String ID:
                                                                          • API String ID: 1053258265-0
                                                                          • Opcode ID: 731d90d100de80035144f11b9cbff0f6121979b4b1cf63ee1738207ad95db791
                                                                          • Instruction ID: 05f48975f2624538e8f7f99bd2b0440debb68de8cd2397381d2adc8d057c262d
                                                                          • Opcode Fuzzy Hash: 731d90d100de80035144f11b9cbff0f6121979b4b1cf63ee1738207ad95db791
                                                                          • Instruction Fuzzy Hash: 8E11FE3055CB884FE6A1EB28C459BAEB7E1FBD8350F408D5DE48DD3291DB349A458782
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$char_traits
                                                                          • String ID:
                                                                          • API String ID: 2432257368-3916222277
                                                                          • Opcode ID: fc3064d62a3cd5194dff096c9fc33b5f2c68b979ee5dc823d586b5ed394c8f21
                                                                          • Instruction ID: cc2b1aca96664f9f4050bf0b717f3c12ddf9b7970d4c127e1ebec754525106c1
                                                                          • Opcode Fuzzy Hash: fc3064d62a3cd5194dff096c9fc33b5f2c68b979ee5dc823d586b5ed394c8f21
                                                                          • Instruction Fuzzy Hash: 38C1DD31558B888FE765EB64C459BDFB7E1FBD8B00F404E69E08AC3191DE34DA458782
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: #MOVE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                                          • API String ID: 1541411109-319756798
                                                                          • Opcode ID: a9447c703a5c6f419a763ba9b790bfdbb90cf70eb01f7ac6463506faf4b27953
                                                                          • Instruction ID: 7f95f17a0313eca6ec411dd1dacdfec29aaaadadef80ddfe4184da3cb4c77d18
                                                                          • Opcode Fuzzy Hash: a9447c703a5c6f419a763ba9b790bfdbb90cf70eb01f7ac6463506faf4b27953
                                                                          • Instruction Fuzzy Hash: E6D12632606BC19AD354CF29A98879977A9F745B14FAD8339C7A8473A0DF35E0A2C704
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD1374F
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD137BB
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD13815
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                          • String ID: e
                                                                          • API String ID: 1865873047-4024072794
                                                                          • Opcode ID: a5aedeaa2a5e8da9842271219853bb447ad559dd74de6758b306763cffed3ded
                                                                          • Instruction ID: b52aa36f866afebb960b3fa84146a22cf0d55dfefa7e1cdc6c781f850f1267e9
                                                                          • Opcode Fuzzy Hash: a5aedeaa2a5e8da9842271219853bb447ad559dd74de6758b306763cffed3ded
                                                                          • Instruction Fuzzy Hash: 23612A3465CA848FE7D5EBA8C499B5EB7E0FB98301F50496DE04AC72A1D638D941CB82
                                                                          APIs
                                                                          • 00007FFBBBD91310.VCRUNTIME140(00000000,?,00000000,000002C3364C0960,00007FF652000EC1,?,?,00000000,00007FF651FE9F9A), ref: 00007FF65200114C
                                                                          • 00007FFBBBD91310.VCRUNTIME140 ref: 00007FF6520012A7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$g.Initialized
                                                                          • API String ID: 1541411109-1422301356
                                                                          • Opcode ID: 844d1a01e8b4b56630694eac2156529f4390ec6b52c24e8e2dcafa63ceb3fbf5
                                                                          • Instruction ID: 4f4b93421cd5c9c36c63438f9c24124b04f970c98cf819f9aa9b17355953c582
                                                                          • Opcode Fuzzy Hash: 844d1a01e8b4b56630694eac2156529f4390ec6b52c24e8e2dcafa63ceb3fbf5
                                                                          • Instruction Fuzzy Hash: BE61D412B0FA8685FE158E159C082BAA791BB49BD8FCC4531DE5DE7384EEBCE459C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Subatomic
                                                                          • String ID: d
                                                                          • API String ID: 3648745215-2564639436
                                                                          • Opcode ID: 54bdeb58da35ab94bcf85085278a1c4949db9dfd6b8a7e539e187413d69c00dd
                                                                          • Instruction ID: 1c6ea2fa3e201b60cd99258fccc90bc12e0c1d8385ea382d06c82ecdab52135e
                                                                          • Opcode Fuzzy Hash: 54bdeb58da35ab94bcf85085278a1c4949db9dfd6b8a7e539e187413d69c00dd
                                                                          • Instruction Fuzzy Hash: 1941CE7025DB888FD794FF68C44DBAAB7E2FBD9341F40595EA08AD3260DA74D9408B42
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiUnicodeWideWindow
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                                          • API String ID: 3417139564-3890275027
                                                                          • Opcode ID: d9a610a5f53e9fa10297ec8690aded1cef327910e5f6d708596898dc3a383a64
                                                                          • Instruction ID: e0496aa95d4abc91bbb4321f24af2078908aee1de44a8a9b956698673c44e53e
                                                                          • Opcode Fuzzy Hash: d9a610a5f53e9fa10297ec8690aded1cef327910e5f6d708596898dc3a383a64
                                                                          • Instruction Fuzzy Hash: 7051E522B0964286E765CF24C8407BDB3A1FB58B4CF4C4136DA4DA7A98DFBCD84A8310
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                                          • API String ID: 2739980228-3599239301
                                                                          • Opcode ID: 39a94ab1953bdc714ba20a451d15697837532ad35433a4dd319d13373b39f134
                                                                          • Instruction ID: cbf8b273bf1964fd0c723c3c4130999ef645b1ed506f0faa6c39fcf7bd16b182
                                                                          • Opcode Fuzzy Hash: 39a94ab1953bdc714ba20a451d15697837532ad35433a4dd319d13373b39f134
                                                                          • Instruction Fuzzy Hash: 1E51F37270AA9282EB54EF14E8945BC73B4FB58B48F884232CA4D97654DF7CD59AC340
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC4AD0
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33ACC4B2F
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC4B41
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_
                                                                          • String ID:
                                                                          • API String ID: 991905282-3916222277
                                                                          • Opcode ID: 36a22229416e564e8440cefac388c07ecd404f3bbc27db4e377a02a1a41e44dc
                                                                          • Instruction ID: beed62e2101919046df01cfe605f5dcdb3eb53aba529f9b64d24479c675e29f9
                                                                          • Opcode Fuzzy Hash: 36a22229416e564e8440cefac388c07ecd404f3bbc27db4e377a02a1a41e44dc
                                                                          • Instruction Fuzzy Hash: F3411D70158B888FE394EF28C459B5EB7E0FBD4B01F90995DF49AC32A1CB709941CB42
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$i >= 0 && i < Size
                                                                          • API String ID: 1541411109-3833649686
                                                                          • Opcode ID: 9795f39f3915703e5182b8305a070d8cc95cb5839a0246a7f8836c85aa4fbd7e
                                                                          • Instruction ID: df3d6223b5de88a95a2f3fbc9e143d56e1d343765be3a5f0afa7b10fafc85383
                                                                          • Opcode Fuzzy Hash: 9795f39f3915703e5182b8305a070d8cc95cb5839a0246a7f8836c85aa4fbd7e
                                                                          • Instruction Fuzzy Hash: 8A418735B09B8696EB148F15E8805E973B0FB54B88F484131DAAED3664CFBCF259C340
                                                                          APIs
                                                                          Strings
                                                                          • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF652011639
                                                                          • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF652011640
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                                          • API String ID: 2739980228-3599239301
                                                                          • Opcode ID: 8193d48d8a4ab965047eb9cd85be8e2c2768a0254f95d21a873dfeaeee22ed6b
                                                                          • Instruction ID: 40c3d863864182831267738a69a8d3f7a9df9ff9e0dc8319aeb3a2f031b05ad8
                                                                          • Opcode Fuzzy Hash: 8193d48d8a4ab965047eb9cd85be8e2c2768a0254f95d21a873dfeaeee22ed6b
                                                                          • Instruction Fuzzy Hash: 8631F67360AA5286C749DF14D8955BC73B5FB14B88B588233CA0E83354DF79D5AEC340
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$std::error_condition::error_condition
                                                                          • String ID: }
                                                                          • API String ID: 2527301759-4239843852
                                                                          • Opcode ID: be98c45c2635ea1b7c099d9ee1afc8aab728c4e80a3655f5ac3be0dc2360b2bb
                                                                          • Instruction ID: 45dac6c273adad013cdea37e5f6b8304de28fc16562270116a99aec8d31e22a0
                                                                          • Opcode Fuzzy Hash: be98c45c2635ea1b7c099d9ee1afc8aab728c4e80a3655f5ac3be0dc2360b2bb
                                                                          • Instruction Fuzzy Hash: D0211A305986C58BE359EB98C454A2EBBF1FBD9780F508DA9E189C31E1C674CA808782
                                                                          APIs
                                                                            • Part of subcall function 000002C33ACCA170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACCA18D
                                                                            • Part of subcall function 000002C33ACCA110: char_traits.LIBCPMTD ref: 000002C33ACCA13D
                                                                          • type_info::_name_internal_method.LIBCMTD ref: 000002C33AD87A14
                                                                            • Part of subcall function 000002C33ADA9E50: type_info::_name_internal_method.LIBCMTD ref: 000002C33ADA9EF0
                                                                            • Part of subcall function 000002C33ADA9E50: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ADA9F56
                                                                            • Part of subcall function 000002C33ADA9E50: CreateFileA.KERNEL32 ref: 000002C33ADA9F82
                                                                          • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000002C33AD87AE4
                                                                            • Part of subcall function 000002C33ACC5180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC5217
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::$EmptyQueue::StructuredWork$type_info::_name_internal_method$Affinity::operator!=CreateFileHardwarechar_traits
                                                                          • String ID:
                                                                          • API String ID: 2370075206-0
                                                                          • Opcode ID: 1ca1f53479ce3256fdcfa652a2f8c0640dff5af6cc40af6253aed29f3ac4abb4
                                                                          • Instruction ID: 7f1f7926b818fc4b25f9b5766c44dbfb002a8385a392a7ddb27c9969b329fca8
                                                                          • Opcode Fuzzy Hash: 1ca1f53479ce3256fdcfa652a2f8c0640dff5af6cc40af6253aed29f3ac4abb4
                                                                          • Instruction Fuzzy Hash: B702AF31159A888AF365FB64C459BEFB3E1FBD4741F508DAEE04AC31A2DE309A45C781
                                                                          APIs
                                                                          • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000002C33AD23951
                                                                            • Part of subcall function 000002C33ACF2880: _Ptr_base.LIBCMTD ref: 000002C33ACF2893
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Base::ChoresConcurrency::details::GroupPtr_baseScheduleSegmentUnrealized
                                                                          • String ID:
                                                                          • API String ID: 3333744592-0
                                                                          • Opcode ID: 570f11bbdc05f9da95d07b3fdbdb974941727138929f366d8f2bea2d8099bd35
                                                                          • Instruction ID: 4ba4cb2684aed0da505949c67f68d8da0e0f3023369adcda6b8c71847230283f
                                                                          • Opcode Fuzzy Hash: 570f11bbdc05f9da95d07b3fdbdb974941727138929f366d8f2bea2d8099bd35
                                                                          • Instruction Fuzzy Hash: 68F12031158A888FE7A5FB58C459BDEB3E1FBD8300F404D69E48EC3295DE749A45CB82
                                                                          APIs
                                                                          • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000002C33AD15917
                                                                          • std::make_error_code.LIBCPMTD ref: 000002C33AD15992
                                                                          • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000002C33AD15B1C
                                                                            • Part of subcall function 000002C33AD1F870: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000002C33AD1F8CD
                                                                            • Part of subcall function 000002C33AD1F870: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000002C33AD1F8E4
                                                                          • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000002C33AD15CAB
                                                                            • Part of subcall function 000002C33ACF6BC0: char_traits.LIBCPMTD ref: 000002C33ACF6BE0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Scheduler$Concurrency::details::$Concurrency::details::_ProcessorProxyRoot::Scheduler::_Virtual$Base::ChoresGroupScheduleSegmentUnrealizedchar_traitsstd::make_error_code
                                                                          • String ID:
                                                                          • API String ID: 3113402709-0
                                                                          • Opcode ID: 8315beeaeb721658927f8f770d131a9c147b9258a1641d469c0d50eda48e832c
                                                                          • Instruction ID: 62505ce78ba309edbbc239b2388a34c0b5c0234b4ce2a2b9c8bbfbd5ed096877
                                                                          • Opcode Fuzzy Hash: 8315beeaeb721658927f8f770d131a9c147b9258a1641d469c0d50eda48e832c
                                                                          • Instruction Fuzzy Hash: ACC1FE31158B8C8FE7A5FB68C459BDEB7E1FBD8300F40496E948DC3291DE749A458B82
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACD2CA2
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACD2E63
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACD2E78
                                                                            • Part of subcall function 000002C33ACCB170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACCB17E
                                                                            • Part of subcall function 000002C33ACCB170: _Max_value.LIBCPMTD ref: 000002C33ACCB1A3
                                                                            • Part of subcall function 000002C33ACCB170: _Min_value.LIBCPMTD ref: 000002C33ACCB1D1
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACD2FB7
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                                                                          • String ID:
                                                                          • API String ID: 348937374-0
                                                                          • Opcode ID: 9076abe83797b2f5b95f51d9a62a17b5c4646a91e0ea6bac038e2092eb8d8266
                                                                          • Instruction ID: e9a862df47fb353c1b700b0af8a5ce8603312fd20ddc071b56216322d75ec312
                                                                          • Opcode Fuzzy Hash: 9076abe83797b2f5b95f51d9a62a17b5c4646a91e0ea6bac038e2092eb8d8266
                                                                          • Instruction Fuzzy Hash: 52D1773065CB888FE7A4FB68C459F6EB7E1FBE8741F40495DA08DC3261DA70D9818B42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 246976077-0
                                                                          • Opcode ID: 5f3126eda9a4eb9af231d5239096d653e2129c4e3c35e502a72c1b9b8bd3846d
                                                                          • Instruction ID: 1522b4f28e32312c8a01d991810b98adba128a8b68f6e815242a74efd6c47239
                                                                          • Opcode Fuzzy Hash: 5f3126eda9a4eb9af231d5239096d653e2129c4e3c35e502a72c1b9b8bd3846d
                                                                          • Instruction Fuzzy Hash: 29C12130158A888FE7A5EB68C455FDEB7E1FBD8741F504D6DE049C32A1DA70E941CB82
                                                                          APIs
                                                                          • UnDecorator::getVbTableType.LIBCMTD ref: 000002C33AD31564
                                                                            • Part of subcall function 000002C33AD050A0: char_traits.LIBCPMTD ref: 000002C33AD050C1
                                                                          • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000002C33AD315C1
                                                                            • Part of subcall function 000002C33AD3A0F0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000002C33AD3A112
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Scheduler$Concurrency::details::Concurrency::details::_Decorator::getProcessorProxyRoot::Scheduler::_TableTypeVirtualchar_traits
                                                                          • String ID:
                                                                          • API String ID: 1673230147-0
                                                                          • Opcode ID: 54f13db51325af36e86bb9f0e7cfac0249b4394f15ed719d382bbe191eb23ca8
                                                                          • Instruction ID: 9f097c0345d601a9a57c9a04253d2b3bd1d6c54aed8bcbbc0f3ce3bbba8775d4
                                                                          • Opcode Fuzzy Hash: 54f13db51325af36e86bb9f0e7cfac0249b4394f15ed719d382bbe191eb23ca8
                                                                          • Instruction Fuzzy Hash: 18C1CA70558B888FE7A5EB58C499FDEB7E1FB98301F40496ED18DC3261DB349544CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 1046759889-0
                                                                          • Opcode ID: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                                          • Instruction ID: 991e294507e02b3b410bd5c2a74d818f5ef7beef42125767971d6190fe1a9e20
                                                                          • Opcode Fuzzy Hash: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                                          • Instruction Fuzzy Hash: 28B19A30158B888EE6A5FB68C459BDEB7E1FBD8700F40895DE08DC3296DA749945CB82
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 34be266543894efc96d51f676f5f1ca7cc37a58dd76303ca975cdefcda27a6da
                                                                          • Instruction ID: 9a864c107c69ba0073a7f6d81fb360cf83903e8c475d1f8342ccd625ccc130ea
                                                                          • Opcode Fuzzy Hash: 34be266543894efc96d51f676f5f1ca7cc37a58dd76303ca975cdefcda27a6da
                                                                          • Instruction Fuzzy Hash: 5691A03015CA888FDB94EB18C095F9AB7E1FBE9344F50495DE08EC7262DB71E945CB42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: std::make_error_code$std::error_condition::error_condition
                                                                          • String ID:
                                                                          • API String ID: 2527301759-0
                                                                          • Opcode ID: 58c7311be2cb89b8753877e7c75642fcbb82317ee9f238dba1156d6b4c2a68d4
                                                                          • Instruction ID: 612e915e5ddc0547cc4e5ce6a1637a8470c26458c97bec4137703d25f77d9db2
                                                                          • Opcode Fuzzy Hash: 58c7311be2cb89b8753877e7c75642fcbb82317ee9f238dba1156d6b4c2a68d4
                                                                          • Instruction Fuzzy Hash: AC810130158AC88FE3A5EB58C455FAEB7E1FBD4700F408D6DE08AC31A6DA749945CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: fpos
                                                                          • String ID:
                                                                          • API String ID: 1083263101-0
                                                                          • Opcode ID: a06c74410f647526738439c1d7a2df2a66b16ccba1c99b2313f6c08277eab004
                                                                          • Instruction ID: 1122041a797fbb240b033a95c97b2034ee0d151064b27524081cf51eac26ef6b
                                                                          • Opcode Fuzzy Hash: a06c74410f647526738439c1d7a2df2a66b16ccba1c99b2313f6c08277eab004
                                                                          • Instruction Fuzzy Hash: F7810830658B888FE7A4EB68C449B1EBBE0FBD8700F544E59F599C32A5C774D981CB42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                                          • String ID:
                                                                          • API String ID: 1927102706-0
                                                                          • Opcode ID: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                                          • Instruction ID: 5b7946e90549291eefaa8559ebef2db9df05d7efc78d14f02f158c4f2c6e8674
                                                                          • Opcode Fuzzy Hash: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                                          • Instruction Fuzzy Hash: F571B330158AC89FE7A6EB58C459FEEB7E1FB98300F408D59E08DC7291DE74DA458782
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                                          • String ID:
                                                                          • API String ID: 1927102706-0
                                                                          • Opcode ID: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                                          • Instruction ID: 076952cd8a9c97fdc1be49fcb1658c9a7c8721957be8383a7679d167956c2948
                                                                          • Opcode Fuzzy Hash: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                                          • Instruction Fuzzy Hash: A771A23425CB888FF7A6EB68C459BEEB7E1FB98300F804D59E08DC7291DA74D9458742
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$Concurrency::details::EmptyQueue::StructuredWorkchar_traits
                                                                          • String ID:
                                                                          • API String ID: 1744367693-0
                                                                          • Opcode ID: 30ffffbc32562f55399461986d00f4272352037bfd5b746e90ae5d919702b9bf
                                                                          • Instruction ID: f8061b1fbfa649b0e0cbe660c258eaf39aa72e144b437b97b4e84a305f13c6e9
                                                                          • Opcode Fuzzy Hash: 30ffffbc32562f55399461986d00f4272352037bfd5b746e90ae5d919702b9bf
                                                                          • Instruction Fuzzy Hash: FC51FA301587848FE3A4EB58C449BAEB7E1FBD4744F404E5DE089C72A1DB74DA46CB82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID:
                                                                          • API String ID: 2739980228-0
                                                                          • Opcode ID: 40a382835e6706dba0aacc8cd3f1290a8d22f5a65d183d6c671a3e35b392f7c0
                                                                          • Instruction ID: 1052769e558a6f2fba5c45a1e55a723f4bb3767edfbb92182101a2696f0db3ae
                                                                          • Opcode Fuzzy Hash: 40a382835e6706dba0aacc8cd3f1290a8d22f5a65d183d6c671a3e35b392f7c0
                                                                          • Instruction Fuzzy Hash: AB51AEB361AA9686CB49DF18D8950BC73B2FB58B48B588223DA0EC3250DF79C55EC740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::$Affinity::operator!=Base::ContextHardwareIdentityQueueWorkshared_ptr
                                                                          • String ID:
                                                                          • API String ID: 714649587-0
                                                                          • Opcode ID: 56e7f5989e768847083db759d86a7ebfa7ab74bda9f1653fe54440c5e8e10927
                                                                          • Instruction ID: 26db1afefb4dd9abbedd8e18f09506200833ae29ea94e496c46685c6c923ee0f
                                                                          • Opcode Fuzzy Hash: 56e7f5989e768847083db759d86a7ebfa7ab74bda9f1653fe54440c5e8e10927
                                                                          • Instruction Fuzzy Hash: A241FF3015CE488FE794EB58C099BAAB7E0FBE8345F504A5DF089C3261DA34D945CB42
                                                                          APIs
                                                                            • Part of subcall function 000002C33AD9FE90: _Byte_length.LIBCPMTD ref: 000002C33AD9FEFE
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD9FD15
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD9FD3E
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD9FD75
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33AD9FD9E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Byte_length
                                                                          • String ID:
                                                                          • API String ID: 1141060839-0
                                                                          • Opcode ID: a094d049b7394f019bb74d8a9ce6fa8793c3500efc0350374be82258551a5043
                                                                          • Instruction ID: 054d4de47aff1a21b11a846df0fe9dd54b3560424f206f06c9dac9156bdf0072
                                                                          • Opcode Fuzzy Hash: a094d049b7394f019bb74d8a9ce6fa8793c3500efc0350374be82258551a5043
                                                                          • Instruction Fuzzy Hash: 4E410F30158B888FE754FB68C459FAEB7E1FBD8741F50495EE089C3261DE709985CB82
                                                                          APIs
                                                                          • type_info::_name_internal_method.LIBCMTD ref: 000002C33AD4D48B
                                                                            • Part of subcall function 000002C33AD176A0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 000002C33AD176B8
                                                                          • type_info::_name_internal_method.LIBCMTD ref: 000002C33AD4D4AA
                                                                            • Part of subcall function 000002C33AD40D30: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 000002C33AD40D48
                                                                          • type_info::_name_internal_method.LIBCMTD ref: 000002C33AD4D4C9
                                                                          • type_info::_name_internal_method.LIBCMTD ref: 000002C33AD4D4E8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                          • String ID:
                                                                          • API String ID: 1588182640-0
                                                                          • Opcode ID: 6ae970fd7b6ecd4af07a3924a38ebf6e4c6a300736612a1d38c72f7b099ca0b1
                                                                          • Instruction ID: 61e6605317d97be891c2ac5b24dc274fd2c3d18e67a2624297c59c1e9c0bea5f
                                                                          • Opcode Fuzzy Hash: 6ae970fd7b6ecd4af07a3924a38ebf6e4c6a300736612a1d38c72f7b099ca0b1
                                                                          • Instruction Fuzzy Hash: 87111A30658B888FE694FB68C059B5EBBE1FBD8340F904D5DE088C3262DA30D9408B82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                          • String ID:
                                                                          • API String ID: 1588182640-0
                                                                          • Opcode ID: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                                          • Instruction ID: bfbd5046d30174573752cd5a85aace3758c52725fa1c68b6e7ad52e0722db157
                                                                          • Opcode Fuzzy Hash: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                                          • Instruction Fuzzy Hash: F011EA30658B888FE6D5FB68C459B5EBBE1FBD9340F904D5DE089C3262DA30D9418B82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                                          • String ID:
                                                                          • API String ID: 1588182640-0
                                                                          • Opcode ID: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                                          • Instruction ID: c34bc353e92f7455fa3bd53ec993dd7f0471fe4543a6003299bb2dd55e63d0a6
                                                                          • Opcode Fuzzy Hash: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                                          • Instruction Fuzzy Hash: 0711FE30658B888FE6D5FB6CC459B5EB7E1FBD9340F904D5DE089C3262DA30D9418B82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Func_class
                                                                          • String ID:
                                                                          • API String ID: 1670654298-0
                                                                          • Opcode ID: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                                          • Instruction ID: 7e323f5ea7a4d71b137de029a883315bd1de198dde7a264c11c610d3c399bf70
                                                                          • Opcode Fuzzy Hash: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                                          • Instruction Fuzzy Hash: 91112E30658A484FE684FB5CC458B2EB7E1FBD9741F408D69E089C72B6DA25D941C781
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD1EFAA
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD1EFBE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                          • String ID:
                                                                          • API String ID: 1865873047-0
                                                                          • Opcode ID: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                                          • Instruction ID: 6ed8fd1dc137f316694aeb6eb9adcb2a1c34f6d0d070bd2f4f3c7b31ce302bf4
                                                                          • Opcode Fuzzy Hash: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                                          • Instruction Fuzzy Hash: FA012D301B4A994BE3D5DB69D468B6EB5E2FB84340FC44C5CF545C32A1CAB9C5449782
                                                                          APIs
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD1EF0A
                                                                          • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33AD1EF1E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                                          • String ID:
                                                                          • API String ID: 1865873047-0
                                                                          • Opcode ID: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                                          • Instruction ID: 4967c488a3800c482c28eb98e6c5af0b0e860250cb0efeba56120f2b98262c34
                                                                          • Opcode Fuzzy Hash: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                                          • Instruction Fuzzy Hash: 44011B70178B894BF3D6DB69C4A8B6D75E2FB84300F844D58E449C32D0CEB9DA448682
                                                                          APIs
                                                                            • Part of subcall function 000002C33ACC5360: _WChar_traits.LIBCPMTD ref: 000002C33ACC538D
                                                                            • Part of subcall function 000002C33ACC4740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC476C
                                                                            • Part of subcall function 000002C33ACC4740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC477E
                                                                            • Part of subcall function 000002C33ACC4740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000002C33ACC47BB
                                                                            • Part of subcall function 000002C33ACC4850: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33ACC48B8
                                                                          • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000002C33ACC412A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Concurrency::details::EmptyQueue::StructuredWork$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Char_traits
                                                                          • String ID: $X
                                                                          • API String ID: 1626164810-1398056850
                                                                          • Opcode ID: b7fe99cffcf7bd97a9e81d5aad9f532e1525070ba119c050f664d87821b138ec
                                                                          • Instruction ID: ea17dc7b846c262795d4a13c80e18bcaf7bff78f5e192b63a0f03bfc8282ad84
                                                                          • Opcode Fuzzy Hash: b7fe99cffcf7bd97a9e81d5aad9f532e1525070ba119c050f664d87821b138ec
                                                                          • Instruction Fuzzy Hash: A8D1CB70518B888FE7A4EF68C498BDEB7E1FBD8701F50496EA48DC3261DB709585CB42
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: "$"
                                                                          • API String ID: 0-3758156766
                                                                          • Opcode ID: d9ca275203620766a00d06b5d65ade6f880f8bd0154771a424bc1f8235aa31d6
                                                                          • Instruction ID: b749274049468a1ce67fe9221227f63039010f47906dc9bdedb4ec9ed5b55726
                                                                          • Opcode Fuzzy Hash: d9ca275203620766a00d06b5d65ade6f880f8bd0154771a424bc1f8235aa31d6
                                                                          • Instruction Fuzzy Hash: 44710C31158B888EE795EB54C495FDFB7E1FBA4340F408E99F08AC31A1DA34DA45CB82
                                                                          APIs
                                                                          • std::error_condition::error_condition.LIBCPMTD ref: 000002C33ACE4CEA
                                                                            • Part of subcall function 000002C33ACE01A0: Concurrency::details::VirtualProcessor::ClaimTicket::InitializeTicket.LIBCMTD ref: 000002C33ACE01BD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3887562318.000002C33ACC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C33ACC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2c33acc0000_WaveExecutor.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ClaimConcurrency::details::InitializeProcessor::TicketTicket::Virtualstd::error_condition::error_condition
                                                                          • String ID: @$@
                                                                          • API String ID: 2004282921-149943524
                                                                          • Opcode ID: 5d6c2f79357090950899d93de7d3641f261afb3f4bf2f8be1211dfb2002849bd
                                                                          • Instruction ID: c21fa7c0f88e5f864d1b9c18edc2a42e5b7f461097f0be270731fe42c60026f7
                                                                          • Opcode Fuzzy Hash: 5d6c2f79357090950899d93de7d3641f261afb3f4bf2f8be1211dfb2002849bd
                                                                          • Instruction Fuzzy Hash: D051D570548B848FE7A4EB58C588F9EB7E1FBE5706F108D6DE189C32A0D7319944CB86
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$max_error > 0.0f
                                                                          • API String ID: 3568877910-3636960062
                                                                          • Opcode ID: 2d8c68fd8c5bb8b87b140409164d2f812e6f1a4e4eb9dcfa91aef82d2f7fa76f
                                                                          • Instruction ID: 2206433e4cd274dd3cc8c4f3e9b0582d43baca4818082416551c555d971810a5
                                                                          • Opcode Fuzzy Hash: 2d8c68fd8c5bb8b87b140409164d2f812e6f1a4e4eb9dcfa91aef82d2f7fa76f
                                                                          • Instruction Fuzzy Hash: 9461E432D087CA86E7529B3684412B9B790FF69748F1CC732EA89771A8DF68F4D58610
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$g.SettingsWindows.empty()
                                                                          • API String ID: 2739980228-1747592857
                                                                          • Opcode ID: 007d639a8cd7b77cc5edf28a83578d95d254dd57ba70a5d0a04cb8c2922fc2c3
                                                                          • Instruction ID: f970a710469fd0e22b4ebc2fc31b3f3e812ff39703cc3d969ae9256859a18aee
                                                                          • Opcode Fuzzy Hash: 007d639a8cd7b77cc5edf28a83578d95d254dd57ba70a5d0a04cb8c2922fc2c3
                                                                          • Instruction Fuzzy Hash: CB41E932A1AA8686E740DF21E8545B97361FB54B8CF9C4136EE4DA7B45EF7CE04AC700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                          • API String ID: 2739980228-1817040388
                                                                          • Opcode ID: f6f134c6f70e70a5f67602879e6ff25eb996bc56e58a3c119fb5f52a3a42ffc6
                                                                          • Instruction ID: 1f55569ee544c77391bc8aa4399fded2d12c945302bb4faf3d3cb64e7eb4e04e
                                                                          • Opcode Fuzzy Hash: f6f134c6f70e70a5f67602879e6ff25eb996bc56e58a3c119fb5f52a3a42ffc6
                                                                          • Instruction Fuzzy Hash: 6C41C132609A8287EB14DF25E8805A87374FB54788F984232DB4DD77A0DF78E5AAC740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                          • API String ID: 2739980228-1817040388
                                                                          • Opcode ID: 096fc74e7037803a42b3bc3964d1e045c6bae19edca2c2f8db86bb480efd3f02
                                                                          • Instruction ID: fc85ec5acb1c3b00c92dc0005d7a799ecfb68bc1dc6701ac5025f61de3075301
                                                                          • Opcode Fuzzy Hash: 096fc74e7037803a42b3bc3964d1e045c6bae19edca2c2f8db86bb480efd3f02
                                                                          • Instruction Fuzzy Hash: 3341E332A0AA8686E704DF14EC945B87374FB54B8CB984132DE4D973A4DF7CE55AC740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                          • API String ID: 2739980228-1817040388
                                                                          • Opcode ID: 7d718059540f4397f11364e14e6c0172c7d24b79ff19bcccd19762cda495cffe
                                                                          • Instruction ID: 2a87ab31dfb0932c67e8ec4106a727f8d53d16e92d6b6db1d9c82d64b84e6bc9
                                                                          • Opcode Fuzzy Hash: 7d718059540f4397f11364e14e6c0172c7d24b79ff19bcccd19762cda495cffe
                                                                          • Instruction Fuzzy Hash: F131B172A0AA9687E704DF14E8801B873B0FB54B8CB984136DA4D977A4DF7CE59BC740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                                          • API String ID: 3568877910-1817040388
                                                                          • Opcode ID: 3a94cb1d79306fdc9a050dd449591057f5d3f3fa0e938ade244f3a3a1197444a
                                                                          • Instruction ID: 470830722237ff6a9722c650c688e3f475006e9a0ec9a26cbbed091150043368
                                                                          • Opcode Fuzzy Hash: 3a94cb1d79306fdc9a050dd449591057f5d3f3fa0e938ade244f3a3a1197444a
                                                                          • Instruction Fuzzy Hash: B421B131B1868786EBA58B15E8806AD67A0FF85B84F4C5235DA8E97758CE3CE546C700
                                                                          APIs
                                                                          • 00007FFBBBD91310.VCRUNTIME140 ref: 00007FF652026070
                                                                            • Part of subcall function 00007FF652003900: 00007FFBBBD91310.VCRUNTIME140 ref: 00007FF65200393C
                                                                            • Part of subcall function 00007FF652003900: 00007FFBC92DF020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6520039BA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007$D91310$F020
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$state->TextA.Data != 0
                                                                          • API String ID: 2829325567-1138122324
                                                                          • Opcode ID: 68e42b137ae8442a878239fc68f020be54ccb08d0e866b134796feb8c254f3d3
                                                                          • Instruction ID: 00aef0edf66ecea1da7a221fa90f503fe255957a32963f2855b0b079b46491f8
                                                                          • Opcode Fuzzy Hash: 68e42b137ae8442a878239fc68f020be54ccb08d0e866b134796feb8c254f3d3
                                                                          • Instruction Fuzzy Hash: 29219A72B0664286E719CF35DC952B923A1EB84B4DF4C5036EE4DDB248DFBCE5898710
                                                                          APIs
                                                                          • 00007FFBBBD91310.VCRUNTIME140(?,?,00000000,00007FF651FED62F), ref: 00007FF6520038C4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$it >= Data && it <= Data + Size
                                                                          • API String ID: 1541411109-3870282576
                                                                          • Opcode ID: 84a9b61979137050a1197245c5bdd7e55bba15df666dd3b8409ce5f9d3bc927c
                                                                          • Instruction ID: 60c6f15ccfe6a50ac1be08a13fdc3d90c7a8f8c25e1defce3eb7b87796c5764a
                                                                          • Opcode Fuzzy Hash: 84a9b61979137050a1197245c5bdd7e55bba15df666dd3b8409ce5f9d3bc927c
                                                                          • Instruction Fuzzy Hash: 9D219FB2B16A8182FF18CF1AEA411686321FB54B88B8CD035DB5DA7B45DF6CF5A5C340
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007
                                                                          • String ID: $@
                                                                          • API String ID: 3568877910-1077428164
                                                                          • Opcode ID: 4be356fa8e074784c90dbf701479d069685c3cbf6e883b402ec0f34ae6b6c832
                                                                          • Instruction ID: 3b523c627d122bb570ef220e9ed82371037e3861a107aa4c4a02a633b3283f85
                                                                          • Opcode Fuzzy Hash: 4be356fa8e074784c90dbf701479d069685c3cbf6e883b402ec0f34ae6b6c832
                                                                          • Instruction Fuzzy Hash: 31115BB290978187D725CF21F54462AB3A1FB99B88F184225EBC957B18DF7CE895CF00
                                                                          APIs
                                                                          • 00007FFBBBD91310.VCRUNTIME140(?,?,00000000,00007FF652017563,?,?,00000000,00007FF652011FCF), ref: 00007FF6520173A6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.3892755396.00007FF651FE1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF651FE0000, based on PE: true
                                                                          • Associated: 00000000.00000002.3892722469.00007FF651FE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF652350000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF65235A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6524E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3892755396.00007FF6526B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893239468.00007FF6526B2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.3893270465.00007FF6526B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff651fe0000_WaveExecutor.jbxd
                                                                          Similarity
                                                                          • API ID: 00007D91310
                                                                          • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$stb__dout + length <= stb__barrier_out_e
                                                                          • API String ID: 1541411109-3603624656
                                                                          • Opcode ID: 17ca0878dc678fdc762dde65a4cd07555298fce1ac43a8728e7920541c5b5e5c
                                                                          • Instruction ID: 47d0308b99e71c38cf273a46dc0d2c24500d9b50b6bfe59b46b3cbb4d0a697dd
                                                                          • Opcode Fuzzy Hash: 17ca0878dc678fdc762dde65a4cd07555298fce1ac43a8728e7920541c5b5e5c
                                                                          • Instruction Fuzzy Hash: C9116131B0EA5281EB448B02FC800696361FB88BC8F8C50B1DA5DA3728DFBDE5D5C300