Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WaveExecutor.exe

Overview

General Information

Sample name:WaveExecutor.exe
Analysis ID:1570766
MD5:20530c9bc61569e79d6ffece7f7e426a
SHA1:fe3dca7b627e8d3ae49d2e9c9145581f108330f2
SHA256:76dbac3dc4d2dc8aa1e0e8de0d8f4d57172a8be90fc3ef535159ef649d762dd5
Tags:exeuser-aachum
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
PE file contains section with special chars
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • WaveExecutor.exe (PID: 5660 cmdline: "C:\Users\user\Desktop\WaveExecutor.exe" MD5: 20530C9BC61569E79D6FFECE7F7E426A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: WaveExecutor.exe PID: 5660JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.WaveExecutor.exe.23830c8f1d0.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-08T02:20:20.379643+010028032742Potentially Bad Traffic192.168.2.549704104.26.8.59443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: WaveExecutor.exeAvira: detected
        Source: WaveExecutor.exeReversingLabs: Detection: 21%
        Source: WaveExecutor.exeVirustotal: Detection: 22%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: WaveExecutor.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830C07750 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,CryptUnprotectData,0_2_0000023830C07750
        Source: unknownHTTPS traffic detected: 104.26.8.59:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: WaveExecutor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830B6F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_0000023830B6F46A
        Source: Joe Sandbox ViewIP Address: 104.26.8.59 104.26.8.59
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 104.26.8.59:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: global trafficDNS traffic detected: DNS query: api.myip.com
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://https/:://websocketpp.processorGeneric
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2092380311.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2081061687.0000023830AF3000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098731426.0000023830AFB000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3884734345.0000023830B11000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2239184718.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2245590997.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2227642640.0000023830AFA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2252206172.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2107968318.0000023830B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2189487968.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071700097.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2084849656.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2087412868.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098472823.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2216852864.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2116665136.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2101038068.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2147002085.0000023830ADB000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2105261193.0000023830AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/Russia
        Source: WaveExecutor.exe, 00000000.00000003.2071700097.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2084849656.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2086876634.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3885062139.0000023830FFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/oZ
        Source: WaveExecutor.exe, 00000000.00000003.2092380311.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2081061687.0000023830AF3000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098731426.0000023830AFB000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3884734345.0000023830B11000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2239184718.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2245590997.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2227642640.0000023830AFA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2252206172.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2107968318.0000023830B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2189487968.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2087412868.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098472823.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2216852864.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2116665136.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2101038068.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2105261193.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2166369796.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2258234006.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2170700818.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2119493614.0000023830AFD000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2126774495.0000023830B06000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/qI
        Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
        Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2050747203.0000023832B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071857072.0000023832AFE000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2050368050.0000023832AFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage
        Source: WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold
        Source: WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
        Source: WaveExecutor.exe, 00000000.00000003.2079759931.00000238329A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f10
        Source: WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
        Source: WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
        Source: unknownHTTPS traffic detected: 104.26.8.59:443 -> 192.168.2.5:49704 version: TLS 1.2
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB961C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF7AB961C20
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB961D70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF7AB961D70
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB961C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF7AB961C20
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB990330 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF7AB990330
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB990D02 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF7AB990D02

        System Summary

        barindex
        Source: WaveExecutor.exeStatic PE information: section name: "aR
        Source: WaveExecutor.exeStatic PE information: section name: b@b8
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB993B90 PostQuitMessage,GetWindowRect,SetWindowPos,NtdllDefWindowProc_A,0_2_00007FF7AB993B90
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98FCE00_2_00007FF7AB98FCE0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9943200_2_00007FF7AB994320
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9903300_2_00007FF7AB990330
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98F2F00_2_00007FF7AB98F2F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98EA600_2_00007FF7AB98EA60
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB96C2700_2_00007FF7AB96C270
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9860900_2_00007FF7AB986090
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9725F00_2_00007FF7AB9725F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB946CB00_2_00007FF7AB946CB0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB990D020_2_00007FF7AB990D02
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB96BD100_2_00007FF7AB96BD10
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB977CE00_2_00007FF7AB977CE0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9654F00_2_00007FF7AB9654F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB966C900_2_00007FF7AB966C90
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB976BC00_2_00007FF7AB976BC0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB94FBB00_2_00007FF7AB94FBB0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98CB400_2_00007FF7AB98CB40
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB96DB500_2_00007FF7AB96DB50
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB95038C0_2_00007FF7AB95038C
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9473900_2_00007FF7AB947390
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98A3700_2_00007FF7AB98A370
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB950AC10_2_00007FF7AB950AC1
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98C3100_2_00007FF7AB98C310
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB95C2500_2_00007FF7AB95C250
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB95F2500_2_00007FF7AB95F250
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB955A300_2_00007FF7AB955A30
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98BA800_2_00007FF7AB98BA80
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB95E1C00_2_00007FF7AB95E1C0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB95FA000_2_00007FF7AB95FA00
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB982A000_2_00007FF7AB982A00
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB97F9E00_2_00007FF7AB97F9E0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9759E00_2_00007FF7AB9759E0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB96B1E00_2_00007FF7AB96B1E0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9510570_2_00007FF7AB951057
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB96BFC00_2_00007FF7AB96BFC0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB94DFB00_2_00007FF7AB94DFB0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9797F00_2_00007FF7AB9797F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9497300_2_00007FF7AB949730
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9517880_2_00007FF7AB951788
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB956EC00_2_00007FF7AB956EC0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9696B00_2_00007FF7AB9696B0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB967EF00_2_00007FF7AB967EF0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9546F00_2_00007FF7AB9546F0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB95D6200_2_00007FF7AB95D620
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9546200_2_00007FF7AB954620
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB97CDD00_2_00007FF7AB97CDD0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9505970_2_00007FF7AB950597
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98E5B00_2_00007FF7AB98E5B0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB949E100_2_00007FF7AB949E10
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB980DE00_2_00007FF7AB980DE0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB9515F40_2_00007FF7AB9515F4
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB96AD400_2_00007FF7AB96AD40
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB97D5300_2_00007FF7AB97D530
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB945D900_2_00007FF7AB945D90
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830B938410_2_0000023830B93841
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830B5BA300_2_0000023830B5BA30
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830C327200_2_0000023830C32720
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: String function: 00007FF7AB99D440 appears 930 times
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: String function: 00007FF7AB961F40 appears 41 times
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: String function: 00007FF7AB9585B0 appears 35 times
        Source: WaveExecutor.exeStatic PE information: Resource name: RT_RCDATA type: DOS executable (COM)
        Source: WaveExecutor.exeStatic PE information: Resource name: RT_RCDATA type: ARJ archive data, v65, multi-volume, slash-switched, backup, original name: \026)\246\274\303F"\306\005\301\206y\363\207\203X\304\254\227\252iV6\322\006\207\374\3137D\234T"\360;]w\263\233r\361\371\011<\337\274H\\234\220\365,
        Source: WaveExecutor.exeStatic PE information: Section: bbbb ZLIB complexity 0.999073478746118
        Source: classification engineClassification label: mal84.spyw.evad.winEXE@1/1@1/1
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830B46FE0 std::_Fac_node::_Fac_node,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_0000023830B46FE0
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\9W4PXN0Z.htmJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: WaveExecutor.exe, 00000000.00000002.3883600686.000002382C1AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE context_annotations(visit_id INTEGER PRIMARY KEY,context_annotation_flags INTEGER NOT NULL,duration_since_last_visit INTEGER,page_end_reason INTEGER,total_foreground_duration INTEGER,browser_type INTEGER DEFAULT 0 NOT NULL,window_id INTEGER DEFAULT -1 NOT NULL,tab_id INTEGER DEFAULT -1 NOT NULL,task_id INTEGER DEFAULT -1 NOT NULL,root_task_id INTEGER DEFAULT -1 NOT NULL,parent_task_id INTEGER DEFAULT -1 NOT NULL,response_code INTEGER DEFAULT 0 NOT NULL);
        Source: WaveExecutor.exe, 00000000.00000003.2071700097.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2084849656.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2086876634.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3885062139.0000023830FFC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE credit_cards (guid VARCHAR PRIMARY KEY, name_on_card VARCHAR, expiration_month INTEGER, expiration_year INTEGER, card_number_encrypted BLOB, date_modified INTEGER NOT NULL DEFAULT 0, origin VARCHAR DEFAULT '', use_count INTEGER NOT NULL DEFAULT 0, use_date INTEGER NOT NULL DEFAULT 0, billing_address_id VARCHAR, nickname VARCHAR);tGc
        Source: WaveExecutor.exe, 00000000.00000003.2243930070.00000238329F8000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2049360841.0000023832AFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: WaveExecutor.exeReversingLabs: Detection: 21%
        Source: WaveExecutor.exeVirustotal: Detection: 22%
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: d3d9.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: msvcp140.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: d3d10warp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: resourcepolicyclient.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dxcore.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: xinput1_4.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: inputhost.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: WaveExecutor.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: WaveExecutor.exeStatic file information: File size 1390123 > 1048576
        Source: WaveExecutor.exeStatic PE information: Raw size of bbbb is bigger than: 0x100000 < 0x142000
        Source: WaveExecutor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\WaveExecutor.exeUnpacked PE file: 0.2.WaveExecutor.exe.7ff7ab940000.1.unpack "aR:EW;bbbb:EW;Unknown_Section2:W; vs "aR:ER;bbbb:ER;Unknown_Section2:W;
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98F7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF7AB98F7A0
        Source: initial sampleStatic PE information: section where entry point is pointing to: bbbb
        Source: WaveExecutor.exeStatic PE information: section name: "aR
        Source: WaveExecutor.exeStatic PE information: section name: bbbb
        Source: WaveExecutor.exeStatic PE information: section name: b@b8
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830B84970 push es; ret 0_2_0000023830B8497F
        Source: WaveExecutor.exeStatic PE information: section name: bbbb entropy: 7.9997575830156915
        Source: C:\Users\user\Desktop\WaveExecutor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeWindow / User API: threadDelayed 5629Jump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeWindow / User API: foregroundWindowGot 1663Jump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_0000023830B6F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_0000023830B6F46A
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsdvboxserviceu
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayx64dbgh
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: P}GUqEmuneLbN\
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
        Source: WaveExecutor.exe, 00000000.00000003.2252206172.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2107968318.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2075216465.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2101038068.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2258234006.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2245590997.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2170700818.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2201180760.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2146951068.0000023830B24000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2166369796.0000023830B24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-gaVGAuthServicevmwaretrayv
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
        Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
        Source: WaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: wiresharkvmwareuseri
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
        Source: WaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
        Source: WaveExecutor.exe, 00000000.00000003.2195268760.0000023832A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
        Source: C:\Users\user\Desktop\WaveExecutor.exeAPI call chain: ExitProcess graph end nodegraph_0-91497
        Source: C:\Users\user\Desktop\WaveExecutor.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB99C0F8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7AB99C0F8
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB98F7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF7AB98F7A0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB99C0F8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7AB99C0F8
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF7AB98F7A0
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: GetKeyboardLayout,GetLocaleInfoA,0_2_00007FF7AB99105B
        Source: C:\Users\user\Desktop\WaveExecutor.exeCode function: 0_2_00007FF7AB99C388 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7AB99C388

        Stealing of Sensitive Information

        barindex
        Source: WaveExecutor.exeString found in binary or memory: Electrum
        Source: WaveExecutor.exeString found in binary or memory: \ElectronCash\wallets
        Source: WaveExecutor.exeString found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
        Source: WaveExecutor.exeString found in binary or memory: \Exodus\exodus.wallet
        Source: WaveExecutor.exeString found in binary or memory: \Ethereum\keystore
        Source: WaveExecutor.exeString found in binary or memory: \Exodus\exodus.wallet
        Source: WaveExecutor.exeString found in binary or memory: Ethereum
        Source: WaveExecutor.exeString found in binary or memory: \Coinomi\Coinomi\wallets
        Source: WaveExecutor.exeString found in binary or memory: \Ethereum\keystore
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\WaveExecutor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: Yara matchFile source: 0.2.WaveExecutor.exe.23830c8f1d0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: WaveExecutor.exe PID: 5660, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Input Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Deobfuscate/Decode Files or Information
        1
        Input Capture
        1
        Query Registry
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
        Obfuscated Files or Information
        Security Account Manager11
        Security Software Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
        Software Packing
        NTDS2
        Process Discovery
        Distributed Component Object Model3
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        WaveExecutor.exe21%ReversingLabs
        WaveExecutor.exe23%VirustotalBrowse
        WaveExecutor.exe100%AviraHEUR/AGEN.1314582
        WaveExecutor.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://https://https/:://websocketpp.processorGeneric0%Avira URL Cloudsafe
        https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg0%Avira URL Cloudsafe
        https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.myip.com
        104.26.8.59
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://api.myip.com/false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://https://https/:://websocketpp.processorGenericWaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ac.ecosia.org/autocomplete?q=WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://duckduckgo.com/chrome_newtabWaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgWaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoWaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgWaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f10WaveExecutor.exe, 00000000.00000003.2079759931.00000238329A2000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usageWaveExecutor.exe, WaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmpfalse
                          high
                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchWaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiWaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refWaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.WaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2050747203.0000023832B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071857072.0000023832AFE000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2050368050.0000023832AFF000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://api.myip.com/RussiaWaveExecutor.exe, 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmpfalse
                                        high
                                        https://api.myip.com/oZWaveExecutor.exe, 00000000.00000003.2071700097.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2084849656.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2086876634.0000023830FFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3885062139.0000023830FFC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(HoldWaveExecutor.exe, 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmpfalse
                                            high
                                            https://www.ecosia.org/newtab/WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://api.myip.com/qIWaveExecutor.exe, 00000000.00000003.2092380311.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2081061687.0000023830AF3000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098731426.0000023830AFB000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000002.3884734345.0000023830B11000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2239184718.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2245590997.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2227642640.0000023830AFA000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2252206172.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2107968318.0000023830B02000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2189487968.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2087412868.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2098472823.0000023830AF7000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2216852864.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2116665136.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2101038068.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2105261193.0000023830AF6000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2166369796.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2258234006.0000023830B06000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2170700818.0000023830AFC000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2119493614.0000023830AFD000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2126774495.0000023830B06000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaWaveExecutor.exe, 00000000.00000003.2071857072.00000238329A5000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2071413592.0000023833B5F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=WaveExecutor.exe, 00000000.00000003.2117129718.0000023832B1C000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2085191353.0000023832B3D000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2193600154.000002383299B000.00000004.00000020.00020000.00000000.sdmp, WaveExecutor.exe, 00000000.00000003.2115574047.0000023833B0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    104.26.8.59
                                                    api.myip.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1570766
                                                    Start date and time:2024-12-08 02:19:28 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 6m 28s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Run name:Run with higher sleep bypass
                                                    Number of analysed new started processes analysed:4
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:WaveExecutor.exe
                                                    Detection:MAL
                                                    Classification:mal84.spyw.evad.winEXE@1/1@1/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 88%
                                                    • Number of executed functions: 36
                                                    • Number of non-executed functions: 122
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    No simulations
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    104.26.8.59http://jquery0.com/jWXxbHGet hashmaliciousGRQ ScamBrowse
                                                    • trk.adtrk18.com/aff_c?offer_id=15108&aff_id=1850&url_id=14904&aff_sub=3f757dd3-a86d-4368-82fc-2285b4d19731&aff_sub5=cm3l130515
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    api.myip.comNexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    file.exeGet hashmaliciousAmadey, CryptbotBrowse
                                                    • 172.67.75.163
                                                    file.exeGet hashmaliciousAmadey, XWormBrowse
                                                    • 172.67.75.163
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.8.59
                                                    file.exeGet hashmaliciousLummaC, Ailurophile Stealer, Amadey, LummaC Stealer, StealcBrowse
                                                    • 104.26.9.59
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUSNexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Xeno Executor.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                    • 104.26.13.205
                                                    Delta.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 104.21.16.9
                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 172.67.165.166
                                                    Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 104.21.36.51
                                                    'Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 172.67.185.163
                                                    Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 104.21.24.90
                                                    Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                    • 172.67.185.163
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    37f463bf4616ecd445d4a1937da06e19Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.8.59
                                                    Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.8.59
                                                    Xeno Executor.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                    • 104.26.8.59
                                                    file.exeGet hashmaliciousAmadey, CredGrabber, LummaC Stealer, Meduza Stealer, Stealc, VidarBrowse
                                                    • 104.26.8.59
                                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                    • 104.26.8.59
                                                    malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                                    • 104.26.8.59
                                                    INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    • 104.26.8.59
                                                    Bank Swift and SOA PRN00720031415453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    • 104.26.8.59
                                                    RFQ Order list #2667747.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    • 104.26.8.59
                                                    No context
                                                    Process:C:\Users\user\Desktop\WaveExecutor.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):57
                                                    Entropy (8bit):4.3585198384225
                                                    Encrypted:false
                                                    SSDEEP:3:YMb1gXMlJ9eMfQxaNmGGL4:YMeX6uxaNmRL4
                                                    MD5:E86153F34E01C5AED461F812D7472D86
                                                    SHA1:CB4491FAC004B18059BA1BDDFE2CD5696CD94F87
                                                    SHA-256:D174A4EFD5E9EAC12E0161D4C4A1D5C26122C4C5EA6A1BE49D7A277B535CB2DF
                                                    SHA-512:CA8A07D9515808AC4331D1790F75C2A05672E299366DE0A0EE55698F8679B366428DFB18E8390FF034B58E3D0D05165F4C9EE8F7481B7509B51A18A84DF5F51B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:{"ip":"8.46.123.228","country":"United States","cc":"US"}
                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Entropy (8bit):7.942431434635199
                                                    TrID:
                                                    • Win64 Executable GUI (202006/5) 93.52%
                                                    • Win64 Executable (generic) (12005/4) 5.56%
                                                    • DOS Executable Generic (2002/1) 0.93%
                                                    File name:WaveExecutor.exe
                                                    File size:1'390'123 bytes
                                                    MD5:20530c9bc61569e79d6ffece7f7e426a
                                                    SHA1:fe3dca7b627e8d3ae49d2e9c9145581f108330f2
                                                    SHA256:76dbac3dc4d2dc8aa1e0e8de0d8f4d57172a8be90fc3ef535159ef649d762dd5
                                                    SHA512:b082c75d0cd5ce6249b06d814457352bf8f49d36fa2a9c697833ff0802e286f03b6bcf9edb2f3084fbfef876a6be37cec1ddd1747d90b1f772dee6b92cb23cce
                                                    SSDEEP:24576:Ji25ZYwRgccqI/ZtjnftODZkIox/qLgzAlpe5Jwyytys4+/u9UkzVTMoxwz:BXmIdkf/qLg0Sf1duuBGUa
                                                    TLSH:5855122FB3D42725D974D5B38AE7C30AB730A1A1D676CB6B09C14E5FA16A0026B47F1C
                                                    File Content Preview:MZ......................@.2.92.UPX!._0x0023603..........................!..L.!This program cannot be run in DOS mode....$........z...............c.......................................c................................t.............Rich...................
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x1406d2210
                                                    Entrypoint Section:bbbb
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6753058D [Fri Dec 6 14:09:17 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:bd2500bb87e3a94d2777b94c3c55a684
                                                    Instruction
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    push ebp
                                                    dec eax
                                                    lea esi, dword ptr [FFEBEDE5h]
                                                    dec eax
                                                    lea edi, dword ptr [esi-00590000h]
                                                    push edi
                                                    mov eax, 006D0D9Dh
                                                    push eax
                                                    dec eax
                                                    mov ecx, esp
                                                    dec eax
                                                    mov edx, edi
                                                    dec eax
                                                    mov edi, esi
                                                    mov esi, 00141201h
                                                    push ebp
                                                    dec eax
                                                    mov ebp, esp
                                                    inc esp
                                                    mov ecx, dword ptr [ecx]
                                                    dec ecx
                                                    mov eax, edx
                                                    dec eax
                                                    mov edx, esi
                                                    dec eax
                                                    lea esi, dword ptr [edi+02h]
                                                    push esi
                                                    mov al, byte ptr [edi]
                                                    dec edx
                                                    mov cl, al
                                                    and al, 07h
                                                    shr cl, 00000003h
                                                    dec eax
                                                    mov ebx, FFFFFD00h
                                                    dec eax
                                                    shl ebx, cl
                                                    mov cl, al
                                                    dec eax
                                                    lea ebx, dword ptr [esp+ebx*2-00000E78h]
                                                    dec eax
                                                    and ebx, FFFFFFC0h
                                                    push 00000000h
                                                    dec eax
                                                    cmp esp, ebx
                                                    jne 00007F57B8FC7EFBh
                                                    push ebx
                                                    dec eax
                                                    lea edi, dword ptr [ebx+08h]
                                                    mov cl, byte ptr [esi-01h]
                                                    dec edx
                                                    mov byte ptr [edi+02h], al
                                                    mov al, cl
                                                    shr cl, 00000004h
                                                    mov byte ptr [edi+01h], cl
                                                    and al, 0Fh
                                                    mov byte ptr [edi], al
                                                    dec eax
                                                    lea ecx, dword ptr [edi-04h]
                                                    push eax
                                                    inc ecx
                                                    push edi
                                                    dec eax
                                                    lea eax, dword ptr [edi+04h]
                                                    inc ebp
                                                    xor edi, edi
                                                    inc ecx
                                                    push esi
                                                    inc ecx
                                                    mov esi, 00000001h
                                                    inc ecx
                                                    push ebp
                                                    inc ebp
                                                    xor ebp, ebp
                                                    inc ecx
                                                    push esp
                                                    push ebp
                                                    push ebx
                                                    dec eax
                                                    sub esp, 48h
                                                    dec eax
                                                    mov dword ptr [esp+38h], ecx
                                                    dec eax
                                                    mov dword ptr [esp+20h], eax
                                                    mov eax, 00000001h
                                                    dec eax
                                                    mov dword ptr [esp+40h], esi
                                                    dec esp
                                                    mov dword ptr [esp+30h], eax
                                                    mov ebx, eax
                                                    inc esp
                                                    mov dword ptr [esp+2Ch], ecx
                                                    movzx ecx, byte ptr [edi+02h]
                                                    shl ebx, cl
                                                    mov ecx, ebx
                                                    Programming Language:
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [IMP] VS2005 build 50727
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x6e3c940x4c0b@b8
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6d30000x10c94b@b8
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3710000x43bc"aR
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e41540x20b@b8
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x6d2df00x28bbbb
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d2e200x140bbbb
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    "aR0x10000x5900000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    bbbb0x5910000x1420000x1420009cb2738f30eee3b9289923700fa0b1c5False0.999073478746118data7.9997575830156915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    b@b80x6d30000x120000x112007203ffef5d1e7538bd4a499cb093a19bFalse0.2558308622262774data3.946927594863314IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    None0x6e3ad00x2edata1.108695652173913
                                                    RT_RCDATA0x386afc0x3201empty0
                                                    RT_RCDATA0x389d000x3201empty0
                                                    RT_RCDATA0x38cf040x3201empty0
                                                    RT_RCDATA0x3901080x3201empty0
                                                    RT_RCDATA0x39330c0x3201empty0
                                                    RT_RCDATA0x3965100x3201empty0
                                                    RT_RCDATA0x3997140x3201empty0
                                                    RT_RCDATA0x39c9180x3201empty0
                                                    RT_RCDATA0x39fb1c0x3201empty0
                                                    RT_RCDATA0x3a2d200x3201empty0
                                                    RT_RCDATA0x3a5f240x3201empty0
                                                    RT_RCDATA0x3a91280x3201empty0
                                                    RT_RCDATA0x3ac32c0x3201empty0
                                                    RT_RCDATA0x3af5300x3201empty0
                                                    RT_RCDATA0x3b27340x3201empty0
                                                    RT_RCDATA0x3b59380x3201empty0
                                                    RT_RCDATA0x3b8b3c0x3201empty0
                                                    RT_RCDATA0x3bbd400x3201empty0
                                                    RT_RCDATA0x3bef440x3201empty0
                                                    RT_RCDATA0x3c21480x3201empty0
                                                    RT_RCDATA0x3c534c0x3201empty0
                                                    RT_RCDATA0x3c85500x3201empty0
                                                    RT_RCDATA0x3cb7540x3201empty0
                                                    RT_RCDATA0x3ce9580x3201empty0
                                                    RT_RCDATA0x3d1b5c0x3201empty0
                                                    RT_RCDATA0x3d4d600x3201empty0
                                                    RT_RCDATA0x3d7f640x3201empty0
                                                    RT_RCDATA0x3db1680x3201empty0
                                                    RT_RCDATA0x3de36c0x3201empty0
                                                    RT_RCDATA0x3e15700x3201empty0
                                                    RT_RCDATA0x3e47740x3201empty0
                                                    RT_RCDATA0x3e79780x76empty0
                                                    RT_RCDATA0x3e79f00x22empty0
                                                    RT_RCDATA0x3e7a140x3201empty0
                                                    RT_RCDATA0x3eac180x3201empty0
                                                    RT_RCDATA0x3ede1c0x3201empty0
                                                    RT_RCDATA0x3f10200x3201empty0
                                                    RT_RCDATA0x3f42240x3201empty0
                                                    RT_RCDATA0x3f74280x3201empty0
                                                    RT_RCDATA0x3fa62c0x3201empty0
                                                    RT_RCDATA0x3fd8300x3201empty0
                                                    RT_RCDATA0x400a340x3201empty0
                                                    RT_RCDATA0x403c380x3201empty0
                                                    RT_RCDATA0x406e3c0x3201empty0
                                                    RT_RCDATA0x40a0400x3201empty0
                                                    RT_RCDATA0x40d2440x740empty0
                                                    RT_RCDATA0x40d9840xfempty0
                                                    RT_RCDATA0x40d9940x3201empty0
                                                    RT_RCDATA0x410b980x3201empty0
                                                    RT_RCDATA0x413d9c0x3201empty0
                                                    RT_RCDATA0x416fa00x3201empty0
                                                    RT_RCDATA0x41a1a40xe96ceempty0
                                                    RT_RCDATA0x5038740x3201empty0
                                                    RT_RCDATA0x506a780x90edempty0
                                                    RT_RCDATA0x50fb680x3201empty0
                                                    RT_RCDATA0x512d6c0x3201empty0
                                                    RT_RCDATA0x515f700x3201empty0
                                                    RT_RCDATA0x5191740x3201empty0
                                                    RT_RCDATA0x51c3780x3201empty0
                                                    RT_RCDATA0x51f57c0x55empty0
                                                    RT_RCDATA0x51f5d40x3201empty0
                                                    RT_RCDATA0x5227d80x3201empty0
                                                    RT_RCDATA0x5259dc0x3201empty0
                                                    RT_RCDATA0x528be00x9eempty0
                                                    RT_RCDATA0x528c800x1f2empty0
                                                    RT_RCDATA0x528e740x3201empty0
                                                    RT_RCDATA0x52c0780x3201empty0
                                                    RT_RCDATA0x52f27c0x3201empty0
                                                    RT_RCDATA0x5324800x3201empty0
                                                    RT_RCDATA0x5356840x3201empty0
                                                    RT_RCDATA0x5388880x3201empty0
                                                    RT_RCDATA0x53ba8c0x3201empty0
                                                    RT_RCDATA0x53ec900x7dempty0
                                                    RT_RCDATA0x53ed100x7dempty0
                                                    RT_RCDATA0x53ed900x7dempty0
                                                    RT_RCDATA0x53ee100x7dempty0
                                                    RT_RCDATA0x53ee900x7dempty0
                                                    RT_RCDATA0x53ef100x7dempty0
                                                    RT_RCDATA0x53ef900x7dempty0
                                                    RT_RCDATA0x53f0100x7dempty0
                                                    RT_RCDATA0x53f0900x7dempty0
                                                    RT_RCDATA0x53f1100x7dempty0
                                                    RT_RCDATA0x53f1900x7dempty0
                                                    RT_RCDATA0x53f2100x7dempty0
                                                    RT_RCDATA0x53f2900x7dempty0
                                                    RT_RCDATA0x53f3100x7dempty0
                                                    RT_RCDATA0x53f3900x7dempty0
                                                    RT_RCDATA0x53f4100x3201empty0
                                                    RT_RCDATA0x5426140x3201empty0
                                                    RT_RCDATA0x5458180x3201empty0
                                                    RT_RCDATA0x548a1c0x3201empty0
                                                    RT_RCDATA0x54bc200x3201empty0
                                                    RT_RCDATA0x54ee240x3201empty0
                                                    RT_RCDATA0x5520280x3201empty0
                                                    RT_RCDATA0x55522c0x3201empty0
                                                    RT_RCDATA0x5584300x3201empty0
                                                    RT_RCDATA0x55b6340x3201empty0
                                                    RT_RCDATA0x55e8380x3201empty0
                                                    RT_RCDATA0x561a3c0x3201empty0
                                                    RT_RCDATA0x564c400x3201empty0
                                                    RT_RCDATA0x567e440x3201empty0
                                                    RT_RCDATA0x56b0480x3201empty0
                                                    RT_RCDATA0x56e24c0x3201empty0
                                                    RT_RCDATA0x5714500x3201empty0
                                                    RT_RCDATA0x5746540x3201empty0
                                                    RT_RCDATA0x5778580x3201empty0
                                                    RT_RCDATA0x57aa5c0x3201empty0
                                                    RT_RCDATA0x57dc600x3201empty0
                                                    RT_RCDATA0x580e640x3201empty0
                                                    RT_RCDATA0x5840680x3201empty0
                                                    RT_RCDATA0x58726c0x3201empty0
                                                    RT_RCDATA0x58a4700x3201empty0
                                                    RT_RCDATA0x58d6740x3201empty0
                                                    RT_RCDATA0x5908780x3201empty0
                                                    RT_RCDATA0x593a7c0x3201data1.0008593078665728
                                                    RT_RCDATA0x596c800x3201data1.0008593078665728
                                                    RT_RCDATA0x599e840x3201data1.0008593078665728
                                                    RT_RCDATA0x59d0880x3201data1.0008593078665728
                                                    RT_RCDATA0x5a028c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5a34900x3201data1.0008593078665728
                                                    RT_RCDATA0x5a66940x3201data1.0008593078665728
                                                    RT_RCDATA0x5a98980x3201data1.0008593078665728
                                                    RT_RCDATA0x5aca9c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5afca00x3201data1.0008593078665728
                                                    RT_RCDATA0x5b2ea40x3201data1.0008593078665728
                                                    RT_RCDATA0x5b60a80x3201data1.0008593078665728
                                                    RT_RCDATA0x5b92ac0x3201data1.0008593078665728
                                                    RT_RCDATA0x5bc4b00x3201data1.0008593078665728
                                                    RT_RCDATA0x5bf6b40x3201data1.0008593078665728
                                                    RT_RCDATA0x5c28b80x3201data1.0008593078665728
                                                    RT_RCDATA0x5c5abc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5c8cc00x3201data1.0008593078665728
                                                    RT_RCDATA0x5cbec40x3201data1.0008593078665728
                                                    RT_RCDATA0x5cf0c80x3201data1.0008593078665728
                                                    RT_RCDATA0x5d22cc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5d54d00x3201data1.0008593078665728
                                                    RT_RCDATA0x5d86d40x3201data1.0008593078665728
                                                    RT_RCDATA0x5db8d80x3201data1.0008593078665728
                                                    RT_RCDATA0x5deadc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5e1ce00x3201data1.0008593078665728
                                                    RT_RCDATA0x5e4ee40x3201data1.0008593078665728
                                                    RT_RCDATA0x5e80e80x3201data1.0008593078665728
                                                    RT_RCDATA0x5eb2ec0x3201data1.0008593078665728
                                                    RT_RCDATA0x5ee4f00x3201data1.0008593078665728
                                                    RT_RCDATA0x5f16f40x3201data1.0008593078665728
                                                    RT_RCDATA0x5f48f80x3201data1.0008593078665728
                                                    RT_RCDATA0x5f7afc0x3201DOS executable (COM)1.0008593078665728
                                                    RT_RCDATA0x5fad000x3201data1.0008593078665728
                                                    RT_RCDATA0x5fdf040x3201data1.0008593078665728
                                                    RT_RCDATA0x6011080x3201data1.0008593078665728
                                                    RT_RCDATA0x60430c0x3201data1.0008593078665728
                                                    RT_RCDATA0x6075100x3201data1.0008593078665728
                                                    RT_RCDATA0x60a7140x3201data1.0008593078665728
                                                    RT_RCDATA0x60d9180x3201data1.0008593078665728
                                                    RT_RCDATA0x610b1c0x3201data1.0008593078665728
                                                    RT_RCDATA0x613d200x3201data1.0008593078665728
                                                    RT_RCDATA0x616f240x3201data1.0008593078665728
                                                    RT_RCDATA0x61a1280x3201data1.0008593078665728
                                                    RT_RCDATA0x61d32c0x3201data1.0008593078665728
                                                    RT_RCDATA0x6205300x3201data1.0008593078665728
                                                    RT_RCDATA0x6237340x3201data1.0008593078665728
                                                    RT_RCDATA0x6269380x3201data1.0008593078665728
                                                    RT_RCDATA0x629b3c0x3201data1.0008593078665728
                                                    RT_RCDATA0x62cd400x3201data1.0008593078665728
                                                    RT_RCDATA0x62ff440x3201data1.0008593078665728
                                                    RT_RCDATA0x6331480x3201data1.0008593078665728
                                                    RT_RCDATA0x63634c0x3201data1.0008593078665728
                                                    RT_RCDATA0x6395500x3201data1.0008593078665728
                                                    RT_RCDATA0x63c7540x3201data1.0008593078665728
                                                    RT_RCDATA0x63f9580x3201data1.0008593078665728
                                                    RT_RCDATA0x642b5c0x3201data1.0008593078665728
                                                    RT_RCDATA0x645d600x3201data1.0008593078665728
                                                    RT_RCDATA0x648f640x3201data1.0008593078665728
                                                    RT_RCDATA0x64c1680x3201data1.0008593078665728
                                                    RT_RCDATA0x64f36c0x3201data1.0008593078665728
                                                    RT_RCDATA0x6525700x3201data1.0008593078665728
                                                    RT_RCDATA0x6557740x3201data1.0008593078665728
                                                    RT_RCDATA0x6589780x3201data1.0008593078665728
                                                    RT_RCDATA0x65bb7c0x3201data1.0008593078665728
                                                    RT_RCDATA0x65ed800x3201data1.0008593078665728
                                                    RT_RCDATA0x661f840x3201data1.0008593078665728
                                                    RT_RCDATA0x6651880x3201data1.0008593078665728
                                                    RT_RCDATA0x66838c0x3201data1.0008593078665728
                                                    RT_RCDATA0x66b5900x3201data1.0008593078665728
                                                    RT_RCDATA0x66e7940x3201data1.0008593078665728
                                                    RT_RCDATA0x6719980x3201data1.0008593078665728
                                                    RT_RCDATA0x674b9c0x3201ARJ archive data, v65, multi-volume, slash-switched, backup, original name: \026)\246\274\303F"\306\005\301\206y\363\207\203X\304\254\227\252iV6\322\006\207\374\3137D\234T"\360;]w\263\233r\361\371\011<\337\274H\\234\220\365,1.0008593078665728
                                                    RT_RCDATA0x677da00x3201data1.0008593078665728
                                                    RT_RCDATA0x67afa40x3201data1.0008593078665728
                                                    RT_RCDATA0x67e1a80x3201data1.0008593078665728
                                                    RT_RCDATA0x6813ac0x3201data1.0008593078665728
                                                    RT_RCDATA0x6845b00x3201data1.0008593078665728
                                                    RT_RCDATA0x6877b40x3201data1.0008593078665728
                                                    RT_RCDATA0x68a9b80x3201data1.0008593078665728
                                                    RT_RCDATA0x68dbbc0x3201data1.0008593078665728
                                                    RT_RCDATA0x690dc00x3201data1.0008593078665728
                                                    RT_RCDATA0x693fc40x3201data1.0008593078665728
                                                    RT_RCDATA0x6971c80x3201data1.0008593078665728
                                                    RT_RCDATA0x69a3cc0x3201data1.0008593078665728
                                                    RT_RCDATA0x69d5d00x3201data1.0008593078665728
                                                    RT_RCDATA0x6a07d40x3201data1.0008593078665728
                                                    RT_RCDATA0x6a39d80x3201data1.0008593078665728
                                                    RT_RCDATA0x6a6bdc0x3201data1.0008593078665728
                                                    RT_RCDATA0x6a9de00x3201data1.0008593078665728
                                                    RT_RCDATA0x6acfe40x3201data1.0008593078665728
                                                    RT_RCDATA0x6b01e80x3201OpenPGP Secret Key1.0008593078665728
                                                    RT_RCDATA0x6b33ec0x3201data1.0008593078665728
                                                    RT_RCDATA0x6b65f00x3201OpenPGP Secret Key1.0008593078665728
                                                    RT_RCDATA0x6b97f40x3201data1.0008593078665728
                                                    RT_RCDATA0x6bc9f80x3201data1.0008593078665728
                                                    RT_RCDATA0x6bfbfc0x3201data1.0008593078665728
                                                    RT_RCDATA0x6c2e000x3201data1.0008593078665728
                                                    RT_RCDATA0x6c60040x3201data1.0008593078665728
                                                    RT_MANIFEST0x6e3b040x2data5.0
                                                    RT_MANIFEST0x6e3b0c0x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                    None0x6c93940x110data1.0404411764705883
                                                    None0x6c94a40xd6data1.0514018691588785
                                                    None0x6c957c0xd2data1.0523809523809524
                                                    None0x6c96500x88data1.0808823529411764
                                                    None0x6c96d80x9cdata1.0705128205128205
                                                    None0x6c97740x15adata1.0317919075144508
                                                    None0x6c98d00x9cdata1.0705128205128205
                                                    None0x6c996c0x11adata1.0390070921985815
                                                    None0x6c9a880x96data1.0733333333333333
                                                    None0x6c9b200xbedata1.0578947368421052
                                                    None0x6c9be00xa2data1.0679012345679013
                                                    None0x6c9c840xdcOpenPGP Secret Key1.05
                                                    None0x6c9d600xd0data1.0528846153846154
                                                    None0x6c9e300xf4data1.0450819672131149
                                                    None0x6c9f240x114OpenPGP Public Key1.039855072463768
                                                    None0x6ca0380x9cdata1.0705128205128205
                                                    None0x6ca0d40x98data1.0723684210526316
                                                    None0x6ca16c0xa6data1.0662650602409638
                                                    None0x6ca2140xf6data1.0447154471544715
                                                    None0x6ca30c0xccdata1.053921568627451
                                                    None0x6ca3d80x158data1.0319767441860466
                                                    None0x6ca5300xe0data1.0491071428571428
                                                    None0x6ca6100xa2data1.0679012345679013
                                                    None0x6ca6b40xbcdata1.0585106382978724
                                                    None0x6ca7700xd8data1.0509259259259258
                                                    None0x6ca8480xa6data1.0662650602409638
                                                    None0x6ca8f00xeadata1.047008547008547
                                                    None0x6ca9dc0xe0data1.0491071428571428
                                                    None0x6caabc0xbadata1.0591397849462365
                                                    None0x6cab780xbedata1.0578947368421052
                                                    None0x6cac380x94data1.0743243243243243
                                                    None0x6caccc0x13eOpenPGP Public Key Version 5, Created Sun Dec 7 14:05:53 2014, Unknown Algorithm (0x31)1.0345911949685536
                                                    None0x6cae0c0xe8data1.0474137931034482
                                                    None0x6caef40xc4data1.0561224489795917
                                                    None0x6cafb80xcadata1.0544554455445545
                                                    None0x6cb0840x16adata1.0303867403314917
                                                    None0x6cb1f00xe4data1.0482456140350878
                                                    None0x6cb2d40x12cdata1.0366666666666666
                                                    None0x6cb4000xfedata1.0433070866141732
                                                    None0x6cb5000x158data1.0319767441860466
                                                    None0x6cb6580x116data1.039568345323741
                                                    None0x6cb7700x10adata1.0413533834586466
                                                    None0x6cb87c0x178data1.0292553191489362
                                                    None0x6cb9f40x70data1.0982142857142858
                                                    None0x6cba640x66data1.107843137254902
                                                    None0x6cbacc0x9cdata1.0705128205128205
                                                    None0x6cbb680x142data1.0341614906832297
                                                    None0x6cbcac0x15adata1.0317919075144508
                                                    None0x6cbe080x132data1.0359477124183007
                                                    None0x6cbf3c0x96data1.0733333333333333
                                                    None0x6cbfd40x160data1.03125
                                                    None0x6cc1340xbadata1.0591397849462365
                                                    None0x6cc1f00x182data1.028497409326425
                                                    None0x6cc3740xbcdata1.0585106382978724
                                                    None0x6cc4300xfcdata1.0436507936507937
                                                    None0x6cc52c0xd4data1.0518867924528301
                                                    None0x6cc6000x13cdata1.0348101265822784
                                                    None0x6cc73c0x13adata1.035031847133758
                                                    None0x6cc8780x86data1.0820895522388059
                                                    None0x6cc9000xb2data1.0617977528089888
                                                    None0x6cc9b40xe0data1.0491071428571428
                                                    None0x6cca940x17edata1.0287958115183247
                                                    None0x6ccc140xc0data1.0572916666666667
                                                    None0x6cccd40xc6data1.0555555555555556
                                                    None0x6ccd9c0xaedata1.0632183908045978
                                                    None0x6cce4c0xd8data1.0509259259259258
                                                    None0x6ccf240x9edata1.0696202531645569
                                                    None0x6ccfc40xc6data1.0555555555555556
                                                    None0x6cd08c0xa6data1.0662650602409638
                                                    None0x6cd1340x88data1.0808823529411764
                                                    None0x6cd1bc0x118data1.0392857142857144
                                                    None0x6cd2d40xdadata1.0504587155963303
                                                    None0x6cd3b00xe2data1.0486725663716814
                                                    None0x6cd4940xccOpenPGP Secret Key1.053921568627451
                                                    None0x6cd5600x146data1.0337423312883436
                                                    None0x6cd6a80xdcdata1.05
                                                    None0x6cd7840x156data1.0321637426900585
                                                    None0x6cd8dc0xfcdata1.0436507936507937
                                                    None0x6cd9d80xf0data1.0458333333333334
                                                    None0x6cdac80xdedata1.0495495495495495
                                                    None0x6cdba80x7cOpenPGP Public Key1.0887096774193548
                                                    None0x6cdc240xd8data1.0509259259259258
                                                    None0x6cdcfc0xacdata1.063953488372093
                                                    None0x6cdda80x102data1.0426356589147288
                                                    None0x6cdeac0x9adata1.0714285714285714
                                                    None0x6cdf480xc2data1.056701030927835
                                                    None0x6ce00c0xa2data1.0679012345679013
                                                    None0x6ce0b00xcedata1.0533980582524272
                                                    None0x6ce1800x9cdata1.0705128205128205
                                                    None0x6ce21c0x144data1.0339506172839505
                                                    None0x6ce3600xb6data1.0604395604395604
                                                    None0x6ce4180x150data1.0327380952380953
                                                    None0x6ce5680x126data1.0374149659863945
                                                    None0x6ce6900xeadata1.047008547008547
                                                    None0x6ce77c0x160data1.03125
                                                    None0x6ce8dc0x14adata1.0333333333333334
                                                    None0x6cea280xaadata1.0647058823529412
                                                    None0x6cead40xaadata1.0647058823529412
                                                    None0x6ceb800xb6data1.0604395604395604
                                                    None0x6cec380x11cdata1.0387323943661972
                                                    None0x6ced540xe4data1.0482456140350878
                                                    None0x6cee380xbadata1.0591397849462365
                                                    None0x6ceef40x192data1.027363184079602
                                                    None0x6cf0880x102data1.0426356589147288
                                                    None0x6cf18c0xd0data1.0528846153846154
                                                    None0x6cf25c0xa0data1.06875
                                                    None0x6cf2fc0x1b6data1.0251141552511416
                                                    None0x6cf4b40x134data1.0357142857142858
                                                    None0x6cf5e80xc6data1.0555555555555556
                                                    None0x6cf6b00xd8data1.0509259259259258
                                                    DLLImport
                                                    api-ms-win-crt-heap-l1-1-0.dllfree
                                                    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                    api-ms-win-crt-math-l1-1-0.dllcosf
                                                    api-ms-win-crt-runtime-l1-1-0.dllexit
                                                    api-ms-win-crt-stdio-l1-1-0.dllfseek
                                                    api-ms-win-crt-string-l1-1-0.dllstrcmp
                                                    api-ms-win-crt-utility-l1-1-0.dllqsort
                                                    d3d9.dllDirect3DCreate9
                                                    IMM32.dllImmGetContext
                                                    kernEl32.dllLoadLibraryA, DeleteAtom, GetProcAddress, VirtualProtect
                                                    MSVCP140.dll_Query_perf_counter
                                                    Ole32.dllCoTaskMemFree
                                                    SHELL32.dllShellExecuteA
                                                    USER32.dllSetCursor
                                                    VCRUNTIME140.dllmemcpy
                                                    VCRUNTIME140_1.dll__CxxFrameHandler4
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-08T02:20:20.379643+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704104.26.8.59443TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 8, 2024 02:20:18.244252920 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:18.244306087 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:18.244396925 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:18.253577948 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:18.253597021 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:19.473164082 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:19.473269939 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:20.000283003 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:20.000313997 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:20.000705957 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:20.000768900 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:20.015613079 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:20.063338995 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:20.379677057 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:20.379766941 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:20.379776955 CET44349704104.26.8.59192.168.2.5
                                                    Dec 8, 2024 02:20:20.379822969 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:20.381392956 CET49704443192.168.2.5104.26.8.59
                                                    Dec 8, 2024 02:20:20.381409883 CET44349704104.26.8.59192.168.2.5
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 8, 2024 02:20:18.099711895 CET5587553192.168.2.51.1.1.1
                                                    Dec 8, 2024 02:20:18.238132000 CET53558751.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 8, 2024 02:20:18.099711895 CET192.168.2.51.1.1.10xf63eStandard query (0)api.myip.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 8, 2024 02:20:18.238132000 CET1.1.1.1192.168.2.50xf63eNo error (0)api.myip.com104.26.8.59A (IP address)IN (0x0001)false
                                                    Dec 8, 2024 02:20:18.238132000 CET1.1.1.1192.168.2.50xf63eNo error (0)api.myip.com104.26.9.59A (IP address)IN (0x0001)false
                                                    Dec 8, 2024 02:20:18.238132000 CET1.1.1.1192.168.2.50xf63eNo error (0)api.myip.com172.67.75.163A (IP address)IN (0x0001)false
                                                    • api.myip.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.549704104.26.8.594435660C:\Users\user\Desktop\WaveExecutor.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-08 01:20:20 UTC182OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43
                                                    Host: api.myip.com
                                                    2024-12-08 01:20:20 UTC782INHTTP/1.1 200 OK
                                                    Date: Sun, 08 Dec 2024 01:20:20 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    vary: Accept-Encoding
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wRLOaoU8%2FMYUKxsta62QgXGRlj51kFp4AkatnbLrxr9pRZ7WUIeP1%2FsSI%2FmhLsjCCJ3iEXMtcKrv6HnFMQODhXxwpde2sb7t8t2zKCK7Upchae%2Bha9%2BMrRX3Agm8TQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8ee8eeae183a42c0-EWR
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2085&min_rtt=2084&rtt_var=784&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2817&recv_bytes=820&delivery_rate=1393794&cwnd=208&unsent_bytes=0&cid=0b6241fdc0a0b258&ts=920&x=0"
                                                    2024-12-08 01:20:20 UTC63INData Raw: 33 39 0d 0a 7b 22 69 70 22 3a 22 38 2e 34 36 2e 31 32 33 2e 32 32 38 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 63 22 3a 22 55 53 22 7d 0d 0a
                                                    Data Ascii: 39{"ip":"8.46.123.228","country":"United States","cc":"US"}
                                                    2024-12-08 01:20:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:20:20:16
                                                    Start date:07/12/2024
                                                    Path:C:\Users\user\Desktop\WaveExecutor.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\WaveExecutor.exe"
                                                    Imagebase:0x7ff7ab940000
                                                    File size:1'390'123 bytes
                                                    MD5 hash:20530C9BC61569E79D6FFECE7F7E426A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3.3%
                                                      Dynamic/Decrypted Code Coverage:6.7%
                                                      Signature Coverage:32.9%
                                                      Total number of Nodes:960
                                                      Total number of Limit Nodes:22
                                                      execution_graph 91282 7ff7ab99bc80 91283 7ff7ab99bc94 91282->91283 91284 7ff7ab99bdcc 91283->91284 91285 7ff7ab99bc9c 91283->91285 91334 7ff7ab99c0f8 7 API calls 91284->91334 91287 7ff7ab99bdd6 91285->91287 91289 7ff7ab99bcba __scrt_release_startup_lock 91285->91289 91335 7ff7ab99c0f8 7 API calls 91287->91335 91290 7ff7ab99bcdf 91289->91290 91301 7ff7ab99c240 91289->91301 91291 7ff7ab99bde1 91336 7ff7ab99c388 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 91291->91336 91293 7ff7ab99bdfd __scrt_common_main_seh 91295 7ff7ab99bd6a 91304 7ff7ab996800 91295->91304 91299 7ff7ab99bd8d 91299->91291 91300 7ff7ab99bd91 91299->91300 91300->91290 91302 7ff7ab99c525 91301->91302 91303 7ff7ab99c257 GetStartupInfoW 91302->91303 91303->91295 91307 7ff7ab99682f 91304->91307 91306 7ff7ab996945 91341 7ff7ab993de0 7 API calls 91306->91341 91337 7ff7ab997c90 91307->91337 91309 7ff7ab996972 91310 7ff7ab997c90 00007FF8C610F020 91309->91310 91311 7ff7ab99697f 91310->91311 91312 7ff7ab997c90 00007FF8C610F020 91311->91312 91313 7ff7ab99698d 91312->91313 91342 7ff7ab993f70 00007FF8A8DA5F50 91313->91342 91317 7ff7ab996998 91349 7ff7ab9958d0 GetModuleFileNameA 91317->91349 91319 7ff7ab996ab4 91535 7ff7ab994120 67 API calls 91319->91535 91322 7ff7ab996ab9 91536 7ff7ab993f40 DestroyWindow UnregisterClassA 91322->91536 91326 7ff7ab996ac3 91333 7ff7ab99c288 GetModuleHandleW 91326->91333 91329 7ff7ab99699d 91329->91319 91330 7ff7ab996a48 MessageBoxA 91329->91330 91332 7ff7ab997c90 00007FF8C610F020 91329->91332 91433 7ff7ab994140 91329->91433 91442 7ff7ab994320 91329->91442 91517 7ff7ab9941d0 91329->91517 91526 7ff7ab998480 91329->91526 91530 7ff7ab998810 91329->91530 91331 7ff7ab997c90 00007FF8C610F020 91330->91331 91331->91329 91332->91329 91333->91299 91334->91287 91335->91291 91336->91293 91339 7ff7ab997cb0 Concurrency::details::ResourceManager::CreateNodeTopology 91337->91339 91338 7ff7ab997d61 91338->91306 91339->91338 91537 7ff7ab99b808 91339->91537 91341->91309 91343 7ff7ab993f92 91342->91343 91344 7ff7ab9940a0 91343->91344 91540 7ff7ab957c60 00007FF8C6125630 91344->91540 91346 7ff7ab9940dc 91543 7ff7ab945be0 91346->91543 91348 7ff7ab9940e3 91348->91317 91350 7ff7ab995921 91349->91350 91351 7ff7ab997c90 00007FF8C610F020 91350->91351 91367 7ff7ab995a3a 91351->91367 91352 7ff7ab995c98 91354 7ff7ab995cb6 91352->91354 91355 7ff7ab997c90 00007FF8C610F020 91352->91355 91353 7ff7ab997c90 00007FF8C610F020 91353->91352 91356 7ff7ab995cd4 91354->91356 91358 7ff7ab997c90 00007FF8C610F020 91354->91358 91355->91354 91357 7ff7ab995cf2 91356->91357 91359 7ff7ab997c90 00007FF8C610F020 91356->91359 91360 7ff7ab9961c6 91357->91360 91377 7ff7ab995d00 91357->91377 91358->91356 91359->91357 91361 7ff7ab996411 91360->91361 91362 7ff7ab99620a 91360->91362 91366 7ff7ab9977a0 00007FF8C610F020 91361->91366 91573 7ff7ab997650 00007FF8B9F61310 00007FF8C610F020 91362->91573 91364 7ff7ab99621e 91574 7ff7ab997650 00007FF8B9F61310 00007FF8C610F020 91364->91574 91365 7ff7ab997c90 00007FF8C610F020 91369 7ff7ab995bef 91365->91369 91370 7ff7ab996494 91366->91370 91367->91365 91367->91369 91369->91352 91369->91353 91371 7ff7ab997c90 00007FF8C610F020 91370->91371 91374 7ff7ab9964a1 91371->91374 91372 7ff7ab997c90 00007FF8C610F020 91375 7ff7ab995e44 91372->91375 91373 7ff7ab996554 91576 7ff7ab997650 00007FF8B9F61310 00007FF8C610F020 91373->91576 91374->91373 91383 7ff7ab9977a0 00007FF8C610F020 91374->91383 91569 7ff7ab9977a0 91375->91569 91377->91372 91379 7ff7ab996569 91577 7ff7ab997650 00007FF8B9F61310 00007FF8C610F020 91379->91577 91380 7ff7ab995e79 91381 7ff7ab997c90 00007FF8C610F020 91380->91381 91384 7ff7ab995e86 91381->91384 91385 7ff7ab996547 91383->91385 91386 7ff7ab997c90 00007FF8C610F020 91384->91386 91387 7ff7ab997c90 00007FF8C610F020 91385->91387 91408 7ff7ab995e94 91386->91408 91387->91373 91388 7ff7ab997c90 00007FF8C610F020 91390 7ff7ab996378 91388->91390 91389 7ff7ab996232 91389->91388 91575 7ff7ab998af0 00007FF8B9F61310 00007FF8C610F020 91390->91575 91392 7ff7ab9963c6 91393 7ff7ab9977a0 00007FF8C610F020 91392->91393 91394 7ff7ab9963e2 91393->91394 91395 7ff7ab997c90 00007FF8C610F020 91394->91395 91396 7ff7ab9963ef 91395->91396 91397 7ff7ab997c90 00007FF8C610F020 91396->91397 91399 7ff7ab9963fd 91397->91399 91398 7ff7ab997c90 00007FF8C610F020 91401 7ff7ab9966c3 91398->91401 91400 7ff7ab997c90 00007FF8C610F020 91399->91400 91405 7ff7ab99640b 91400->91405 91578 7ff7ab998af0 00007FF8B9F61310 00007FF8C610F020 91401->91578 91402 7ff7ab99657d 91402->91398 91403 7ff7ab997c90 00007FF8C610F020 91406 7ff7ab995fda 91403->91406 91409 7ff7ab997c90 00007FF8C610F020 91405->91409 91410 7ff7ab9977a0 00007FF8C610F020 91406->91410 91407 7ff7ab996711 91411 7ff7ab9977a0 00007FF8C610F020 91407->91411 91408->91403 91413 7ff7ab9961c0 GetCurrentDirectoryA 91409->91413 91414 7ff7ab99600f 91410->91414 91412 7ff7ab99672d 91411->91412 91415 7ff7ab997c90 00007FF8C610F020 91412->91415 91424 7ff7ab996788 91413->91424 91417 7ff7ab997c90 00007FF8C610F020 91414->91417 91419 7ff7ab99673a 91415->91419 91418 7ff7ab99601c 91417->91418 91420 7ff7ab997c90 00007FF8C610F020 91418->91420 91421 7ff7ab997c90 00007FF8C610F020 91419->91421 91426 7ff7ab99602a 91420->91426 91422 7ff7ab996748 91421->91422 91423 7ff7ab997c90 00007FF8C610F020 91422->91423 91423->91405 91424->91329 91424->91424 91425 7ff7ab997c90 00007FF8C610F020 91427 7ff7ab996170 91425->91427 91426->91425 91428 7ff7ab9977a0 00007FF8C610F020 91427->91428 91429 7ff7ab9961a5 91428->91429 91430 7ff7ab997c90 00007FF8C610F020 91429->91430 91431 7ff7ab9961b2 91430->91431 91432 7ff7ab997c90 00007FF8C610F020 91431->91432 91432->91413 91434 7ff7ab994144 PeekMessageA 91433->91434 91435 7ff7ab994163 TranslateMessage DispatchMessageA 91434->91435 91436 7ff7ab9941ad 91434->91436 91437 7ff7ab9941ab 91435->91437 91438 7ff7ab994181 91435->91438 91579 7ff7ab990330 91436->91579 91437->91434 91438->91329 91443 7ff7ab994358 91442->91443 91445 7ff7ab994619 91443->91445 91694 7ff7ab9926c0 91443->91694 91446 7ff7ab994f7c 91445->91446 91449 7ff7ab994659 91445->91449 91447 7ff7ab998480 2 API calls 91446->91447 91448 7ff7ab994fce 91447->91448 91450 7ff7ab997c90 00007FF8C610F020 91448->91450 91451 7ff7ab9946c0 SHBrowseForFolder 91449->91451 91454 7ff7ab99480d 91449->91454 91459 7ff7ab994fdc 91450->91459 91452 7ff7ab994722 SHGetPathFromIDList 91451->91452 91451->91454 91453 7ff7ab9947fe CoTaskMemFree 91452->91453 91458 7ff7ab994740 91452->91458 91453->91454 91455 7ff7ab998480 2 API calls 91454->91455 91456 7ff7ab99485f 91455->91456 91457 7ff7ab997c90 00007FF8C610F020 91456->91457 91461 7ff7ab99486d 91457->91461 91458->91453 91460 7ff7ab9702a0 6 API calls 91459->91460 91463 7ff7ab995101 91460->91463 91771 7ff7ab9702a0 91461->91771 91464 7ff7ab9702a0 6 API calls 91463->91464 91467 7ff7ab9951d3 91464->91467 91465 7ff7ab9949b8 91466 7ff7ab9702a0 6 API calls 91465->91466 91469 7ff7ab994a9d 91466->91469 91468 7ff7ab9702a0 6 API calls 91467->91468 91471 7ff7ab9952a5 91468->91471 91470 7ff7ab9702a0 6 API calls 91469->91470 91473 7ff7ab994b6f 91470->91473 91472 7ff7ab9702a0 6 API calls 91471->91472 91475 7ff7ab995377 91472->91475 91474 7ff7ab9702a0 6 API calls 91473->91474 91479 7ff7ab994c41 91474->91479 91476 7ff7ab9702a0 6 API calls 91475->91476 91477 7ff7ab99544e 91476->91477 91478 7ff7ab97f580 8 API calls 91477->91478 91480 7ff7ab995486 91478->91480 91481 7ff7ab9702a0 6 API calls 91479->91481 91482 7ff7ab9592e0 2 API calls 91480->91482 91484 7ff7ab994d18 91481->91484 91483 7ff7ab9954a0 91482->91483 91800 7ff7ab981520 14 API calls 91483->91800 91775 7ff7ab9592e0 91484->91775 91489 7ff7ab9954cc 91496 7ff7ab9955b3 91489->91496 91801 7ff7ab9439b0 00007FF8B9F61310 00007FF8C610F020 91489->91801 91491 7ff7ab994d5d 91492 7ff7ab9592e0 2 API calls 91491->91492 91493 7ff7ab994d9b 91492->91493 91783 7ff7ab9832d0 91493->91783 91495 7ff7ab99552b 91802 7ff7ab9439b0 00007FF8B9F61310 00007FF8C610F020 91495->91802 91497 7ff7ab995628 ExitProcess 91496->91497 91501 7ff7ab995631 91496->91501 91497->91501 91498 7ff7ab997c90 00007FF8C610F020 91500 7ff7ab994f76 91498->91500 91791 7ff7ab952ba0 91500->91791 91501->91498 91503 7ff7ab995674 91503->91329 91504 7ff7ab99556f 91803 7ff7ab9439b0 00007FF8B9F61310 00007FF8C610F020 91504->91803 91505 7ff7ab994dcc 91506 7ff7ab9592e0 2 API calls 91505->91506 91508 7ff7ab994e0a 91506->91508 91509 7ff7ab994e77 RemoveDirectoryA CreateDirectoryA 91508->91509 91510 7ff7ab994f1a 91508->91510 91512 7ff7ab994ebf 91509->91512 91513 7ff7ab994e98 MessageBoxA 91509->91513 91511 7ff7ab997c90 00007FF8C610F020 91510->91511 91511->91500 91787 7ff7ab99bb34 91512->91787 91513->91510 92164 7ff7ab94bc50 91517->92164 91521 7ff7ab994297 92216 7ff7ab98ea60 91521->92216 91522 7ff7ab994312 91522->91329 91524 7ff7ab9942a4 91524->91522 92220 7ff7ab993b20 91524->92220 91527 7ff7ab9984b1 91526->91527 91527->91527 92376 7ff7ab99a000 91527->92376 91529 7ff7ab9984f4 91529->91329 92383 7ff7ab998840 91530->92383 91532 7ff7ab998828 92386 7ff7ab99a2d0 91532->92386 91535->91322 91536->91326 91538 7ff7ab99be08 00007FF8C610F020 91537->91538 91541 7ff7ab957c98 00007FF8C6125630 91540->91541 91542 7ff7ab957cad 91540->91542 91541->91542 91542->91346 91544 7ff7ab945bfd 91543->91544 91545 7ff7ab945c91 91544->91545 91561 7ff7ab945d90 00007FF8C610F020 00007FF8C612A0D0 91544->91561 91549 7ff7ab946cb0 91545->91549 91548 7ff7ab945ca0 91548->91348 91551 7ff7ab946cda 91549->91551 91562 7ff7ab9626b0 91551->91562 91552 7ff7ab946e3e 91553 7ff7ab9626b0 2 API calls 91552->91553 91556 7ff7ab946f6c 91553->91556 91554 7ff7ab94722d 91557 7ff7ab94728a 91554->91557 91568 7ff7ab963900 00007FF8B9F61310 00007FF8C610F020 91554->91568 91556->91554 91558 7ff7ab947199 00007FF8B9F61310 91556->91558 91557->91548 91559 7ff7ab9471b8 91558->91559 91560 7ff7ab947224 00007FF8C610F020 91558->91560 91559->91560 91560->91554 91561->91545 91563 7ff7ab9627ac 91562->91563 91564 7ff7ab9626d2 91562->91564 91563->91552 91564->91563 91565 7ff7ab96271a 00007FF8B9F61310 91564->91565 91566 7ff7ab9627a3 00007FF8C610F020 91565->91566 91567 7ff7ab962736 91565->91567 91566->91563 91567->91566 91568->91557 91570 7ff7ab9977cb 91569->91570 91572 7ff7ab9977c4 91569->91572 91571 7ff7ab997c90 00007FF8C610F020 91570->91571 91571->91572 91572->91380 91573->91364 91574->91389 91575->91392 91576->91379 91577->91402 91578->91407 91580 7ff7ab990344 91579->91580 91581 7ff7ab99039b GetClientRect QueryPerformanceCounter 91580->91581 91582 7ff7ab990445 GetForegroundWindow 91581->91582 91583 7ff7ab99042b 91581->91583 91584 7ff7ab9904df 91582->91584 91585 7ff7ab990457 91582->91585 91583->91582 91586 7ff7ab990526 91584->91586 91589 7ff7ab9904f8 GetKeyState 91584->91589 91587 7ff7ab990460 ClientToScreen 91585->91587 91591 7ff7ab990495 91585->91591 91590 7ff7ab99056d 91586->91590 91596 7ff7ab99053f GetKeyState 91586->91596 91587->91591 91592 7ff7ab990487 SetCursorPos 91587->91592 91588 7ff7ab9904a4 GetCursorPos 91588->91584 91593 7ff7ab9904b3 ScreenToClient 91588->91593 91589->91586 91595 7ff7ab99050a 91589->91595 91594 7ff7ab9905b4 91590->91594 91598 7ff7ab990586 GetKeyState 91590->91598 91591->91584 91591->91588 91592->91591 91593->91584 91597 7ff7ab9904c5 91593->91597 91602 7ff7ab9905cd GetKeyState 91594->91602 91607 7ff7ab9905fb 91594->91607 91595->91586 91665 7ff7ab941f90 00007FF8C610F020 91595->91665 91596->91590 91599 7ff7ab990551 91596->91599 91664 7ff7ab942260 00007FF8C610F020 91597->91664 91598->91594 91601 7ff7ab990598 91598->91601 91599->91590 91666 7ff7ab941f90 00007FF8C610F020 91599->91666 91601->91594 91667 7ff7ab941f90 00007FF8C610F020 91601->91667 91605 7ff7ab9905df 91602->91605 91602->91607 91605->91607 91668 7ff7ab941f90 00007FF8C610F020 91605->91668 91606 7ff7ab990625 91614 7ff7ab98fce0 91606->91614 91607->91606 91669 7ff7ab98fb70 LoadCursorA SetCursor SetCursor 91607->91669 91613 7ff7ab949e10 75 API calls 91613->91438 91615 7ff7ab98fd07 91614->91615 91617 7ff7ab98fdd3 91615->91617 91663 7ff7ab990301 91615->91663 91670 7ff7ab941f90 00007FF8C610F020 91615->91670 91618 7ff7ab98fe0a 91617->91618 91671 7ff7ab941f90 00007FF8C610F020 91617->91671 91621 7ff7ab98fe41 91618->91621 91672 7ff7ab941f90 00007FF8C610F020 91618->91672 91622 7ff7ab98fe79 91621->91622 91673 7ff7ab941f90 00007FF8C610F020 91621->91673 91625 7ff7ab98feae 91622->91625 91674 7ff7ab941f90 00007FF8C610F020 91622->91674 91627 7ff7ab98fee6 91625->91627 91675 7ff7ab941f90 00007FF8C610F020 91625->91675 91629 7ff7ab98ff1c 91627->91629 91676 7ff7ab941f90 00007FF8C610F020 91627->91676 91631 7ff7ab98ff53 91629->91631 91677 7ff7ab941f90 00007FF8C610F020 91629->91677 91632 7ff7ab98ff86 91631->91632 91678 7ff7ab941f90 00007FF8C610F020 91631->91678 91637 7ff7ab98ffbc 91632->91637 91679 7ff7ab941f90 00007FF8C610F020 91632->91679 91634 7ff7ab990025 91682 7ff7ab941f90 00007FF8C610F020 91634->91682 91635 7ff7ab98fff8 91635->91634 91681 7ff7ab941f90 00007FF8C610F020 91635->91681 91637->91635 91680 7ff7ab941f90 00007FF8C610F020 91637->91680 91641 7ff7ab990070 91683 7ff7ab941f90 00007FF8C610F020 91641->91683 91643 7ff7ab99010d 91686 7ff7ab941f90 00007FF8C610F020 91643->91686 91644 7ff7ab9900a9 91646 7ff7ab9900dd 91644->91646 91684 7ff7ab941f90 00007FF8C610F020 91644->91684 91646->91643 91685 7ff7ab941f90 00007FF8C610F020 91646->91685 91649 7ff7ab990151 91687 7ff7ab941f90 00007FF8C610F020 91649->91687 91651 7ff7ab990195 91688 7ff7ab941f90 00007FF8C610F020 91651->91688 91653 7ff7ab9901d0 91689 7ff7ab941f90 00007FF8C610F020 91653->91689 91655 7ff7ab99020b 91690 7ff7ab941f90 00007FF8C610F020 91655->91690 91657 7ff7ab990246 91691 7ff7ab941f90 00007FF8C610F020 91657->91691 91659 7ff7ab990281 91692 7ff7ab941f90 00007FF8C610F020 91659->91692 91661 7ff7ab9902c2 91693 7ff7ab941f90 00007FF8C610F020 91661->91693 91663->91613 91664->91584 91665->91586 91666->91590 91667->91594 91668->91607 91669->91606 91670->91617 91671->91618 91672->91621 91673->91622 91674->91625 91675->91627 91676->91629 91677->91631 91678->91632 91679->91637 91680->91635 91681->91634 91682->91641 91683->91644 91684->91646 91685->91643 91686->91649 91687->91651 91688->91653 91689->91655 91690->91657 91691->91659 91692->91661 91693->91663 91695 7ff7ab9926e5 91694->91695 91770 7ff7ab9926de 91694->91770 91804 7ff7ab9932e0 91695->91804 91697 7ff7ab9927a4 91808 7ff7ab9931c0 91697->91808 91699 7ff7ab9927db 91700 7ff7ab992805 GetModuleHandleA 91699->91700 91701 7ff7ab992831 91700->91701 91702 7ff7ab992865 91700->91702 91703 7ff7ab997c90 00007FF8C610F020 91701->91703 91705 7ff7ab992872 GetProcAddress 91702->91705 91704 7ff7ab992847 91703->91704 91707 7ff7ab997c90 00007FF8C610F020 91704->91707 91706 7ff7ab997c90 00007FF8C610F020 91705->91706 91708 7ff7ab9928b5 91706->91708 91711 7ff7ab992852 91707->91711 91709 7ff7ab997c90 00007FF8C610F020 91708->91709 91710 7ff7ab9928c0 91709->91710 91710->91711 91812 7ff7ab992150 91711->91812 91714 7ff7ab997c90 00007FF8C610F020 91715 7ff7ab99298a VirtualAlloc 91714->91715 91717 7ff7ab992b69 91715->91717 91718 7ff7ab992b4c 91715->91718 91826 7ff7ab993520 91717->91826 91719 7ff7ab997b60 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 91718->91719 91719->91770 91721 7ff7ab992bc9 91830 7ff7ab993400 91721->91830 91723 7ff7ab992c03 91724 7ff7ab992c33 GetModuleHandleA 91723->91724 91725 7ff7ab992c5f 91724->91725 91726 7ff7ab992c99 91724->91726 91727 7ff7ab997c90 00007FF8C610F020 91725->91727 91729 7ff7ab992ca9 GetProcAddress 91726->91729 91728 7ff7ab992c78 91727->91728 91730 7ff7ab997c90 00007FF8C610F020 91728->91730 91731 7ff7ab997c90 00007FF8C610F020 91729->91731 91732 7ff7ab992c86 91730->91732 91733 7ff7ab992cef 91731->91733 91834 7ff7ab993760 91732->91834 91734 7ff7ab997c90 00007FF8C610F020 91733->91734 91735 7ff7ab992cfd 91734->91735 91735->91732 91737 7ff7ab992d6a 91838 7ff7ab993640 91737->91838 91739 7ff7ab992da4 91740 7ff7ab992dd4 GetModuleHandleA 91739->91740 91741 7ff7ab992e00 91740->91741 91742 7ff7ab992e3a 91740->91742 91743 7ff7ab997c90 00007FF8C610F020 91741->91743 91745 7ff7ab992e4a GetProcAddress 91742->91745 91744 7ff7ab992e19 91743->91744 91746 7ff7ab997c90 00007FF8C610F020 91744->91746 91747 7ff7ab997c90 00007FF8C610F020 91745->91747 91751 7ff7ab992e27 91746->91751 91748 7ff7ab992e90 91747->91748 91749 7ff7ab997c90 00007FF8C610F020 91748->91749 91750 7ff7ab992e9e 91749->91750 91750->91751 91842 7ff7ab9939b0 91751->91842 91753 7ff7ab993014 91846 7ff7ab993890 91753->91846 91755 7ff7ab99304e 91756 7ff7ab99307e GetModuleHandleA 91755->91756 91757 7ff7ab9930e4 91756->91757 91758 7ff7ab9930aa 91756->91758 91761 7ff7ab9930f4 GetProcAddress 91757->91761 91759 7ff7ab997c90 00007FF8C610F020 91758->91759 91760 7ff7ab9930c3 91759->91760 91762 7ff7ab997c90 00007FF8C610F020 91760->91762 91763 7ff7ab997c90 00007FF8C610F020 91761->91763 91764 7ff7ab9930d1 91762->91764 91765 7ff7ab99313a 91763->91765 91766 7ff7ab993159 CreateThread 91764->91766 91767 7ff7ab997c90 00007FF8C610F020 91765->91767 91850 7ff7ab997b60 91766->91850 91769 7ff7ab993148 91767->91769 91769->91766 91770->91445 91772 7ff7ab9703fd 91771->91772 91773 7ff7ab9702d5 91771->91773 91772->91465 91773->91772 91884 7ff7ab975fa0 91773->91884 91776 7ff7ab959317 91775->91776 91777 7ff7ab959340 91775->91777 91909 7ff7ab963fb0 00007FF8B9F61310 00007FF8C610F020 91776->91909 91779 7ff7ab97f580 91777->91779 91780 7ff7ab97f5df 91779->91780 91781 7ff7ab97f5c3 __swprintf_l 91779->91781 91780->91491 91910 7ff7ab97eed0 91781->91910 91784 7ff7ab9832f7 91783->91784 91933 7ff7ab986090 91784->91933 91786 7ff7ab983352 91786->91505 91788 7ff7ab99bb3f Concurrency::cancel_current_task 91787->91788 91789 7ff7ab994ed0 91788->91789 91790 7ff7ab99b808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 91788->91790 91789->91510 91799 7ff7ab99a100 00007FF8C610F020 91789->91799 91790->91789 91792 7ff7ab952bc3 91791->91792 91794 7ff7ab952ca0 91792->91794 91798 7ff7ab952e24 91792->91798 92161 7ff7ab97e910 46 API calls 91792->92161 91796 7ff7ab952d12 91794->91796 92162 7ff7ab960d50 00007FF8B9F61310 00007FF8C610F020 91794->92162 91796->91798 92163 7ff7ab9580d0 46 API calls 91796->92163 91798->91503 91799->91510 91800->91489 91801->91495 91802->91504 91803->91496 91805 7ff7ab99335f 91804->91805 91807 7ff7ab99336b 91804->91807 91854 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91805->91854 91807->91697 91809 7ff7ab99323f 91808->91809 91811 7ff7ab99324b 91808->91811 91855 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91809->91855 91811->91699 91815 7ff7ab9921bb Concurrency::details::ResourceManager::CreateNodeTopology 91812->91815 91813 7ff7ab997c90 00007FF8C610F020 91814 7ff7ab9922d7 91813->91814 91816 7ff7ab9977a0 00007FF8C610F020 91814->91816 91815->91813 91817 7ff7ab99230c 91816->91817 91818 7ff7ab997c90 00007FF8C610F020 91817->91818 91824 7ff7ab992319 91818->91824 91819 7ff7ab992674 91820 7ff7ab997b60 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 91819->91820 91822 7ff7ab9926a1 91820->91822 91821 7ff7ab99252c 91821->91819 91823 7ff7ab998c80 2 API calls 91821->91823 91822->91714 91823->91821 91824->91821 91856 7ff7ab998c80 91824->91856 91827 7ff7ab99359f 91826->91827 91829 7ff7ab9935ab 91826->91829 91878 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91827->91878 91829->91721 91831 7ff7ab99347f 91830->91831 91833 7ff7ab99348b 91830->91833 91879 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91831->91879 91833->91723 91835 7ff7ab9937e9 91834->91835 91837 7ff7ab9937f5 91834->91837 91880 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91835->91880 91837->91737 91839 7ff7ab9936bf 91838->91839 91841 7ff7ab9936cb 91838->91841 91881 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91839->91881 91841->91739 91843 7ff7ab993a2f 91842->91843 91845 7ff7ab993a3b 91842->91845 91882 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91843->91882 91845->91753 91847 7ff7ab99390f 91846->91847 91849 7ff7ab99391b 91846->91849 91883 7ff7ab99b87c RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 91847->91883 91849->91755 91851 7ff7ab997bca Concurrency::details::ResourceManager::CreateNodeTopology 91850->91851 91852 7ff7ab99b808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 91851->91852 91853 7ff7ab997c5a 91851->91853 91852->91853 91853->91770 91857 7ff7ab998cd7 91856->91857 91859 7ff7ab998cb9 91856->91859 91860 7ff7ab99a4b0 91857->91860 91859->91824 91861 7ff7ab99a5bb 91860->91861 91862 7ff7ab99a719 91861->91862 91863 7ff7ab99a73b 91861->91863 91875 7ff7ab99b2b0 00007FF8B9F61310 91862->91875 91876 7ff7ab99b2b0 00007FF8B9F61310 91863->91876 91866 7ff7ab99a75a 91877 7ff7ab99b2b0 00007FF8B9F61310 91866->91877 91868 7ff7ab99a738 91871 7ff7ab99aba0 91868->91871 91873 7ff7ab99ac19 Concurrency::details::ResourceManager::CreateNodeTopology 91871->91873 91872 7ff7ab99a7b3 91872->91859 91873->91872 91874 7ff7ab99b808 Concurrency::details::ResourceManager::CreateNodeTopology 00007FF8C610F020 91873->91874 91874->91872 91875->91868 91876->91866 91877->91868 91885 7ff7ab975fe9 91884->91885 91887 7ff7ab9761e2 91885->91887 91888 7ff7ab96d8d0 91885->91888 91887->91772 91889 7ff7ab96d900 91888->91889 91892 7ff7ab96d929 91888->91892 91889->91892 91908 7ff7ab96d3b0 00007FF8B9F61310 00007FF8C610F020 91889->91908 91890 7ff7ab96d995 91891 7ff7ab96d9d5 91890->91891 91902 7ff7ab9639e0 91890->91902 91891->91887 91892->91890 91896 7ff7ab963730 91892->91896 91897 7ff7ab963749 91896->91897 91899 7ff7ab9637fd 91896->91899 91898 7ff7ab96376b 00007FF8B9F61310 91897->91898 91897->91899 91900 7ff7ab963787 91898->91900 91901 7ff7ab9637f4 00007FF8C610F020 91898->91901 91899->91890 91900->91901 91901->91899 91903 7ff7ab9639f9 91902->91903 91905 7ff7ab963aa6 91902->91905 91904 7ff7ab963a19 00007FF8B9F61310 91903->91904 91903->91905 91906 7ff7ab963a9d 00007FF8C610F020 91904->91906 91907 7ff7ab963a30 91904->91907 91905->91891 91906->91905 91907->91906 91908->91892 91909->91777 91911 7ff7ab97ef0f 91910->91911 91914 7ff7ab97f1d4 91910->91914 91912 7ff7ab97efcf 91911->91912 91913 7ff7ab97f345 91911->91913 91912->91914 91929 7ff7ab943e40 8 API calls 91912->91929 91913->91914 91917 7ff7ab9441c0 91913->91917 91914->91780 91920 7ff7ab944201 91917->91920 91918 7ff7ab9444ce 91918->91914 91919 7ff7ab94431b 91919->91918 91923 7ff7ab9443c9 91919->91923 91930 7ff7ab960a40 00007FF8B9F61310 00007FF8C610F020 91919->91930 91920->91918 91920->91919 91922 7ff7ab975fa0 6 API calls 91920->91922 91922->91919 91927 7ff7ab9443fa 91923->91927 91931 7ff7ab960a80 00007FF8B9F61310 00007FF8C610F020 91923->91931 91925 7ff7ab9444ac 91925->91918 91932 7ff7ab960a80 00007FF8B9F61310 00007FF8C610F020 91925->91932 91926 7ff7ab960a40 00007FF8B9F61310 00007FF8C610F020 91926->91927 91927->91925 91927->91926 91929->91912 91930->91923 91931->91927 91932->91918 91934 7ff7ab986116 91933->91934 92038 7ff7ab98659a 91933->92038 91935 7ff7ab9861ab 91934->91935 92099 7ff7ab959590 00007FF8B9F61310 00007FF8C610F020 91934->92099 92082 7ff7ab954590 91935->92082 91938 7ff7ab9861b6 91939 7ff7ab986383 91938->91939 91940 7ff7ab986645 91938->91940 92100 7ff7ab958cd0 20 API calls 91939->92100 91941 7ff7ab9865d5 91940->91941 92108 7ff7ab958cd0 20 API calls 91940->92108 91941->92038 92086 7ff7ab948da0 91941->92086 91944 7ff7ab986595 92107 7ff7ab9596f0 9 API calls 91944->92107 91947 7ff7ab9863c9 91947->91944 92101 7ff7ab963190 00007FF8B9F61310 00007FF8C610F020 91947->92101 91949 7ff7ab9864a9 92102 7ff7ab943b10 00007FF8B9F61310 00007FF8C610F020 91949->92102 91951 7ff7ab9864d4 92103 7ff7ab943b10 00007FF8B9F61310 00007FF8C610F020 91951->92103 91953 7ff7ab9864e7 92104 7ff7ab963050 00007FF8B9F61310 00007FF8C610F020 91953->92104 91954 7ff7ab9866a3 91958 7ff7ab954590 2 API calls 91954->91958 91959 7ff7ab9867d0 91954->91959 91956 7ff7ab98652b 92105 7ff7ab94cb20 12 API calls __swprintf_l 91956->92105 91958->91959 91960 7ff7ab954590 2 API calls 91959->91960 91963 7ff7ab9867ff 91959->91963 91960->91963 91961 7ff7ab98656a 91961->91941 91962 7ff7ab986590 91961->91962 92106 7ff7ab94cd70 46 API calls 91962->92106 91980 7ff7ab9869f3 91963->91980 92109 7ff7ab985f80 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 91963->92109 91966 7ff7ab986934 00007FF8B9F61310 91969 7ff7ab98694e 91966->91969 91968 7ff7ab9869ba 00007FF8B9F61310 91968->91980 91969->91968 92111 7ff7ab963900 00007FF8B9F61310 00007FF8C610F020 91969->92111 91970 7ff7ab9868e2 91970->91966 91970->91969 92110 7ff7ab963900 00007FF8B9F61310 00007FF8C610F020 91970->92110 91971 7ff7ab986bb6 92113 7ff7ab95c0e0 6 API calls 91971->92113 91975 7ff7ab98692d 91975->91966 91977 7ff7ab986bc0 92114 7ff7ab953320 12 API calls 91977->92114 91981 7ff7ab986bca 91980->91981 92112 7ff7ab9487d0 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 91980->92112 91982 7ff7ab986e0c 91981->91982 92115 7ff7ab948950 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 91981->92115 92003 7ff7ab986f6d 91982->92003 92116 7ff7ab9634e0 00007FF8B9F61310 00007FF8C610F020 91982->92116 91984 7ff7ab9888aa 92139 7ff7ab985810 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 91984->92139 91985 7ff7ab988fcf 92001 7ff7ab989044 91985->92001 92145 7ff7ab9453e0 11 API calls 91985->92145 91987 7ff7ab9876e2 92008 7ff7ab9876fc 91987->92008 92121 7ff7ab9551f0 6 API calls 91987->92121 91988 7ff7ab9875d8 91988->91987 92060 7ff7ab987e74 91988->92060 92120 7ff7ab9551f0 6 API calls 91988->92120 91991 7ff7ab98892f 91994 7ff7ab9888ef 91991->91994 92140 7ff7ab9858e0 8 API calls 91991->92140 92000 7ff7ab9889fd 91994->92000 92046 7ff7ab988d34 91994->92046 92141 7ff7ab9551f0 6 API calls 91994->92141 91997 7ff7ab98900b 92146 7ff7ab945150 9 API calls 91997->92146 91999 7ff7ab988af2 00007FF8B9F61310 92037 7ff7ab988b1a 91999->92037 92000->91999 92000->92046 92142 7ff7ab963900 00007FF8B9F61310 00007FF8C610F020 92000->92142 92032 7ff7ab989143 92001->92032 92051 7ff7ab989343 92001->92051 92002 7ff7ab9875a5 92002->91988 92010 7ff7ab9639e0 2 API calls 92002->92010 92003->91988 92012 7ff7ab9874ba 92003->92012 92117 7ff7ab9551f0 6 API calls 92003->92117 92006 7ff7ab98783f 92014 7ff7ab987896 92006->92014 92123 7ff7ab9551f0 6 API calls 92006->92123 92008->92006 92122 7ff7ab9551f0 6 API calls 92008->92122 92009 7ff7ab987461 92009->92012 92118 7ff7ab985bb0 8 API calls 92009->92118 92010->91988 92012->91988 92012->92002 92119 7ff7ab985bb0 8 API calls 92012->92119 92013 7ff7ab987944 92024 7ff7ab98795e 92013->92024 92125 7ff7ab9551f0 6 API calls 92013->92125 92014->92013 92124 7ff7ab9551f0 6 API calls 92014->92124 92017 7ff7ab989ff0 92017->92038 92154 7ff7ab943e40 8 API calls 92017->92154 92019 7ff7ab989e42 92019->92017 92023 7ff7ab989f05 92019->92023 92151 7ff7ab960a40 00007FF8B9F61310 00007FF8C610F020 92019->92151 92152 7ff7ab960a80 00007FF8B9F61310 00007FF8C610F020 92023->92152 92031 7ff7ab987a72 92024->92031 92126 7ff7ab9551f0 6 API calls 92024->92126 92025 7ff7ab989e11 92150 7ff7ab9596f0 9 API calls 92025->92150 92029 7ff7ab989e28 92029->92019 92034 7ff7ab954590 2 API calls 92029->92034 92039 7ff7ab987b19 92031->92039 92127 7ff7ab9551f0 6 API calls 92031->92127 92033 7ff7ab975fa0 6 API calls 92032->92033 92036 7ff7ab98933e 92032->92036 92033->92036 92034->92019 92036->92019 92149 7ff7ab94cd70 46 API calls 92036->92149 92037->92046 92143 7ff7ab985110 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 92037->92143 92038->91786 92052 7ff7ab987b33 92039->92052 92128 7ff7ab9551f0 6 API calls 92039->92128 92043 7ff7ab989fd9 92153 7ff7ab960a80 00007FF8B9F61310 00007FF8C610F020 92043->92153 92044 7ff7ab989a47 92048 7ff7ab989bfb 92044->92048 92049 7ff7ab975fa0 6 API calls 92044->92049 92046->91985 92144 7ff7ab948950 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 92046->92144 92047 7ff7ab989f2e 92047->92043 92050 7ff7ab960a40 00007FF8B9F61310 00007FF8C610F020 92047->92050 92048->92036 92148 7ff7ab96fd50 9 API calls 92048->92148 92049->92048 92050->92047 92051->92044 92147 7ff7ab96ffb0 9 API calls 92051->92147 92055 7ff7ab987c87 92052->92055 92129 7ff7ab9551f0 6 API calls 92052->92129 92057 7ff7ab987dcb 92055->92057 92130 7ff7ab9551f0 6 API calls 92055->92130 92059 7ff7ab987e36 92057->92059 92131 7ff7ab9551f0 6 API calls 92057->92131 92059->92060 92061 7ff7ab98875b 92059->92061 92062 7ff7ab9882c8 92059->92062 92060->91984 92060->91991 92060->91994 92060->92046 92061->92060 92138 7ff7ab985bb0 8 API calls 92061->92138 92062->92060 92064 7ff7ab9885c4 92062->92064 92071 7ff7ab98837e 92062->92071 92064->92060 92065 7ff7ab9886fb 92064->92065 92066 7ff7ab9886dc 92064->92066 92137 7ff7ab983f20 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 92065->92137 92136 7ff7ab983f20 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 92066->92136 92070 7ff7ab98852b 00007FF8C610F020 92070->92060 92071->92060 92072 7ff7ab988450 92071->92072 92074 7ff7ab988437 00007FF8B9F61310 92071->92074 92072->92070 92073 7ff7ab9884e7 92072->92073 92075 7ff7ab9884f1 92072->92075 92076 7ff7ab9884d9 92072->92076 92134 7ff7ab9838d0 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8B9F61310 92073->92134 92074->92071 92133 7ff7ab983f20 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 92075->92133 92132 7ff7ab983f20 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 92076->92132 92080 7ff7ab988516 92080->92070 92135 7ff7ab985110 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 00007FF8B9F61310 92080->92135 92083 7ff7ab9545ae 92082->92083 92085 7ff7ab954601 92083->92085 92155 7ff7ab962320 00007FF8B9F61310 00007FF8C610F020 92083->92155 92085->91938 92087 7ff7ab948df1 92086->92087 92097 7ff7ab948e71 92086->92097 92087->92097 92156 7ff7ab96feb0 9 API calls 92087->92156 92089 7ff7ab949059 92090 7ff7ab949066 92089->92090 92093 7ff7ab9490ac 92089->92093 92091 7ff7ab948fb7 92090->92091 92158 7ff7ab948950 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 92090->92158 92091->91954 92093->92091 92159 7ff7ab949280 15 API calls 92093->92159 92095 7ff7ab9490ff 92160 7ff7ab96feb0 9 API calls 92095->92160 92097->92089 92097->92091 92157 7ff7ab95a780 46 API calls 92097->92157 92099->91935 92100->91947 92101->91949 92102->91951 92103->91953 92104->91956 92105->91961 92106->91944 92107->92038 92108->91941 92109->91970 92110->91975 92111->91968 92112->91971 92113->91977 92114->91981 92115->91982 92116->92003 92117->92009 92118->92012 92119->92012 92120->91987 92121->92008 92122->92006 92123->92014 92124->92013 92125->92024 92126->92031 92127->92039 92128->92052 92129->92055 92130->92057 92131->92059 92132->92073 92133->92073 92134->92080 92135->92070 92136->92060 92137->92060 92138->92060 92139->91994 92140->91994 92141->92000 92142->91999 92143->92046 92144->91985 92145->91997 92146->92001 92147->92051 92148->92036 92149->92025 92150->92029 92151->92023 92152->92047 92153->92017 92154->92038 92155->92085 92156->92097 92157->92089 92158->92091 92159->92095 92160->92091 92161->91794 92162->91796 92163->91798 92165 7ff7ab94bc62 92164->92165 92166 7ff7ab94bdb5 92165->92166 92169 7ff7ab952ba0 46 API calls 92165->92169 92170 7ff7ab94bdc8 92165->92170 92190 7ff7ab94c1ec 92165->92190 92224 7ff7ab94cd70 46 API calls 92165->92224 92166->92170 92225 7ff7ab9580d0 46 API calls 92166->92225 92169->92165 92226 7ff7ab9587d0 49 API calls 92170->92226 92172 7ff7ab94becf 92175 7ff7ab94bf2e 92172->92175 92227 7ff7ab961f40 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 printf 92172->92227 92173 7ff7ab952ba0 46 API calls 92176 7ff7ab94bf96 92173->92176 92175->92173 92181 7ff7ab94bfae 92176->92181 92228 7ff7ab960500 46 API calls 92176->92228 92178 7ff7ab94c076 92231 7ff7ab9494d0 12 API calls 92178->92231 92180 7ff7ab94c095 92182 7ff7ab94c0bc 92180->92182 92232 7ff7ab963400 00007FF8B9F61310 00007FF8C610F020 92180->92232 92181->92178 92187 7ff7ab94c041 92181->92187 92229 7ff7ab9608d0 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 00007FF8B9F61310 00007FF8C610F020 92181->92229 92233 7ff7ab963400 00007FF8B9F61310 00007FF8C610F020 92182->92233 92186 7ff7ab94c11a 92186->92190 92192 7ff7ab9639e0 2 API calls 92186->92192 92187->92178 92230 7ff7ab95a780 46 API calls 92187->92230 92188 7ff7ab94c0d5 92188->92186 92234 7ff7ab94b200 00007FF8C61149A0 00007FF8B9F61310 00007FF8C610F020 92188->92234 92190->91524 92193 7ff7ab94c240 92190->92193 92192->92190 92194 7ff7ab94c254 92193->92194 92195 7ff7ab94bc50 51 API calls 92194->92195 92201 7ff7ab94c283 92194->92201 92195->92201 92196 7ff7ab94c414 92237 7ff7ab94b850 12 API calls 92196->92237 92198 7ff7ab94c419 92203 7ff7ab94c4ac 92198->92203 92238 7ff7ab94b310 9 API calls 92198->92238 92199 7ff7ab963400 00007FF8B9F61310 00007FF8C610F020 92199->92201 92201->92196 92201->92199 92211 7ff7ab94c6ba 92201->92211 92235 7ff7ab949280 15 API calls 92201->92235 92236 7ff7ab970e30 00007FF8B9F61310 00007FF8C610F020 92201->92236 92205 7ff7ab94c4d4 92203->92205 92239 7ff7ab94b310 9 API calls 92203->92239 92204 7ff7ab94c4fc 92215 7ff7ab94c524 92204->92215 92241 7ff7ab9457a0 15 API calls 92204->92241 92205->92204 92240 7ff7ab94b310 9 API calls 92205->92240 92209 7ff7ab94c598 00007FF8B9F61310 92209->92215 92211->91521 92213 7ff7ab963400 00007FF8B9F61310 00007FF8C610F020 92213->92215 92215->92209 92215->92211 92215->92213 92242 7ff7ab949280 15 API calls 92215->92242 92243 7ff7ab970e30 00007FF8B9F61310 00007FF8C610F020 92215->92243 92218 7ff7ab98ea84 92216->92218 92219 7ff7ab98ec57 92216->92219 92217 7ff7ab98ed5f 00007FF8B9F61310 92217->92218 92217->92219 92218->92217 92218->92219 92219->91524 92221 7ff7ab993b29 92220->92221 92244 7ff7ab98f630 92221->92244 92224->92165 92225->92170 92226->92172 92227->92175 92228->92181 92229->92187 92230->92178 92231->92180 92232->92182 92233->92188 92234->92188 92235->92201 92236->92201 92237->92198 92238->92198 92239->92205 92240->92204 92241->92215 92242->92215 92243->92215 92245 7ff7ab98f640 92244->92245 92247 7ff7ab98f657 92244->92247 92245->92247 92248 7ff7ab98f2f0 92245->92248 92247->91522 92249 7ff7ab98f313 92248->92249 92256 7ff7ab971770 92249->92256 92251 7ff7ab98f36a 92252 7ff7ab98f583 92251->92252 92253 7ff7ab98f4b0 00007FF8B9F61310 92251->92253 92255 7ff7ab98f4d3 92251->92255 92252->92247 92253->92253 92253->92255 92254 7ff7ab98f57a 00007FF8C610F020 92254->92252 92255->92252 92255->92254 92257 7ff7ab971930 92256->92257 92260 7ff7ab9717a6 92256->92260 92257->92251 92258 7ff7ab97190a 92267 7ff7ab9725f0 92258->92267 92260->92257 92260->92258 92262 7ff7ab9721b0 92260->92262 92263 7ff7ab9721e2 92262->92263 92315 7ff7ab971ec0 92263->92315 92271 7ff7ab972628 92267->92271 92268 7ff7ab9726a8 92269 7ff7ab9726cf 92268->92269 92350 7ff7ab9723a0 00007FF8B9F61310 00007FF8C610F020 92268->92350 92326 7ff7ab971620 92269->92326 92271->92268 92349 7ff7ab9723a0 00007FF8B9F61310 00007FF8C610F020 92271->92349 92274 7ff7ab972d86 92277 7ff7ab972dc3 92274->92277 92352 7ff7ab9410a0 00007FF8C610F020 92274->92352 92276 7ff7ab972e3b 00007FF8C610F020 92290 7ff7ab972e48 92276->92290 92277->92276 92277->92290 92278 7ff7ab963fb0 00007FF8B9F61310 00007FF8C610F020 92279 7ff7ab9726f0 92278->92279 92279->92274 92279->92278 92285 7ff7ab972a52 92279->92285 92292 7ff7ab972c52 92279->92292 92280 7ff7ab963fb0 00007FF8B9F61310 00007FF8C610F020 92280->92292 92281 7ff7ab973f7c 00007FF8C610F020 92289 7ff7ab973f85 92281->92289 92283 7ff7ab97400b 92283->92257 92284 7ff7ab974002 00007FF8C610F020 92284->92283 92285->92281 92285->92289 92286 7ff7ab9734c7 92336 7ff7ab974020 92286->92336 92289->92283 92289->92284 92332 7ff7ab96baf0 92290->92332 92292->92274 92292->92280 92351 7ff7ab9410a0 00007FF8C610F020 92292->92351 92293 7ff7ab9734d6 92297 7ff7ab97354d 92293->92297 92353 7ff7ab9650e0 00007FF8C61149A0 00007FF8C61149A0 92293->92353 92295 7ff7ab9738eb 00007FF8C610F020 92299 7ff7ab9738fe 00007FF8C610F020 92295->92299 92300 7ff7ab97397b 92295->92300 92296 7ff7ab97387c 92296->92295 92298 7ff7ab9737f1 00007FF8C610F020 92297->92298 92345 7ff7ab96c270 92297->92345 92298->92295 92298->92296 92299->92300 92306 7ff7ab973d0e 92300->92306 92314 7ff7ab973cc4 92300->92314 92354 7ff7ab974e50 00007FF8C610F020 00007FF8C610F020 92300->92354 92355 7ff7ab9757b0 00007FF8B9F61310 00007FF8C610F020 92300->92355 92303 7ff7ab973dc9 92356 7ff7ab974a70 7 API calls 92303->92356 92304 7ff7ab973dbb 00007FF8C610F020 92304->92303 92306->92303 92306->92304 92307 7ff7ab973e4b 00007FF8C610F020 92310 7ff7ab973e54 92307->92310 92308 7ff7ab973dd1 92308->92307 92308->92310 92309 7ff7ab973ecd 00007FF8C610F020 92309->92285 92310->92285 92310->92309 92312 7ff7ab9412b0 00007FF8C610F020 92312->92314 92314->92306 92314->92312 92316 7ff7ab971f23 92315->92316 92319 7ff7ab972016 92316->92319 92323 7ff7ab9773d0 00007FF8B9F61310 92316->92323 92325 7ff7ab971d00 7 API calls 92319->92325 92320 7ff7ab972191 00007FF8C610F020 92320->92258 92321 7ff7ab971fcf 92321->92319 92324 7ff7ab9773d0 00007FF8B9F61310 92321->92324 92323->92321 92324->92321 92325->92320 92329 7ff7ab971633 92326->92329 92327 7ff7ab9716c3 00007FF8C610F020 92331 7ff7ab9716cc 92327->92331 92328 7ff7ab97174a 92328->92279 92329->92327 92329->92331 92330 7ff7ab971741 00007FF8C610F020 92330->92328 92331->92328 92331->92330 92334 7ff7ab96bb19 92332->92334 92333 7ff7ab96bbb1 92333->92286 92334->92333 92335 7ff7ab96bce8 00007FF8C610F020 92334->92335 92335->92333 92340 7ff7ab974047 92336->92340 92337 7ff7ab9741ed 92358 7ff7ab9650e0 00007FF8C61149A0 00007FF8C61149A0 92337->92358 92338 7ff7ab9741c0 92357 7ff7ab9650e0 00007FF8C61149A0 00007FF8C61149A0 92338->92357 92340->92337 92340->92338 92342 7ff7ab9743a6 92342->92293 92343 7ff7ab97439d 00007FF8C610F020 92343->92342 92344 7ff7ab9741e8 92344->92342 92344->92343 92348 7ff7ab96c2e6 92345->92348 92346 7ff7ab96c8a1 92346->92297 92348->92346 92359 7ff7ab96b800 92348->92359 92349->92268 92350->92269 92351->92292 92352->92274 92353->92293 92354->92300 92355->92300 92356->92308 92357->92344 92358->92344 92360 7ff7ab96b855 92359->92360 92362 7ff7ab96b85a 92359->92362 92375 7ff7ab966c90 12 API calls 92360->92375 92365 7ff7ab96ba30 00007FF8C610F020 92362->92365 92366 7ff7ab96b620 92362->92366 92365->92348 92367 7ff7ab96b1e0 00007FF8C610F020 00007FF8C610F020 92366->92367 92368 7ff7ab96b681 92367->92368 92369 7ff7ab96b7e0 92368->92369 92370 7ff7ab96a7a0 00007FF8C610F020 00007FF8C610F020 00007FF8C610F020 92368->92370 92369->92365 92374 7ff7ab96b6e8 00007FF8C610F020 92370->92374 92372 7ff7ab96b7d7 00007FF8C610F020 92372->92369 92373 7ff7ab96b777 92373->92372 92374->92372 92374->92373 92375->92362 92377 7ff7ab99a0b8 92376->92377 92378 7ff7ab99a03a 92376->92378 92382 7ff7ab99a7d0 00007FF8C610F020 Concurrency::details::ResourceManager::CreateNodeTopology 92377->92382 92380 7ff7ab99a060 00007FF8B9F61310 92378->92380 92381 7ff7ab99a0ed 92380->92381 92381->91529 92382->92381 92390 7ff7ab991ab0 92383->92390 92385 7ff7ab998864 92385->91532 92388 7ff7ab99a2dc 92386->92388 92387 7ff7ab991ab0 00007FF8B7DF36D0 92387->92388 92388->92387 92389 7ff7ab998830 92388->92389 92389->91329 92394 7ff7ab99d168 92390->92394 92392 7ff7ab991ac3 00007FF8B7DF36D0 92393 7ff7ab991ad8 _Subatomic 92392->92393 92393->92385 92395 7ff7ab98f7a0 92396 7ff7ab98f7b6 92395->92396 92397 7ff7ab98f7fb QueryPerformanceFrequency 92396->92397 92398 7ff7ab98f811 QueryPerformanceCounter 92397->92398 92399 7ff7ab98fa2e 92397->92399 92398->92399 92400 7ff7ab98f827 92398->92400 92401 7ff7ab98f8cc GetKeyboardLayout GetLocaleInfoA 92400->92401 92404 7ff7ab98f936 92401->92404 92402 7ff7ab98f9c0 LoadLibraryA 92403 7ff7ab98f9ef GetProcAddress GetProcAddress 92402->92403 92402->92404 92404->92402 92405 7ff7ab98f9dc 92404->92405 92476 7ff7ab993b90 92477 7ff7ab993bcd 92476->92477 92478 7ff7ab993bd2 92477->92478 92479 7ff7ab993bf2 92477->92479 92480 7ff7ab993c9a PostQuitMessage 92477->92480 92481 7ff7ab993c24 92479->92481 92482 7ff7ab993bf9 92479->92482 92480->92478 92481->92478 92484 7ff7ab993b20 55 API calls 92481->92484 92483 7ff7ab993cbe 92482->92483 92487 7ff7ab993c11 92482->92487 92483->92478 92486 7ff7ab993ccd GetWindowRect 92483->92486 92484->92478 92485 7ff7ab993db1 NtdllDefWindowProc_A 92485->92478 92486->92478 92488 7ff7ab993d51 92486->92488 92487->92478 92487->92485 92488->92478 92489 7ff7ab993d76 SetWindowPos 92488->92489 92489->92478 92490 7ff7ab991b90 92493 7ff7ab991c2c 92490->92493 92491 7ff7ab991eef 92492 7ff7ab991dbb LoadLibraryA 92492->92493 92493->92491 92493->92492 92406 23830b6f46a 92423 23830b4c520 92406->92423 92408 23830b6f480 FindFirstFileA 92409 23830b6f4e9 type_info::_name_internal_method 92408->92409 92411 23830b6f4a4 92408->92411 92412 23830b6f559 type_info::_name_internal_method 92409->92412 92431 23830b6fe00 CreateToolhelp32Snapshot Process32NextW Process32NextW type_info::_name_internal_method 92409->92431 92425 23830c5b740 92412->92425 92414 23830b6f5ea 92415 23830b6f6c1 type_info::_name_internal_method 92414->92415 92416 23830b6f5fb type_info::_name_internal_method 92414->92416 92415->92411 92433 23830c0a1f0 4 API calls 4 library calls 92415->92433 92416->92411 92432 23830b6fe00 CreateToolhelp32Snapshot Process32NextW Process32NextW type_info::_name_internal_method 92416->92432 92419 23830b6f773 type_info::_name_internal_method 92419->92411 92434 23830c0acd0 7 API calls 4 library calls 92419->92434 92421 23830b6f82c type_info::_name_internal_method 92421->92411 92435 23830b6e2c0 CreateToolhelp32Snapshot Process32NextW Process32NextW Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 92421->92435 92424 23830b4c536 Concurrency::details::WorkQueue::IsStructuredEmpty 92423->92424 92424->92408 92426 23830c5b770 type_info::_name_internal_method 92425->92426 92436 23830c29e50 92426->92436 92428 23830c5b780 std::_Facet_Register type_info::_name_internal_method 92430 23830c5b797 type_info::_name_internal_method 92428->92430 92440 23830c57650 92428->92440 92430->92414 92431->92412 92432->92411 92433->92419 92434->92421 92435->92411 92437 23830c29e72 Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 92436->92437 92438 23830c29f5b CreateFileA 92437->92438 92439 23830c29f93 92438->92439 92439->92428 92441 23830c5767e Concurrency::details::WorkQueue::IsStructuredEmpty std::_Fac_node::_Fac_node type_info::_name_internal_method 92440->92441 92442 23830c29e50 CreateFileA 92441->92442 92443 23830c57793 92442->92443 92445 23830c577a0 type_info::_name_internal_method 92443->92445 92446 23830c2a3d0 92443->92446 92445->92430 92447 23830b4c520 Concurrency::details::WorkQueue::IsStructuredEmpty 92446->92447 92448 23830c2a3fc CreateFileA ReadFile 92447->92448 92449 23830c2a45f 92448->92449 92449->92445 92494 23830c07750 92495 23830c077a4 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 92494->92495 92496 23830c0788c CryptUnprotectData 92495->92496 92497 23830c078cd type_info::_name_internal_method 92496->92497 92498 23830c2a2f0 92499 23830b4c520 Concurrency::details::WorkQueue::IsStructuredEmpty 92498->92499 92500 23830c2a315 CreateFileA 92499->92500 92501 23830c2a355 type_info::_name_internal_method 92500->92501 92502 23830c29e50 CreateFileA 92501->92502 92503 23830c2a389 92502->92503 92504 23830c2a470 92505 23830c2a490 Concurrency::details::WorkQueue::IsStructuredEmpty 92504->92505 92506 23830c2a4bb CreateFileA ReadFile 92505->92506 92507 23830c2a525 type_info::_name_internal_method 92506->92507 92450 7ff7ab99bb9c 92451 7ff7ab99bbac 92450->92451 92459 7ff7ab99b96c 92451->92459 92454 7ff7ab99bc51 92455 7ff7ab99bbd0 Concurrency::details::ResourceManager::CreateNodeTopology _RTC_Initialize 92456 7ff7ab99bc1e 00007FF8C6121B20 92455->92456 92457 7ff7ab99bc2a 92455->92457 92456->92457 92458 7ff7ab99bc41 92457->92458 92464 7ff7ab99c0f8 7 API calls 92457->92464 92460 7ff7ab99b97d 92459->92460 92463 7ff7ab99b982 __scrt_release_startup_lock 92459->92463 92460->92463 92465 7ff7ab99c0f8 7 API calls 92460->92465 92462 7ff7ab99b9f6 92463->92455 92464->92454 92465->92462 92508 23830b46fe0 92509 23830b47001 Concurrency::details::WorkQueue::IsStructuredEmpty std::_Fac_node::_Fac_node 92508->92509 92510 23830b475bc CreateToolhelp32Snapshot 92509->92510 92511 23830b47633 Process32FirstW 92510->92511 92514 23830b475d7 type_info::_name_internal_method 92510->92514 92513 23830b47659 92511->92513 92511->92514 92512 23830b4779d Process32NextW 92512->92513 92512->92514 92513->92512 92513->92514 92466 23830c510e0 92474 23830b452b0 92466->92474 92468 23830c51106 CreateToolhelp32Snapshot 92469 23830c51122 92468->92469 92470 23830c51177 Process32NextW 92469->92470 92471 23830c51129 92469->92471 92470->92471 92473 23830c5119d Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 92470->92473 92472 23830c512d0 Process32NextW 92472->92471 92472->92473 92473->92472 92475 23830b452d2 Concurrency::details::_TaskCreationCallstack::_TaskCreationCallstack 92474->92475 92475->92468
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310$__swprintf_l
                                                      • String ID: !((flags & ImGuiInputTextFlags_CallbackCompletion) && (flags & ImGuiInputTextFlags_AllowTabInput))$!((flags & ImGuiInputTextFlags_CallbackHistory) && (flags & ImGuiInputTextFlags_Multiline))$#SCROLLY$%*s%.*s$@$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$apply_new_text_length <= buf_size$apply_new_text_length >= 0$buf != 0 && buf_size >= 0$buf[0] != 0$callback != 0$callback_data.Buf == callback_buf$callback_data.BufSize == state->BufCapacity$callback_data.BufTextLen == (int)strlen(callback_data.Buf)$callback_data.Flags == flags$font->ContainerAtlas->TexID == _CmdHeader.TextureId$g.DragDropActive || g.ActiveId == id || g.ActiveId == 0 || g.ActiveIdPreviousFrame == id || (g.CurrentMultiSelect != 0 && g.BoxSel$i >= 0 && i < Size$idx <= obj->TextLen$password_font->Glyphs.empty() && password_font->IndexAdvanceX.empty() && password_font->IndexLookup.empty()$state != 0$state && state->ID == id
                                                      • API String ID: 2185106832-4266151527
                                                      • Opcode ID: e9260e5b6a7379f04309f7b429d0ce31edeedb39023aba041657266198cd44f5
                                                      • Instruction ID: bfa0d1d0ebe5e11e62d4fe926a65e9d6d60073bddce0f4d8076c567dc4640622
                                                      • Opcode Fuzzy Hash: e9260e5b6a7379f04309f7b429d0ce31edeedb39023aba041657266198cd44f5
                                                      • Instruction Fuzzy Hash: CC930872A0A681CAE710EF79C0846B9B7A1FF49749F868235DA4C576B5CF3CE445C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: 0 && "stbtt_InitFont(): failed to parse FontData. It is correct and complete? Check FontDataSize."$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$atlas->ConfigData.Size > 0$cfg.DstFont && (!cfg.DstFont->IsLoaded() || cfg.DstFont->ContainerAtlas == atlas)$font->ConfigData == font_config$font_offset >= 0 && "FontData is incorrect, or FontNo cannot be found."$glyph_index_in_font != 0$i >= 0 && i < Size$n < (Storage.Size << 5)$src_range[0] <= src_range[1] && "Invalid range: is your glyph range array persistent? it is zero-terminated?"$src_tmp.DstIndex != -1$src_tmp.GlyphsList.Size == src_tmp.GlyphsCount
                                                      • API String ID: 1173767890-2192739418
                                                      • Opcode ID: e9dc0b8f47df948713d908b5eff208b3bba6724865e17dd3c4ce55733dc4e7e8
                                                      • Instruction ID: cb2c9582e8b7a94c6a1fa60e5c0b1dc4d1521a1d98607053bbd068dd80252e01
                                                      • Opcode Fuzzy Hash: e9dc0b8f47df948713d908b5eff208b3bba6724865e17dd3c4ce55733dc4e7e8
                                                      • Instruction Fuzzy Hash: E0F20232B19686C6E714EF39D4842BCB7A4FB48744F968236DA4D536B0DF38E496CB10

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1713 7ff7ab994320-7ff7ab9945ff call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab943880 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab943880 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab943880 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab943880 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab943880 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab943880 call 7ff7ab941080 * 2 call 7ff7ab9540a0 call 7ff7ab941080 call 7ff7ab954130 1760 7ff7ab994601-7ff7ab994614 call 7ff7ab9926c0 1713->1760 1761 7ff7ab99461a-7ff7ab994653 call 7ff7ab998250 call 7ff7ab950340 1713->1761 1764 7ff7ab994619 1760->1764 1768 7ff7ab994659-7ff7ab9946ba call 7ff7ab941080 call 7ff7ab959240 call 7ff7ab941080 call 7ff7ab9804f0 1761->1768 1769 7ff7ab994f7c-7ff7ab9954e2 call 7ff7ab9541b0 call 7ff7ab9979b0 call 7ff7ab998480 call 7ff7ab997c90 call 7ff7ab997480 call 7ff7ab94c720 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab941080 call 7ff7ab959240 call 7ff7ab97f580 call 7ff7ab9592a0 call 7ff7ab9592e0 call 7ff7ab941080 call 7ff7ab981520 call 7ff7ab959390 1761->1769 1764->1761 1786 7ff7ab9946c0-7ff7ab99471c SHBrowseForFolder 1768->1786 1787 7ff7ab99480d-7ff7ab994e71 call 7ff7ab9541b0 call 7ff7ab9979b0 call 7ff7ab998480 call 7ff7ab997c90 call 7ff7ab998250 call 7ff7ab94c720 call 7ff7ab998250 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab998250 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab997480 call 7ff7ab964a30 call 7ff7ab964a50 call 7ff7ab941080 call 7ff7ab9541e0 call 7ff7ab9702a0 call 7ff7ab941080 call 7ff7ab959240 call 7ff7ab9592e0 call 7ff7ab97f580 call 7ff7ab959390 call 7ff7ab941080 call 7ff7ab959240 call 7ff7ab9592e0 call 7ff7ab9832d0 call 7ff7ab959390 call 7ff7ab941080 call 7ff7ab959240 call 7ff7ab9592e0 call 7ff7ab959390 call 7ff7ab941080 call 7ff7ab959240 call 7ff7ab941080 call 7ff7ab9804f0 1768->1787 1958 7ff7ab9955b4-7ff7ab995615 call 7ff7ab941080 call 7ff7ab959240 call 7ff7ab941080 call 7ff7ab9804f0 1769->1958 1959 7ff7ab9954e8-7ff7ab9955b3 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab9439b0 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab9439b0 call 7ff7ab991840 call 7ff7ab964a60 call 7ff7ab9439b0 1769->1959 1786->1787 1789 7ff7ab994722-7ff7ab99473a SHGetPathFromIDList 1786->1789 2030 7ff7ab994e77-7ff7ab994e96 RemoveDirectoryA CreateDirectoryA 1787->2030 2031 7ff7ab994f69-7ff7ab994f77 call 7ff7ab997c90 1787->2031 1793 7ff7ab994740-7ff7ab99477b 1789->1793 1794 7ff7ab9947fe-7ff7ab99480c CoTaskMemFree 1789->1794 1797 7ff7ab994780-7ff7ab99478d 1793->1797 1794->1787 1797->1797 1800 7ff7ab99478f-7ff7ab9947d3 call 7ff7ab998250 1797->1800 1810 7ff7ab9947d8-7ff7ab9947e5 1800->1810 1810->1810 1813 7ff7ab9947e7-7ff7ab9947ec 1810->1813 1816 7ff7ab9947ee-7ff7ab9947fc 1813->1816 1816->1794 1816->1816 1986 7ff7ab995631-7ff7ab995640 1958->1986 1987 7ff7ab995617-7ff7ab995626 1958->1987 1959->1958 1991 7ff7ab995661-7ff7ab99566e call 7ff7ab997c90 1986->1991 1992 7ff7ab995642-7ff7ab995660 call 7ff7ab943a20 * 3 1986->1992 1987->1986 1990 7ff7ab995628-7ff7ab995630 ExitProcess 1987->1990 1990->1986 2002 7ff7ab99566f-7ff7ab99567e call 7ff7ab952ba0 1991->2002 1992->1991 2033 7ff7ab994ebf-7ff7ab994ecb call 7ff7ab99bb34 2030->2033 2034 7ff7ab994e98-7ff7ab994eba MessageBoxA 2030->2034 2031->2002 2037 7ff7ab994ed0-7ff7ab994ee1 2033->2037 2034->2031 2038 7ff7ab994ee3-7ff7ab994f3b call 7ff7ab99a100 2037->2038 2039 7ff7ab994f3d 2037->2039 2040 7ff7ab994f49-7ff7ab994f61 2038->2040 2039->2040 2040->2031
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Directory$BrowseCreateExitFolderFreeFromListMessagePathProcessRemoveTask
                                                      • String ID: Loader$...$C:\Users\user\Desktop\WaveExecutor$Fail$Failed to create setup directory$Install$P$WaveExecutor$WaveExecutor$choose install folder$continue$destinatinal folder$f$installation...
                                                      • API String ID: 3810817069-2185672700
                                                      • Opcode ID: 51fc8bbfeb8501b6a537f10b0e54d742b14c96df09f219560161b5057a3fde4b
                                                      • Instruction ID: ed303d95b4a2d8e07d859759043a900162bf1ff95dc1351fa934f37f6bc88ecd
                                                      • Opcode Fuzzy Hash: 51fc8bbfeb8501b6a537f10b0e54d742b14c96df09f219560161b5057a3fde4b
                                                      • Instruction Fuzzy Hash: 8AA2633190E686D5E661EB2AE8913AAF360FFC9340F814235E98D576B6DF3CE145CB10

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: AddressPerformanceProcQuery$CounterFrequencyInfoKeyboardLayoutLibraryLoadLocale
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$XInputGetCapabilities$XInputGetState$i >= 0 && i < Size$imgui_impl_win32$io.BackendPlatformUserData == nullptr && "Already initialized a platform backend!"$xinput1_1.dll$xinput1_2.dll$xinput1_3.dll$xinput1_4.dll$xinput9_1_0.dll
                                                      • API String ID: 2839060773-805143068
                                                      • Opcode ID: 260d99728c683016137ac75114b4de807555a0406b12ed98fa5fd299fab68a23
                                                      • Instruction ID: e0fa3bcd564d844332bcb2a4155c56e897ede5d6540ee734d2f7239875cabed6
                                                      • Opcode Fuzzy Hash: 260d99728c683016137ac75114b4de807555a0406b12ed98fa5fd299fab68a23
                                                      • Instruction Fuzzy Hash: CF718132A0AF86C6E7549F29E9802A9B7B4FB49B44F855136DA8D43770EF3CE065C710

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2089 7ff7ab990330-7ff7ab990342 2090 7ff7ab990352 2089->2090 2091 7ff7ab990344-7ff7ab99034e 2089->2091 2092 7ff7ab990354-7ff7ab99036e call 7ff7ab99d440 2090->2092 2093 7ff7ab990350 2091->2093 2094 7ff7ab990375-7ff7ab990378 2091->2094 2092->2094 2093->2092 2096 7ff7ab99037a-7ff7ab990394 call 7ff7ab99d440 2094->2096 2097 7ff7ab99039b-7ff7ab990429 GetClientRect QueryPerformanceCounter 2094->2097 2096->2097 2100 7ff7ab990445-7ff7ab990451 GetForegroundWindow 2097->2100 2101 7ff7ab99042b-7ff7ab99043f call 7ff7ab99d440 2097->2101 2104 7ff7ab9904df-7ff7ab9904ed 2100->2104 2105 7ff7ab990457-7ff7ab99045e 2100->2105 2101->2100 2106 7ff7ab9904ef-7ff7ab9904f6 2104->2106 2107 7ff7ab990526-7ff7ab990534 2104->2107 2108 7ff7ab990460-7ff7ab990485 ClientToScreen 2105->2108 2109 7ff7ab99049e-7ff7ab9904a2 2105->2109 2106->2107 2111 7ff7ab9904f8-7ff7ab990508 GetKeyState 2106->2111 2112 7ff7ab990536-7ff7ab99053d 2107->2112 2113 7ff7ab99056d-7ff7ab99057b 2107->2113 2114 7ff7ab990495-7ff7ab99049c 2108->2114 2115 7ff7ab990487-7ff7ab99048f SetCursorPos 2108->2115 2109->2104 2110 7ff7ab9904a4-7ff7ab9904b1 GetCursorPos 2109->2110 2110->2104 2116 7ff7ab9904b3-7ff7ab9904c3 ScreenToClient 2110->2116 2111->2107 2119 7ff7ab99050a-7ff7ab990511 2111->2119 2112->2113 2120 7ff7ab99053f-7ff7ab99054f GetKeyState 2112->2120 2117 7ff7ab9905b4-7ff7ab9905c2 2113->2117 2118 7ff7ab99057d-7ff7ab990584 2113->2118 2114->2104 2114->2109 2115->2114 2116->2104 2121 7ff7ab9904c5-7ff7ab9904da call 7ff7ab942260 2116->2121 2123 7ff7ab9905c4-7ff7ab9905cb 2117->2123 2124 7ff7ab9905fb-7ff7ab9905ff 2117->2124 2118->2117 2122 7ff7ab990586-7ff7ab990596 GetKeyState 2118->2122 2119->2107 2125 7ff7ab990513-7ff7ab990521 call 7ff7ab941f90 2119->2125 2120->2113 2126 7ff7ab990551-7ff7ab990558 2120->2126 2121->2104 2122->2117 2128 7ff7ab990598-7ff7ab99059f 2122->2128 2123->2124 2129 7ff7ab9905cd-7ff7ab9905dd GetKeyState 2123->2129 2131 7ff7ab990601-7ff7ab990606 2124->2131 2132 7ff7ab990608-7ff7ab99060f 2124->2132 2125->2107 2126->2113 2133 7ff7ab99055a-7ff7ab990568 call 7ff7ab941f90 2126->2133 2128->2117 2136 7ff7ab9905a1-7ff7ab9905af call 7ff7ab941f90 2128->2136 2129->2124 2137 7ff7ab9905df-7ff7ab9905e6 2129->2137 2134 7ff7ab990615-7ff7ab990618 2131->2134 2132->2134 2133->2113 2138 7ff7ab990625-7ff7ab990628 call 7ff7ab98fce0 2134->2138 2139 7ff7ab99061a-7ff7ab990620 call 7ff7ab98fb70 2134->2139 2136->2117 2137->2124 2141 7ff7ab9905e8-7ff7ab9905f6 call 7ff7ab941f90 2137->2141 2145 7ff7ab99062d-7ff7ab990634 2138->2145 2139->2138 2141->2124
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: State$Client$CursorScreen$CounterForegroundPerformanceQueryRectWindow
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "Context or backend not initialized? Did you call ImGui_ImplWin32_Init()?"$bd->hWnd != 0
                                                      • API String ID: 1576454153-990843061
                                                      • Opcode ID: b15be0b44c692230b85c4defaefc4a5a4583acdefd80d0cc3f04028913e3d836
                                                      • Instruction ID: a7ab4527a4b171bed2eff79c5119e537e6aa44b8f6335806b7f84ea4b015e9b0
                                                      • Opcode Fuzzy Hash: b15be0b44c692230b85c4defaefc4a5a4583acdefd80d0cc3f04028913e3d836
                                                      • Instruction Fuzzy Hash: C591D521E0A686C6FBA1EB3DD444379A795EF81B84F898131E95D065B5DF3CE480CB20

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2366 7ff7ab98f2f0-7ff7ab98f311 2367 7ff7ab98f313-7ff7ab98f337 call 7ff7ab99d440 2366->2367 2368 7ff7ab98f339-7ff7ab98f340 2366->2368 2367->2368 2373 7ff7ab98f342 2367->2373 2370 7ff7ab98f344-7ff7ab98f365 call 7ff7ab971770 2368->2370 2374 7ff7ab98f36a-7ff7ab98f388 2370->2374 2373->2370 2376 7ff7ab98f594-7ff7ab98f597 2374->2376 2377 7ff7ab98f38e-7ff7ab98f3ae 2374->2377 2378 7ff7ab98f59b-7ff7ab98f5a3 2376->2378 2384 7ff7ab98f3b4-7ff7ab98f3c5 2377->2384 2385 7ff7ab98f58a-7ff7ab98f58e 2377->2385 2379 7ff7ab98f416 2378->2379 2380 7ff7ab98f5a9-7ff7ab98f5ce call 7ff7ab949150 2378->2380 2383 7ff7ab98f41a-7ff7ab98f46c 2379->2383 2380->2383 2388 7ff7ab98f5d4-7ff7ab98f5db 2380->2388 2392 7ff7ab98f472-7ff7ab98f48e 2383->2392 2393 7ff7ab98f60d 2383->2393 2384->2385 2390 7ff7ab98f3cb-7ff7ab98f410 2384->2390 2385->2376 2391 7ff7ab98f5e0-7ff7ab98f606 2388->2391 2390->2378 2390->2379 2391->2391 2394 7ff7ab98f608 2391->2394 2392->2393 2398 7ff7ab98f494-7ff7ab98f497 2392->2398 2395 7ff7ab98f60f-7ff7ab98f628 2393->2395 2394->2383 2400 7ff7ab98f4d8-7ff7ab98f4f6 2398->2400 2401 7ff7ab98f499-7ff7ab98f4a8 2398->2401 2405 7ff7ab98f583-7ff7ab98f585 2400->2405 2406 7ff7ab98f4fc-7ff7ab98f504 2400->2406 2402 7ff7ab98f4b0-7ff7ab98f4d1 00007FF8B9F61310 2401->2402 2402->2402 2403 7ff7ab98f4d3 2402->2403 2403->2400 2405->2395 2406->2405 2407 7ff7ab98f506-7ff7ab98f509 2406->2407 2408 7ff7ab98f57a-7ff7ab98f57d 00007FF8C610F020 2407->2408 2409 7ff7ab98f50b-7ff7ab98f515 2407->2409 2408->2405 2409->2408 2410 7ff7ab98f517-7ff7ab98f534 2409->2410 2411 7ff7ab98f56f-7ff7ab98f573 2410->2411 2412 7ff7ab98f536-7ff7ab98f568 2410->2412 2411->2408 2412->2411
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610F020F61310
                                                      • String ID: $C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"
                                                      • API String ID: 310658293-1764846569
                                                      • Opcode ID: 894d359a0e7901a4302d43cd48edf3ca94111f99abde4d05c0332fa0652f584f
                                                      • Instruction ID: 3e5deefa51d0b0073d104ae549aa1cb98599ef0cfd2c50b40e2155be7c284e61
                                                      • Opcode Fuzzy Hash: 894d359a0e7901a4302d43cd48edf3ca94111f99abde4d05c0332fa0652f584f
                                                      • Instruction Fuzzy Hash: FB917B72706A85CAEB509F69D4803ADBBA4FB88B89F859136DE0E43B74DF38D445C710

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2413 7ff7ab993b90-7ff7ab993bd0 call 7ff7ab990c00 2416 7ff7ab993bd2-7ff7ab993bd7 2413->2416 2417 7ff7ab993bdc-7ff7ab993bec 2413->2417 2418 7ff7ab993dd6-7ff7ab993ddc 2416->2418 2419 7ff7ab993bf2-7ff7ab993bf7 2417->2419 2420 7ff7ab993c9a-7ff7ab993ca5 PostQuitMessage 2417->2420 2421 7ff7ab993c24-7ff7ab993c2c 2419->2421 2422 7ff7ab993bf9-7ff7ab993c01 2419->2422 2420->2418 2425 7ff7ab993c71-7ff7ab993c73 2421->2425 2426 7ff7ab993c2e-7ff7ab993c37 2421->2426 2423 7ff7ab993c03-7ff7ab993c0b 2422->2423 2424 7ff7ab993c78-7ff7ab993c8c 2422->2424 2430 7ff7ab993c11-7ff7ab993c19 2423->2430 2431 7ff7ab993cbe-7ff7ab993cc7 2423->2431 2428 7ff7ab993c95 2424->2428 2429 7ff7ab993c8e-7ff7ab993c90 2424->2429 2425->2418 2426->2425 2427 7ff7ab993c39-7ff7ab993c70 call 7ff7ab993b20 2426->2427 2427->2425 2433 7ff7ab993db1-7ff7ab993dd0 NtdllDefWindowProc_A 2428->2433 2429->2418 2436 7ff7ab993c1f 2430->2436 2437 7ff7ab993caa-7ff7ab993cb9 2430->2437 2434 7ff7ab993dad-7ff7ab993daf 2431->2434 2435 7ff7ab993ccd-7ff7ab993d4f GetWindowRect 2431->2435 2433->2418 2434->2418 2435->2434 2439 7ff7ab993d51-7ff7ab993d5d 2435->2439 2436->2433 2437->2418 2439->2434 2440 7ff7ab993d5f-7ff7ab993d68 2439->2440 2440->2434 2441 7ff7ab993d6a-7ff7ab993d74 2440->2441 2441->2434 2442 7ff7ab993d76-7ff7ab993dac SetWindowPos 2441->2442 2442->2434
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: NtdllProc_Window
                                                      • String ID: E
                                                      • API String ID: 4255912815-3568589458
                                                      • Opcode ID: d9f9fd3d91a60987a5f48f68ece85a5dcac14300b8f46c6e9c972fc7a4a4e4b9
                                                      • Instruction ID: 9ad49504d5fc2206c3c80660d48f355f04f093beb8f684d53434fef1a69b33f9
                                                      • Opcode Fuzzy Hash: d9f9fd3d91a60987a5f48f68ece85a5dcac14300b8f46c6e9c972fc7a4a4e4b9
                                                      • Instruction Fuzzy Hash: 0A515E3160D682DAE7A4AF2CE45437AF6A8FB85750F914135EA9D82BB4DF3CD444CB20

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2443 23830b6f46a-23830b6f4a2 call 23830b4c520 FindFirstFileA 2446 23830b6f4e9-23830b6f520 2443->2446 2447 23830b6f4a4-23830b6f4df call 23830b45180 call 23830b4a060 call 23830b51e90 call 23830b4a060 2443->2447 2449 23830b6f55d-23830b6f5e5 call 23830b6fcb0 call 23830b71a30 call 23830b4a110 call 23830b4a170 call 23830c5b740 2446->2449 2450 23830b6f522-23830b6f559 call 23830b4a170 call 23830b6fe00 2446->2450 2470 23830b6fbf5-23830b6fbfd 2447->2470 2472 23830b6f5ea-23830b6f5f5 2449->2472 2450->2449 2473 23830b6f5fb-23830b6f642 call 23830b6fd60 call 23830b719a0 call 23830b51f30 2472->2473 2474 23830b6f6c1-23830b6f6e3 call 23830c57af0 2472->2474 2490 23830b6f644-23830b6f67d call 23830b4a170 call 23830b6fe00 2473->2490 2491 23830b6f681-23830b6f6bc call 23830b45180 call 23830b4a060 call 23830b51e90 call 23830b4a060 2473->2491 2482 23830b6fb69-23830b6fba4 call 23830b45180 call 23830b4a060 call 23830b51e90 call 23830b4a060 2474->2482 2483 23830b6f6e9-23830b6f7aa call 23830b6d260 call 23830c57960 call 23830b4a170 call 23830c0a1f0 call 23830b4c590 call 23830b4a060 call 23830b4c9c0 2474->2483 2482->2470 2523 23830b6fa0f-23830b6fb63 call 23830c57960 call 23830b4c590 call 23830b4a060 call 23830c57960 call 23830b4c590 call 23830b4a060 call 23830c57960 call 23830b4c590 call 23830b4a060 call 23830c57960 call 23830b4c590 call 23830b4a060 call 23830c57960 call 23830b4c590 call 23830b4a060 call 23830b728c0 call 23830b4d2a0 2483->2523 2524 23830b6f7b0-23830b6f863 call 23830c57960 call 23830b4a170 call 23830c0acd0 call 23830b4c590 call 23830b4a060 call 23830b4c9c0 2483->2524 2490->2491 2491->2470 2523->2482 2524->2523 2549 23830b6f869-23830b6f86e 2524->2549 2551 23830b6f9fc-23830b6fa09 call 23830b4d2a0 2549->2551 2552 23830b6f874-23830b6f903 call 23830b4a170 call 23830c10000 * 3 call 23830b87950 2549->2552 2551->2523 2576 23830b6f925-23830b6f9f7 call 23830b4a170 call 23830b6e2c0 call 23830b51e50 call 23830b45180 call 23830b51e90 call 23830b4a060 call 23830b4d2a0 call 23830b4a060 call 23830b51e90 call 23830b4a060 2552->2576 2577 23830b6f905-23830b6f920 call 23830b4a060 call 23830b4d2a0 2552->2577 2576->2470
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B6F47B
                                                      • FindFirstFileA.KERNEL32 ref: 0000023830B6F48B
                                                        • Part of subcall function 0000023830B45180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B45217
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$FileFindFirst
                                                      • String ID:
                                                      • API String ID: 2113789597-0
                                                      • Opcode ID: cfa9f5777d2db9ce4048483391da668259afc2d594878e3b9cda18768d7dc9b0
                                                      • Instruction ID: 3bbed11dfd79e8d486e2e6f278655b2983c05107f691d6cbe755e799e154db8c
                                                      • Opcode Fuzzy Hash: cfa9f5777d2db9ce4048483391da668259afc2d594878e3b9cda18768d7dc9b0
                                                      • Instruction Fuzzy Hash: F912F071518B488FE765EB18C499BDBB3E1FB98704F40496DE08FC7292DE349645CB42

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2668 23830b46fe0-23830b475d5 call 23830b45740 call 23830b477f0 call 23830b49d80 call 23830b4a110 call 23830b478a0 call 23830b49cf0 call 23830b4a110 call 23830b47960 call 23830b49c60 call 23830b4a110 call 23830b47a10 call 23830b49c60 call 23830b4a110 call 23830b47ac0 call 23830b49c60 call 23830b4a110 call 23830b47b70 call 23830b49bd0 call 23830b4a110 call 23830b47c20 call 23830b49b40 call 23830b4a110 call 23830b47ce0 call 23830b49a00 call 23830b4a110 call 23830b47dc0 call 23830b498c0 call 23830b4a110 call 23830b47e90 call 23830b49830 call 23830b4a110 call 23830b47f60 call 23830b497a0 call 23830b4a110 call 23830b48010 call 23830b49bd0 call 23830b4a110 call 23830b480c0 call 23830b49710 call 23830b4a110 call 23830b48170 call 23830b495d0 call 23830b4a110 call 23830b48230 call 23830b49710 call 23830b4a110 call 23830b482e0 call 23830b49540 call 23830b4a110 call 23830b48390 call 23830b494b0 call 23830b4a110 call 23830b48450 call 23830b49370 call 23830b4a110 call 23830b48500 call 23830b49370 call 23830b4a110 call 23830b485b0 call 23830b49230 call 23830b4a110 call 23830b48670 call 23830b49230 call 23830b4a110 call 23830b48730 call 23830b491a0 call 23830b4a110 call 23830b48800 call 23830b49370 call 23830b4a110 call 23830b488b0 call 23830b49060 call 23830b4a110 call 23830b48960 call 23830b48f20 call 23830b4a110 call 23830b48a20 call 23830b48de0 call 23830b4a110 call 23830b48db0 call 23830b49e90 call 23830b48ba0 CreateToolhelp32Snapshot 2833 23830b475d7-23830b475df 2668->2833 2834 23830b47633-23830b47653 Process32FirstW 2668->2834 2837 23830b475e8-23830b4762e call 23830b48af0 call 23830b48c70 call 23830b4a110 call 23830b49e70 2833->2837 2838 23830b475e1-23830b475e6 2833->2838 2835 23830b477b9-23830b477d8 call 23830b4a110 call 23830b49e70 2834->2835 2836 23830b47659-23830b476ab call 23830b45360 call 23830c65ac0 call 23830c65d80 2834->2836 2851 23830b477df-23830b477e8 2835->2851 2856 23830b476b7-23830b476d3 call 23830b49e40 2836->2856 2837->2851 2838->2837 2861 23830b476d9-23830b47702 call 23830b49e10 call 23830b49fe0 2856->2861 2862 23830b47790-23830b477b3 call 23830b4a060 Process32NextW 2856->2862 2869 23830b47708-23830b47710 2861->2869 2870 23830b4778b 2861->2870 2862->2835 2862->2836 2871 23830b4771b-23830b47723 2869->2871 2872 23830b47712-23830b47719 2869->2872 2870->2856 2874 23830b4773a-23830b47789 call 23830b4a170 call 23830b46f30 call 23830b4a060 call 23830b49e70 2871->2874 2875 23830b47725-23830b4772a 2871->2875 2872->2874 2874->2851 2875->2874 2877 23830b4772c-23830b47738 2875->2877 2877->2875
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CreateFac_nodeFac_node::_FirstNextSnapshotToolhelp32char_traitsstd::_
                                                      • String ID:
                                                      • API String ID: 4114415025-0
                                                      • Opcode ID: 2cf1e73a0f9107235ddbfb485c3595bfcba21e3825775f53e0b531762a104419
                                                      • Instruction ID: b78cae3cee4f4676708d6f9dcee2c0ca841ec3f3350a26fdcd66f76061ae90cd
                                                      • Opcode Fuzzy Hash: 2cf1e73a0f9107235ddbfb485c3595bfcba21e3825775f53e0b531762a104419
                                                      • Instruction Fuzzy Hash: CB323171A18B484BE755FB28C4697EBB2D1FB98704F9009BAF04BCB292ED359B44C741

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2886 7ff7ab98ea60-7ff7ab98ea7e 2887 7ff7ab98f082-7ff7ab98f08c 2886->2887 2888 7ff7ab98ea84-7ff7ab98ea88 2886->2888 2888->2887 2889 7ff7ab98ea8e-7ff7ab98eaaf 2888->2889 2890 7ff7ab98eab1-7ff7ab98eab8 2889->2890 2891 7ff7ab98eaba 2889->2891 2892 7ff7ab98eabd-7ff7ab98ead7 2890->2892 2891->2892 2893 7ff7ab98ead9-7ff7ab98eadf 2892->2893 2894 7ff7ab98eaea-7ff7ab98eb26 2892->2894 2895 7ff7ab98eae1-7ff7ab98eae7 2893->2895 2896 7ff7ab98eb2c-7ff7ab98eb3b 2893->2896 2894->2896 2900 7ff7ab98f052-7ff7ab98f07a 2894->2900 2895->2894 2898 7ff7ab98eb52-7ff7ab98eb8a 2896->2898 2899 7ff7ab98eb3d-7ff7ab98eb43 2896->2899 2898->2900 2901 7ff7ab98eb90-7ff7ab98ebae 2898->2901 2899->2901 2902 7ff7ab98eb45-7ff7ab98eb4e 2899->2902 2900->2887 2901->2900 2907 7ff7ab98ebb4-7ff7ab98ebc1 2901->2907 2902->2898 2909 7ff7ab98ec61-7ff7ab98ec6c 2907->2909 2910 7ff7ab98ebc7-7ff7ab98ec32 2907->2910 2909->2900 2910->2909 2916 7ff7ab98ec34-7ff7ab98ec55 2910->2916 2918 7ff7ab98ec71-7ff7ab98ec88 2916->2918 2919 7ff7ab98ec57-7ff7ab98ec5b 2916->2919 2920 7ff7ab98ed95-7ff7ab98ee1d call 7ff7ab98e5b0 2918->2920 2921 7ff7ab98ec8e 2918->2921 2919->2909 2937 7ff7ab98ee23-7ff7ab98ee2b 2920->2937 2938 7ff7ab98efe9-7ff7ab98f04a 2920->2938 2922 7ff7ab98ec91-7ff7ab98ec94 2921->2922 2923 7ff7ab98ec96-7ff7ab98ec9a 2922->2923 2924 7ff7ab98ec9c-7ff7ab98ecb0 call 7ff7ab99d440 2922->2924 2923->2924 2926 7ff7ab98ecb6-7ff7ab98ecc9 2923->2926 2924->2926 2929 7ff7ab98ed5f-7ff7ab98ed8f 00007FF8B9F61310 2926->2929 2930 7ff7ab98eccf-7ff7ab98ecd6 2926->2930 2929->2920 2929->2922 2931 7ff7ab98ece0-7ff7ab98ed5d 2930->2931 2931->2929 2931->2931 2939 7ff7ab98ee30-7ff7ab98ee33 2937->2939 2938->2900 2941 7ff7ab98ee35-7ff7ab98ee39 2939->2941 2942 7ff7ab98ee3b-7ff7ab98ee5b call 7ff7ab99d440 2939->2942 2941->2942 2943 7ff7ab98ee61-7ff7ab98ee73 2941->2943 2942->2943 2945 7ff7ab98efb7-7ff7ab98efe3 2943->2945 2946 7ff7ab98ee79 2943->2946 2945->2938 2945->2939 2949 7ff7ab98ee80-7ff7ab98ee83 2946->2949 2950 7ff7ab98ee85-7ff7ab98ee87 2949->2950 2951 7ff7ab98ee89-7ff7ab98ee9d call 7ff7ab99d440 2949->2951 2950->2951 2953 7ff7ab98eea3-7ff7ab98eeb1 2950->2953 2951->2953 2956 7ff7ab98eed3-7ff7ab98eef9 2953->2956 2957 7ff7ab98eeb3-7ff7ab98eeb7 2953->2957 2960 7ff7ab98eeff-7ff7ab98ef02 2956->2960 2961 7ff7ab98ef90-7ff7ab98ef9d 2956->2961 2958 7ff7ab98eec6-7ff7ab98eece 2957->2958 2959 7ff7ab98eeb9-7ff7ab98eec1 call 7ff7ab98e5b0 2957->2959 2958->2961 2959->2961 2960->2961 2965 7ff7ab98ef08-7ff7ab98ef85 2960->2965 2961->2949 2963 7ff7ab98efa3-7ff7ab98efb1 2961->2963 2963->2945 2965->2961
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 2490902527-1817040388
                                                      • Opcode ID: 7f0815f646b9be6a47ebf33997fd40430ce2371def073614a23dc5631ded96a8
                                                      • Instruction ID: a827edaccb4996f1853f083394e953a99d45164a9a3e8793c12ac1e70483891c
                                                      • Opcode Fuzzy Hash: 7f0815f646b9be6a47ebf33997fd40430ce2371def073614a23dc5631ded96a8
                                                      • Instruction Fuzzy Hash: DE028976605B85C6DB20DF2AD4946AE7BB4FB88B89F428526DF4D47B64CF38D444CB00
                                                      APIs
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830C077E6
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830C07864
                                                      • CryptUnprotectData.CRYPT32 ref: 0000023830C078BD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$CryptDataUnprotect
                                                      • String ID:
                                                      • API String ID: 3418212865-0
                                                      • Opcode ID: 972225a936fa3d2b3db204c5816dedc41ad24ac798caad545d5d4e6199c50a6b
                                                      • Instruction ID: e776a8118bf13c824b9013fb9c1b65ed51508f6e3efce488543a95f48a58b6cd
                                                      • Opcode Fuzzy Hash: 972225a936fa3d2b3db204c5816dedc41ad24ac798caad545d5d4e6199c50a6b
                                                      • Instruction Fuzzy Hash: 8E51BE70918B888FE7A4EB28C4597AEB7E1FB98301F50496DE08EC7361DF749585CB42
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 547d032ff03bed76e8d98501336aec72c7838b5fcf6afd06ef48b4c17f1abeb4
                                                      • Instruction ID: b349168e024649afb8973732a47ccdad10385d631b2c180c5802de6cb1a3c72a
                                                      • Opcode Fuzzy Hash: 547d032ff03bed76e8d98501336aec72c7838b5fcf6afd06ef48b4c17f1abeb4
                                                      • Instruction Fuzzy Hash: 4A025C02E296BAC5F752A67944413FDA385CF6B345F5D8732ED58339F6EB2C74828220
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ba1e848a4c6536b73392d338e6aa0417a76d75594373d4295ff7020395ab56e6
                                                      • Instruction ID: 630969d470c3ba9ed85fc2ac5727e44588f2bfcf7f0e1e4f5e6f0125ac9f9c8d
                                                      • Opcode Fuzzy Hash: ba1e848a4c6536b73392d338e6aa0417a76d75594373d4295ff7020395ab56e6
                                                      • Instruction Fuzzy Hash: A5021432A186C4CAD325CB3A90416B9F7B0FF5D784F158326EB8963665EB3CE591CB10

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0000023830B45360: _WChar_traits.LIBCPMTD ref: 0000023830B4538D
                                                        • Part of subcall function 0000023830B44AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B44AD0
                                                        • Part of subcall function 0000023830B44AA0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830B44B2F
                                                        • Part of subcall function 0000023830B44AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B44B41
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830B448B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::Concurrency::details::_CriticalEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWork$Char_traits
                                                      • String ID: $ $ $B$D$K$KDBM$M$a$a$a$b$c$e$g$i$l$o$t$y
                                                      • API String ID: 1777712374-1292890139
                                                      • Opcode ID: c02a726d3c2bd88a4534588b83aa4fca235328903684469cf21292f4d99c4a12
                                                      • Instruction ID: 4dda1ccb03ea861585b48127c7baf272c6af53b2ed9c31943130efc48b69862b
                                                      • Opcode Fuzzy Hash: c02a726d3c2bd88a4534588b83aa4fca235328903684469cf21292f4d99c4a12
                                                      • Instruction Fuzzy Hash: 4161F87050CB848FE760EB68C448B9ABBE1FBA9704F04495DE0C9C7361DBB99488CB53

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2146 7ff7ab9926c0-7ff7ab9926dc 2147 7ff7ab9926e5-7ff7ab992717 2146->2147 2148 7ff7ab9926de-7ff7ab9926e0 2146->2148 2150 7ff7ab992723-7ff7ab992730 2147->2150 2149 7ff7ab9931ad-7ff7ab9931b6 2148->2149 2151 7ff7ab992732-7ff7ab992756 2150->2151 2152 7ff7ab992758-7ff7ab99282f call 7ff7ab9932e0 call 7ff7ab996d10 call 7ff7ab9978f0 call 7ff7ab9931c0 call 7ff7ab996d10 call 7ff7ab9978f0 call 7ff7ab998250 GetModuleHandleA 2150->2152 2151->2150 2168 7ff7ab992831-7ff7ab992863 call 7ff7ab997c90 * 2 2152->2168 2169 7ff7ab992865-7ff7ab9928c9 call 7ff7ab998250 GetProcAddress call 7ff7ab997c90 * 2 2152->2169 2179 7ff7ab9928d1-7ff7ab992993 call 7ff7ab991a40 call 7ff7ab9990e0 call 7ff7ab999140 call 7ff7ab992150 call 7ff7ab997c90 2168->2179 2169->2179 2191 7ff7ab99299f-7ff7ab9929e1 2179->2191 2192 7ff7ab9929e3-7ff7ab992a39 2191->2192 2193 7ff7ab992a3e-7ff7ab992b4a VirtualAlloc 2191->2193 2192->2191 2195 7ff7ab992b69-7ff7ab992c5d call 7ff7ab993520 call 7ff7ab996c80 call 7ff7ab9978f0 call 7ff7ab993400 call 7ff7ab996c80 call 7ff7ab9978f0 call 7ff7ab998250 GetModuleHandleA 2193->2195 2196 7ff7ab992b4c-7ff7ab992b64 call 7ff7ab997b60 2193->2196 2213 7ff7ab992c5f-7ff7ab992c97 call 7ff7ab997c90 * 2 2195->2213 2214 7ff7ab992c99-7ff7ab992d06 call 7ff7ab998250 GetProcAddress call 7ff7ab997c90 * 2 2195->2214 2196->2149 2223 7ff7ab992d0e-7ff7ab992dfe call 7ff7ab993760 call 7ff7ab996b60 call 7ff7ab9978f0 call 7ff7ab993640 call 7ff7ab996bf0 call 7ff7ab9978f0 call 7ff7ab998250 GetModuleHandleA 2213->2223 2214->2223 2240 7ff7ab992e00-7ff7ab992e38 call 7ff7ab997c90 * 2 2223->2240 2241 7ff7ab992e3a-7ff7ab992ea7 call 7ff7ab998250 GetProcAddress call 7ff7ab997c90 * 2 2223->2241 2250 7ff7ab992eaf-7ff7ab992f0b 2240->2250 2241->2250 2253 7ff7ab992f25-7ff7ab992f35 2250->2253 2254 7ff7ab992f7f-7ff7ab9930a8 call 7ff7ab996da0 call 7ff7ab9939b0 call 7ff7ab996ad0 call 7ff7ab9978f0 call 7ff7ab993890 call 7ff7ab996ad0 call 7ff7ab9978f0 call 7ff7ab998250 GetModuleHandleA 2253->2254 2255 7ff7ab992f37-7ff7ab992f40 2253->2255 2275 7ff7ab9930e4-7ff7ab993151 call 7ff7ab998250 GetProcAddress call 7ff7ab997c90 * 2 2254->2275 2276 7ff7ab9930aa-7ff7ab9930e2 call 7ff7ab997c90 * 2 2254->2276 2256 7ff7ab992f42-7ff7ab992f7b 2255->2256 2257 7ff7ab992f7d 2255->2257 2256->2257 2257->2253 2285 7ff7ab993159-7ff7ab9931a2 CreateThread call 7ff7ab997b60 2275->2285 2276->2285 2289 7ff7ab9931a7-7ff7ab9931a8 2285->2289 2289->2149
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: HandleModule
                                                      • String ID:
                                                      • API String ID: 4139908857-0
                                                      • Opcode ID: a3eeb29371fb47a965077e410e082878baaf3524c6b8feef568940cf3953f533
                                                      • Instruction ID: f2c364d42e23bcfee3444e74c771e141cbe4ea2d4cbb2640f99a728939e3951d
                                                      • Opcode Fuzzy Hash: a3eeb29371fb47a965077e410e082878baaf3524c6b8feef568940cf3953f533
                                                      • Instruction Fuzzy Hash: 7C42B53260ABC585DAB0EB29E4943AAB3A4F7C9780F514535EA8D83B79DF3CD0548B50

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Window$MetricsSystem$ClassCreateHandleModuleRegisterShowUpdate
                                                      • String ID: class001
                                                      • API String ID: 3666473625-3656631403
                                                      • Opcode ID: c65b6a3a3c5298f372adfd29b74c1c22faed9294b5240e563b4d02c16027923c
                                                      • Instruction ID: cd201eb840268b2eeaddae75c8da773049322c971ef227e68a5b129cc12348f6
                                                      • Opcode Fuzzy Hash: c65b6a3a3c5298f372adfd29b74c1c22faed9294b5240e563b4d02c16027923c
                                                      • Instruction Fuzzy Hash: DE312E7190AB42DAE380AF28F954B6DB7A4FB44304F928139D58D86774DF7DE048CB64

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: v2.1.1 Setup$ v2.1.1 Setup!Before starting the installation, select the folder where the files will be installed$A$FrghcZrah$WaveExecutor$Welcome to
                                                      • API String ID: 2030045667-1564511172
                                                      • Opcode ID: 578fb85d05ac807efce2f1816e923275f42c98e49a4d3e3cb657846628bf40dd
                                                      • Instruction ID: 61addcdc333ff492eb2ad41917e21d8026987adbbf028abb9ee10131cafe869b
                                                      • Opcode Fuzzy Hash: 578fb85d05ac807efce2f1816e923275f42c98e49a4d3e3cb657846628bf40dd
                                                      • Instruction Fuzzy Hash: 0271222150EB82D1E7A0FB69E4912BEA768EB85784F914035F6CD83776DF2CD145CB20

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyNextProcess32Queue::StructuredWork$CreateSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 2993956496-0
                                                      • Opcode ID: e5cb6cc2a9d3f2d857daf4add4d4784c79b02a268af29c56eed9b1a154788f6c
                                                      • Instruction ID: 4dc29dc57ef226301297c6aba3aad436edff5fcd433940a576ffd23348b94190
                                                      • Opcode Fuzzy Hash: e5cb6cc2a9d3f2d857daf4add4d4784c79b02a268af29c56eed9b1a154788f6c
                                                      • Instruction Fuzzy Hash: 86512170518B488FE3A5EB28C459BDAB3E1FBD4704F504A5DF48AC7291DE349A05CB42
                                                      APIs
                                                      • type_info::_name_internal_method.LIBCMTD ref: 0000023830C29EF0
                                                        • Part of subcall function 0000023830B76A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B76AAB
                                                        • Part of subcall function 0000023830B76A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B76ABA
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830C29F56
                                                      • CreateFileA.KERNEL32 ref: 0000023830C29F82
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFiletype_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 645652700-0
                                                      • Opcode ID: f64b6eb87d80957077a350099af48cbfcdfbf435f0acf51f21d504348669a5e4
                                                      • Instruction ID: f1fd6e3bdb70f787e48393ce0d3bb91f5ffa9f9d532a96718189399188adfbea
                                                      • Opcode Fuzzy Hash: f64b6eb87d80957077a350099af48cbfcdfbf435f0acf51f21d504348669a5e4
                                                      • Instruction Fuzzy Hash: 96814370618B488FE794EB28C859B9AB7E1FB98714F404AADF04AC73D1DE39D945C701
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                      • String ID:
                                                      • API String ID: 586831839-0
                                                      • Opcode ID: 72057f2b81a371b71a98754698cc4969553e8e85e18c100de287d621669e3ca5
                                                      • Instruction ID: fbee927534cd5e80d0005386ae146e5fec4f7d468fb0a0ea21e866e07b18fe2b
                                                      • Opcode Fuzzy Hash: 72057f2b81a371b71a98754698cc4969553e8e85e18c100de287d621669e3ca5
                                                      • Instruction Fuzzy Hash: 6821CF70618B888FDB94EF2CC498B5ABBE0FB99304F50495DF48AC3361DB79D9458B42
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B4476C
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B4477E
                                                        • Part of subcall function 0000023830B453C0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B453DD
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B447BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID:
                                                      • API String ID: 1865873047-0
                                                      • Opcode ID: 2bd40488f3e532a51d24b491183ad7726d9c7802e0b56b6519047ab1d83811bb
                                                      • Instruction ID: 8771d31d0bb4b92391406213bb2d67320620fc1e28e35c79bbb565dd1a31085e
                                                      • Opcode Fuzzy Hash: 2bd40488f3e532a51d24b491183ad7726d9c7802e0b56b6519047ab1d83811bb
                                                      • Instruction Fuzzy Hash: 4931EC70528B988FD794EF28C449BAAF7E1FB94744F80495DF08AC72A2DF749644CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                      • String ID:
                                                      • API String ID: 586831839-0
                                                      • Opcode ID: 58da95cd914e928df27caef5f136864f76f7d90ee48b638eaa7250070e662160
                                                      • Instruction ID: 1f412b10f1b9aa2f964427ec261cd583f704f5ebfefa6540964ac9d5656d2984
                                                      • Opcode Fuzzy Hash: 58da95cd914e928df27caef5f136864f76f7d90ee48b638eaa7250070e662160
                                                      • Instruction Fuzzy Hash: 7901D374618B888FD744EF28C49971ABBE1FB99305F50091DF48AC33A0DB79D945CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Message$DispatchPeekTranslate
                                                      • String ID:
                                                      • API String ID: 4217535847-0
                                                      • Opcode ID: 592db406a15101d98d1bfc7a93d39be7e429bab12ec8d4365a76516f4c6005f4
                                                      • Instruction ID: f73350920519f1807332c1b4a0e828b924fb993362806a70088592a4ab5d4af9
                                                      • Opcode Fuzzy Hash: 592db406a15101d98d1bfc7a93d39be7e429bab12ec8d4365a76516f4c6005f4
                                                      • Instruction Fuzzy Hash: 2001842192E192C6F7B17B38A85677EEA64AFA1345FD15031F14E425B5CF2CD045CB70
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: gfff
                                                      • API String ID: 1173767890-1553575800
                                                      • Opcode ID: 043a7b960f3446d2684c2c3b0fe0bb0750dda5e28bddd77339876f917e370d22
                                                      • Instruction ID: 1a446760029644443b73e72ffbd36499a5c6bffed35c9063da1a3565a2548bd9
                                                      • Opcode Fuzzy Hash: 043a7b960f3446d2684c2c3b0fe0bb0750dda5e28bddd77339876f917e370d22
                                                      • Instruction Fuzzy Hash: F3515963709AC587D7099F2C99112ADFBB1FB49B40F8A8235DA48977A9CB3CD155C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: @
                                                      • API String ID: 3568877910-2766056989
                                                      • Opcode ID: 25b0d2ce2a38a7156871d754f39201a56fb4b69c342f7591e255e8e05feafcfc
                                                      • Instruction ID: 486fa775206be6f031cc8526e4b1f09029b35f1aaaf0f98d04d7c2e93b817219
                                                      • Opcode Fuzzy Hash: 25b0d2ce2a38a7156871d754f39201a56fb4b69c342f7591e255e8e05feafcfc
                                                      • Instruction Fuzzy Hash: 28111F7090A746A6F790AF59E844B79B7A4BB84798FC28139D90D473B0DF7DE0488F20
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID:
                                                      • API String ID: 1173767890-0
                                                      • Opcode ID: 351bfda824813d4db151244fcd6c34f384deae106e59415b7f5bed6d622aea53
                                                      • Instruction ID: e6ccd682c78a4fe7d059d6bceadbc403d0bef90b6df585ed8265180ba506a83c
                                                      • Opcode Fuzzy Hash: 351bfda824813d4db151244fcd6c34f384deae106e59415b7f5bed6d622aea53
                                                      • Instruction Fuzzy Hash: 9951DD73609BC5C6C754DF29E4816ADB3B0FB58B80F548226DA4D53670EF39D49ACB00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610F020F61310
                                                      • String ID:
                                                      • API String ID: 310658293-0
                                                      • Opcode ID: 19ff4af40776e3342b9658c01a05b29c7fb88fa77e0c8c2bd13613068ffdcf0b
                                                      • Instruction ID: d4524ca5fad85a1bba5e76335700f36cba9293a65b7cf47a1029cdbdc6818fe8
                                                      • Opcode Fuzzy Hash: 19ff4af40776e3342b9658c01a05b29c7fb88fa77e0c8c2bd13613068ffdcf0b
                                                      • Instruction Fuzzy Hash: DA21B07260AAD1C2CB48EF2CE1950B8F3B4FB48B88B998136DA0D87274DF38D056C740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610F020F61310
                                                      • String ID:
                                                      • API String ID: 310658293-0
                                                      • Opcode ID: cc081eae8d4f3b26d14c961ece47efa70da8d3bf07c2d03f9a872298b21684b1
                                                      • Instruction ID: 3142b71b30dc3a22be64fcde64d9a3d84716f90bea417d05808d358fa5a64467
                                                      • Opcode Fuzzy Hash: cc081eae8d4f3b26d14c961ece47efa70da8d3bf07c2d03f9a872298b21684b1
                                                      • Instruction Fuzzy Hash: CC21807261AA92C6CB48EF2CD5950B8B3B5FB58F88B558132DA0E87374EF38D456C740
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830C2A310
                                                      • CreateFileA.KERNEL32 ref: 0000023830C2A33F
                                                        • Part of subcall function 0000023830B4A170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B4A18D
                                                        • Part of subcall function 0000023830C29E50: type_info::_name_internal_method.LIBCMTD ref: 0000023830C29EF0
                                                        • Part of subcall function 0000023830C29E50: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830C29F56
                                                        • Part of subcall function 0000023830C29E50: CreateFileA.KERNEL32 ref: 0000023830C29F82
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFile$type_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 2627539804-0
                                                      • Opcode ID: 98ea87f00965d57ac3efe53a622e5d3c7e907a059cd269744f0d00fbdf9eee7f
                                                      • Instruction ID: fcb52ab279df3709ce652df608d0d968c73d6232d6f4a981949ba35ad0280f4e
                                                      • Opcode Fuzzy Hash: 98ea87f00965d57ac3efe53a622e5d3c7e907a059cd269744f0d00fbdf9eee7f
                                                      • Instruction Fuzzy Hash: D5113970618B888FE794EF28C44976AB7E1FB99301F40492DE08DC7361DF78C9458B42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C6121Initialize
                                                      • String ID:
                                                      • API String ID: 2978892875-0
                                                      • Opcode ID: d68fa1dd1f25c5d9833bb5b41399011af0f0bca26c4982c59452d0f3d9cb9bed
                                                      • Instruction ID: af97f34d6e6b9216ab848ba501808c8fc5153e5f3308ebb5a9df9cb34e718e82
                                                      • Opcode Fuzzy Hash: d68fa1dd1f25c5d9833bb5b41399011af0f0bca26c4982c59452d0f3d9cb9bed
                                                      • Instruction Fuzzy Hash: 3B115544E4E143C2FAD877BC4A622B882AD4F95344FC60830F91D962F7AD1EB8814672
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                      • String ID:
                                                      • API String ID: 1173176844-0
                                                      • Opcode ID: f263315650486d802dc5ceafc5012ad1b5bad17f869d85328af45017b7dfee40
                                                      • Instruction ID: 0b5737c7a68b976387ec22e2d3fc6819b6f456cd16b0ac3eb7fa7f6e66d88082
                                                      • Opcode Fuzzy Hash: f263315650486d802dc5ceafc5012ad1b5bad17f869d85328af45017b7dfee40
                                                      • Instruction Fuzzy Hash: A6F03A10E1B20BC1F9A9367E69561B881588F08770E9A0A30FD7C053F6EE1EA4958231
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID:
                                                      • API String ID: 1173767890-0
                                                      • Opcode ID: e69c9a9c49d4ee6c3f798fa87d3c6569f90dea24380c60c0f089c9dce256e6e2
                                                      • Instruction ID: 5617080ed245aedefee77394ce3e4618b5dafe733d4e471e1f25fe6cfc9cc99a
                                                      • Opcode Fuzzy Hash: e69c9a9c49d4ee6c3f798fa87d3c6569f90dea24380c60c0f089c9dce256e6e2
                                                      • Instruction Fuzzy Hash: 87A11332A16AC586DB12DB3D94116F9B760FF99789F568322DA0953772EF38E086C700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                      • Instruction ID: 515986f3d9523e0a5565f0f7a8f82575779862bbbaa360251e12571bf4d36ac1
                                                      • Opcode Fuzzy Hash: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                      • Instruction Fuzzy Hash: 13A19636619B84C6DBA0DB5EE49032AB7A4F7C8B94F504125EA8E83B78DF3CD450CB10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID:
                                                      • API String ID: 1173767890-0
                                                      • Opcode ID: de21e7c5d31184b69471703d2a4184fbe4103fe4db7ead91abe33dffa64577bf
                                                      • Instruction ID: 10cacf0bbaf2b8a7191e970e28dfb65747b8b5d29d9da1b36a73172b690d1ed1
                                                      • Opcode Fuzzy Hash: de21e7c5d31184b69471703d2a4184fbe4103fe4db7ead91abe33dffa64577bf
                                                      • Instruction Fuzzy Hash: DB810533918BC4C6D3629B2994423E9F3A0FF9D744F558326EA8963675EF39E491CB00
                                                      APIs
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 0000023830C6F2EC
                                                        • Part of subcall function 0000023830C6FD70: std::bad_alloc::bad_alloc.LIBCMTD ref: 0000023830C6FD79
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                      • String ID:
                                                      • API String ID: 680105476-0
                                                      • Opcode ID: 6b617ec2180372ffccc889888c4318af6079f51c42d92b87c56cb71e91508389
                                                      • Instruction ID: 7cfe0bf9987acf0070402e23aabec0b583292ff29ea33632cd411e22a7a4c31b
                                                      • Opcode Fuzzy Hash: 6b617ec2180372ffccc889888c4318af6079f51c42d92b87c56cb71e91508389
                                                      • Instruction Fuzzy Hash: 3F016DD0E25B0D0AFAB8B775489D3B922C4AB45B41FAC14A5F817CF3D3ED1C8A838610
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_task
                                                      • String ID:
                                                      • API String ID: 118556049-0
                                                      • Opcode ID: 68dcdc5df13b1305609106057423c5647b76bdd97cd7c73a0b3a13548c0169f4
                                                      • Instruction ID: 38019a71536c70a1c46d4fa9c148cba3e1dd01ed3e284ebf2e2b07b8c63cd7d1
                                                      • Opcode Fuzzy Hash: 68dcdc5df13b1305609106057423c5647b76bdd97cd7c73a0b3a13548c0169f4
                                                      • Instruction Fuzzy Hash: 6B01406161AF41C1DAA0AB3CE44032AE3A8FF88798F810734F69D82BF4DF2CD5108B14
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610C612F020F61310
                                                      • String ID: (Debug Log: Auto-disabled some ImGuiDebugLogFlags after 2 frames)$333?$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$Click %s Button to break in debugger! (remap w/ Ctrl+Shift)$Debug##Default$GImGui != 0$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$GetCurrentWindowRead()->Flags & ImGuiWindowFlags_Tooltip$HoveredId: 0x%08X$Left$Middle$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right$Size > 0$g.CurrentWindow->IsFallbackWindow == true$g.Font->IsLoaded()$g.MovingWindow && g.MovingWindow->RootWindow$g.Viewports.Size == 1$g.WindowsFocusOrder.Size <= g.Windows.Size$gfff$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                      • API String ID: 2611590445-8291574
                                                      • Opcode ID: d2b33133f733bc17b24e0179995df112248694f3bb075976cf1320d2884aa1a2
                                                      • Instruction ID: a7d2a7544934bb05ca262ba4e01f3fcb5e0f550e7d7360eddf91607c0b48075e
                                                      • Opcode Fuzzy Hash: d2b33133f733bc17b24e0179995df112248694f3bb075976cf1320d2884aa1a2
                                                      • Instruction Fuzzy Hash: F9C2B532A0A6C2C9E721EF39C8441F8B7A5FF54748F868235DA0D5B6B5DF38A585C720
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (flags & ImGuiWindowFlags_NoTitleBar) != 0$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$Size > 0$g.CurrentItemFlags & ImGuiItemFlags_Disabled$g.FrameCountEnded != g.FrameCount$g.WithinFrameScope$i >= 0 && i < Size$name != 0 && name[0] != '\0'$parent_window != 0 || !(flags & ImGuiWindowFlags_ChildWindow)$parent_window && parent_window->Active$window->DrawList->CmdBuffer.Size == 1 && window->DrawList->CmdBuffer[0].ElemCount == 0$window->RootWindowForNav->ParentWindow != 0$I9
                                                      • API String ID: 0-2388451983
                                                      • Opcode ID: c29060331ace846331e20e66a9d1f5e39d7db7b8322c727f0a345247015b0d45
                                                      • Instruction ID: aaa9b2627654beb843f9a44fda999a8c090c736c2a3a7182e8f89821e57421b6
                                                      • Opcode Fuzzy Hash: c29060331ace846331e20e66a9d1f5e39d7db7b8322c727f0a345247015b0d45
                                                      • Instruction Fuzzy Hash: DE33E232A09685D7E759DB3A81803B9F7A0FF59344F498335DB59235B1DB38B0A8DB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: (g.IO.BackendPlatformUserData == 0) && "Forgot to shutdown Platform backend?"$(g.IO.BackendRendererUserData == 0) && "Forgot to shutdown Renderer backend?"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Forgot to shutdown Platform backend?$Forgot to shutdown Renderer backend?
                                                      • API String ID: 1173767890-2716422499
                                                      • Opcode ID: 8631f41f780fcb6922e1570db1d0de5d2e5d582f4444700ffc315402fe0eb1ef
                                                      • Instruction ID: 07f136515e77b3f19ed91543c4f4a537ad8fe95a71cca93ff46942567c05aeba
                                                      • Opcode Fuzzy Hash: 8631f41f780fcb6922e1570db1d0de5d2e5d582f4444700ffc315402fe0eb1ef
                                                      • Instruction Fuzzy Hash: 2E429C3260AA96D2D709EF28C6941FCB3B5FB54B88F894131DA0D472B5DF38E566C320
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (flags & ImGuiWindowFlags_NoTitleBar) != 0$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$Size > 0$g.CurrentItemFlags & ImGuiItemFlags_Disabled$i >= 0 && i < Size$parent_window != 0 || !(flags & ImGuiWindowFlags_ChildWindow)$parent_window && parent_window->Active$window->DrawList->CmdBuffer.Size == 1 && window->DrawList->CmdBuffer[0].ElemCount == 0$window->RootWindowForNav->ParentWindow != 0$I9
                                                      • API String ID: 0-1399954118
                                                      • Opcode ID: 2366ae1ffdddb15ae9c2369d0337967145d3a235c4a996f97e259f8e22bda170
                                                      • Instruction ID: 7fffd37e10a8a7451c3d7039add770c209107b299ca7011aea92297d69324460
                                                      • Opcode Fuzzy Hash: 2366ae1ffdddb15ae9c2369d0337967145d3a235c4a996f97e259f8e22bda170
                                                      • Instruction Fuzzy Hash: A423D232A09785D7E75ADB3A81803A9F7A0FF59344F498336DB59235B1DB38B0A8D710
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (inner_window->IDStack.back() == table_instance->TableInstanceID) && "Mismatching PushID/PopID!"$(outer_window->DC.ItemWidthStack.Size >= temp_data->HostBackupItemWidthStackSize) && "Too many PopItemWidth!"$(table->Flags & ImGuiTableFlags_ScrollX) == 0$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$Mismatching PushID/PopID!$Size > 0$Too many PopItemWidth!$g.CurrentWindow == outer_window && g.CurrentTable == table$g.TablesTempDataStacked > 0$i >= 0 && i < Size$inner_window == g.CurrentWindow$outer_window == inner_window || outer_window == inner_window->ParentWindow$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table != 0 && "Only call EndTable() if BeginTable() returns true!"$table->RowPosY2 == inner_window->DC.CursorPos.y
                                                      • API String ID: 0-29353104
                                                      • Opcode ID: d27b88a7b84d60060f1d43e547a95b6d442e419a7e3b281061a1875b2de5c0e7
                                                      • Instruction ID: 9a1fd11a742434a9474621e7b02b98d351c30b757b179cc174ddb87bfca74e54
                                                      • Opcode Fuzzy Hash: d27b88a7b84d60060f1d43e547a95b6d442e419a7e3b281061a1875b2de5c0e7
                                                      • Instruction Fuzzy Hash: 7572D432A0A686D6E755EB3AC5843F8B3A0FF59744F868231DA4D121B1DF38B5D5CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: State
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$ImGui::IsNamedKey(key)
                                                      • API String ID: 1649606143-1336968070
                                                      • Opcode ID: 320e79d58a395caa32967525c0a4eeebff8b16c0838ad5b5bb5afecf55618b72
                                                      • Instruction ID: d87884b679490f69ddfcb52e214a03053fce6c3bb58fa3ba6236466cc4f6a35e
                                                      • Opcode Fuzzy Hash: 320e79d58a395caa32967525c0a4eeebff8b16c0838ad5b5bb5afecf55618b72
                                                      • Instruction Fuzzy Hash: EB912411E9E266C5FBF5B67C54013B9AA899F61748FDB0231FC6E061F5CF2C68829230
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$F61310$C610C61149F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$N/A$i >= 0 && i < Size$tab->LastFrameVisible >= tab_bar->PrevFrameVisible$tab->NameOffset < tab_bar->TabsNames.Buf.Size
                                                      • API String ID: 1871915874-1788247872
                                                      • Opcode ID: 5820abf3aa6e2a9a6435a52d051bc92cb930e41dc594480a9ee2bd64a6871ad2
                                                      • Instruction ID: cceccd0b3f322e0c8a7457cb8a3242cfb049269882646f207a74026c57a82fdd
                                                      • Opcode Fuzzy Hash: 5820abf3aa6e2a9a6435a52d051bc92cb930e41dc594480a9ee2bd64a6871ad2
                                                      • Instruction Fuzzy Hash: 9DB2E272A0A685CAE751EF7AC040178B7A0FF58789F968736DA4D632B4DF38E491C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: 0 && "Unknown event!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Processed$Remaining$button >= 0 && button < ImGuiMouseButton_COUNT$i >= 0 && i < Size$it >= Data && it < Data + Size && it_last >= it && it_last <= Data + Size$key != ImGuiKey_None$n >= 0 && n < BITCOUNT
                                                      • API String ID: 2490902527-1923509833
                                                      • Opcode ID: 9d7122f77f4900601a9ab4d39e2c51fd7ef0a40f690763102c54c3d4c4e04866
                                                      • Instruction ID: 36274bf21f1779ec772152d26d2e48c574e9a273905fe713e4bc09024ce320be
                                                      • Opcode Fuzzy Hash: 9d7122f77f4900601a9ab4d39e2c51fd7ef0a40f690763102c54c3d4c4e04866
                                                      • Instruction Fuzzy Hash: E242F772B092C2C7EB28AB3996903B9BB90FB41744F854235DA9D476B5CF3CE558C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610F020F61310
                                                      • String ID: (flags & ImGuiWindowFlags_NoTitleBar) != 0$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$Size > 0$g.CurrentItemFlags & ImGuiItemFlags_Disabled$i >= 0 && i < Size$parent_window && parent_window->Active$window->DrawList->CmdBuffer.Size == 1 && window->DrawList->CmdBuffer[0].ElemCount == 0
                                                      • API String ID: 310658293-724765148
                                                      • Opcode ID: b3f1eb45414ba6ca7e6f33ea2a8bd9fa96ac1de2a171c15e36db0dbd62f6233c
                                                      • Instruction ID: fb107803c410fca0cf36f8c54d5f9b9a01ee323205099f9712aa9a9456cee65c
                                                      • Opcode Fuzzy Hash: b3f1eb45414ba6ca7e6f33ea2a8bd9fa96ac1de2a171c15e36db0dbd62f6233c
                                                      • Instruction Fuzzy Hash: FD03F532A09685D7E71ADB3A81803A9F7A0FF59344F498735DB59235B1DB38B0B8DB10
                                                      APIs
                                                      • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7AB945CA0), ref: 00007FF7AB9471A7
                                                      • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB947227
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610F020F61310
                                                      • String ID: !g.Initialized && !g.SettingsLoaded$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$FindSettingsHandler(handler->TypeName) == 0$Table$Window$n >= 0 && n < BITCOUNT
                                                      • API String ID: 310658293-416841283
                                                      • Opcode ID: b9b3de01245e37adca7394df7974af3e1a3ec5f9ef583498da9b1ef0e776df8a
                                                      • Instruction ID: 0b9b6aae08ced7ca1c728b9dee6b89388b86acaeb9a2f0f76a6d28386944feb6
                                                      • Opcode Fuzzy Hash: b9b3de01245e37adca7394df7974af3e1a3ec5f9ef583498da9b1ef0e776df8a
                                                      • Instruction Fuzzy Hash: 74128E72A0AB86C6EB54DF28E8942A9B7E4FB58744F854236DA8D433B5DF3CE055C310
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: ClipboardGlobal$ByteCharMultiWide$AllocCloseDataEmptyFreeLockOpenUnlock
                                                      • String ID:
                                                      • API String ID: 1965520120-0
                                                      • Opcode ID: ebbd9d8b24dcedb596b0ca59058d4c86985b5e6383d3a38eef27f5b3966815bd
                                                      • Instruction ID: e476598d7d598cd96bab23a4343e3def56de6f50366837f848c0663cc171f140
                                                      • Opcode Fuzzy Hash: ebbd9d8b24dcedb596b0ca59058d4c86985b5e6383d3a38eef27f5b3966815bd
                                                      • Instruction Fuzzy Hash: AC11B621B0AA02C2F7A4BB39B854239EAA5AF49BD1F454235EA4D437B4DF3CD0504710
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !is_visible$#ContextMenu$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->IndexWithinEnabledSet <= column->DisplayOrder$i >= 0 && i < Size$p >= Data && p < DataEnd$table->IsLayoutLocked == false$table->LeftMostEnabledColumn >= 0 && table->RightMostEnabledColumn >= 0
                                                      • API String ID: 0-1387518580
                                                      • Opcode ID: 19ad48cc859dbbf9d7e2c9b3bb525ef016caea7ee0b204106524b712a34c540f
                                                      • Instruction ID: d6400dc893f517c8909f3cd0d02556258334189fe4056531d4355f5c7e62d0e2
                                                      • Opcode Fuzzy Hash: 19ad48cc859dbbf9d7e2c9b3bb525ef016caea7ee0b204106524b712a34c540f
                                                      • Instruction Fuzzy Hash: 67E2E232A09685E6E755EB3AC1803B8BBA0FF59744F898325DB48135B1DB38F4E5CB11
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                      • API String ID: 0-2705777111
                                                      • Opcode ID: 7387cb7062473289dbeb18ad4c2dbe16db4f777bf50c27aa19cab214a4cdd61b
                                                      • Instruction ID: b7dc31ff9f4e4330a4d566bb90531b02c35f3a808dd48bbcb082a67ca91f379c
                                                      • Opcode Fuzzy Hash: 7387cb7062473289dbeb18ad4c2dbe16db4f777bf50c27aa19cab214a4cdd61b
                                                      • Instruction Fuzzy Hash: 7A728023A19BE885D343DB3A90411B9B7A1EF6E784F5AC323ED44A6672EB3CD551C700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$00007C610CloseDataF020Open
                                                      • String ID:
                                                      • API String ID: 330523670-0
                                                      • Opcode ID: 26d566c6706ed3b603c2ca6413b7fcc995dc930fd5e624c9433e805aea778b59
                                                      • Instruction ID: 5f5584ed59e0c84e8d1a6b08fb38231fb4b6c514305471e08ff77a736a3a2519
                                                      • Opcode Fuzzy Hash: 26d566c6706ed3b603c2ca6413b7fcc995dc930fd5e624c9433e805aea778b59
                                                      • Instruction Fuzzy Hash: A931A33270AB81C3E754AF3AB95416EA6A4FF88B90F954134EE8D437B4DF3CD4619620
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (flags & ImGuiWindowFlags_NoTitleBar) != 0$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$Size > 0$i >= 0 && i < Size$parent_window && parent_window->Active$window->DrawList->CmdBuffer.Size == 1 && window->DrawList->CmdBuffer[0].ElemCount == 0
                                                      • API String ID: 0-3978694688
                                                      • Opcode ID: 3f237e97552aa75c3248c785fd912f95460ea14028f4fd3e92683d1cb82a74cd
                                                      • Instruction ID: 175d1ac45f647fc721ded8cc78d502f7cf5d9973a873d27cc0eb8298c5ec48e5
                                                      • Opcode Fuzzy Hash: 3f237e97552aa75c3248c785fd912f95460ea14028f4fd3e92683d1cb82a74cd
                                                      • Instruction Fuzzy Hash: 9EE2D332A05789DBE71ADB3B81803A9F360FF59344F498725DB59235B1DB38B0B89B10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 3140674995-0
                                                      • Opcode ID: 8964dd5a87bbd0479f9b080791705f60ec265abbfbc2f45a2eb81db15352648c
                                                      • Instruction ID: 1462cfe55a3bdeda790e1371d867c1cb6dd003890bd16d8244aca7be324ebc4f
                                                      • Opcode Fuzzy Hash: 8964dd5a87bbd0479f9b080791705f60ec265abbfbc2f45a2eb81db15352648c
                                                      • Instruction Fuzzy Hash: DF313D72609A81CAEBA0AF64E8803EDB374FB45744F85403AEA4D47BB5DF38D558C720
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !scoring_rect.IsInverted()$<NULL>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: from move, window "%s", layer=%d$[nav] NavMoveRequest: clamp NavRectRel for gamepad move$[nav] NavMoveRequestForward %d$g.NavMoveDir != ImGuiDir_None && g.NavMoveClipDir != ImGuiDir_None$g.NavMoveFlags & ImGuiNavMoveFlags_Forwarded
                                                      • API String ID: 0-1751011103
                                                      • Opcode ID: ad27c87af09b4b14593f7e486a964ee187bae4ca7698edc377c855b789bca920
                                                      • Instruction ID: d733269e21e59511ec487348edb65d49ac526a9f80b28a1fc5888338d74cf271
                                                      • Opcode Fuzzy Hash: ad27c87af09b4b14593f7e486a964ee187bae4ca7698edc377c855b789bca920
                                                      • Instruction Fuzzy Hash: 29321A32D19FCAC2E352AB3A81812F8F350EF69794F598332DE58361F5DF2975858620
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$dx >= 0$dy >= 0$e->ey >= y_top$e->sy <= y_bottom && e->ey >= y_top$fabsf(area) <= 1.01f$sy1 > y_final-0.01f$x >= 0 && x < len
                                                      • API String ID: 0-3568222241
                                                      • Opcode ID: 790997296c3ace0f49b917fc0f4bb1bfed2a2440f2ab62fef7e3b804057f5052
                                                      • Instruction ID: 75c64b67b0be7fd2c5ccfbf63aa0c0fec0baa009780d80a55a6d7aa1599323e6
                                                      • Opcode Fuzzy Hash: 790997296c3ace0f49b917fc0f4bb1bfed2a2440f2ab62fef7e3b804057f5052
                                                      • Instruction Fuzzy Hash: D312E922D19B8DC2E212AB3B54820B5F350AFBF3C4F5A9732F948765B2DF2C71919611
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (flags & ImGuiWindowFlags_NoTitleBar) != 0$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$Size > 0$i >= 0 && i < Size$window->DrawList->CmdBuffer.Size == 1 && window->DrawList->CmdBuffer[0].ElemCount == 0
                                                      • API String ID: 0-2721633926
                                                      • Opcode ID: 3a8582e69ec41eebc354e7f3caa078da1806b86749e4762b78b60ad9c07f036c
                                                      • Instruction ID: a38b5ff3558253dfc49e227695a13ad7581007a7b886caea4d6e084c4fd161b3
                                                      • Opcode Fuzzy Hash: 3a8582e69ec41eebc354e7f3caa078da1806b86749e4762b78b60ad9c07f036c
                                                      • Instruction Fuzzy Hash: C7C2D633A05789DBE71ADB3B81803A9F760FF59344F458726DB59231B1DB28B4B89B10
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (flags & ImGuiWindowFlags_NoTitleBar) != 0$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$Size > 0$i >= 0 && i < Size$window->DrawList->CmdBuffer.Size == 1 && window->DrawList->CmdBuffer[0].ElemCount == 0
                                                      • API String ID: 0-2721633926
                                                      • Opcode ID: 41937ffa5ad39c361a51778d9266a22bdb3efdcbd2e22226a5c421d51cc7aa34
                                                      • Instruction ID: 3041236ec147840cb4850b93b3b89224ef23899047a0f0635fd3532353cdb2ef
                                                      • Opcode Fuzzy Hash: 41937ffa5ad39c361a51778d9266a22bdb3efdcbd2e22226a5c421d51cc7aa34
                                                      • Instruction Fuzzy Hash: 6DB2D532A05789DBE75ADB3A81803E9F360FF59344F458726DB59231B1DB38B0B89B10
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (0) && "Calling PopItemFlag() too many times!"$*Missing Text*$<Unknown>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Calling PopItemFlag() too many times!$p >= Data && p < DataEnd
                                                      • API String ID: 0-3275063505
                                                      • Opcode ID: 3f237b405e67921bd9baae32f9dd3e624540f6d79c49b90a67d27e0e418c0d1c
                                                      • Instruction ID: 7056fe7d5ec4b18217b2ed1e64652b640b73b92ab856e0f83c8d27a5145ac9b9
                                                      • Opcode Fuzzy Hash: 3f237b405e67921bd9baae32f9dd3e624540f6d79c49b90a67d27e0e418c0d1c
                                                      • Instruction Fuzzy Hash: 2CB10972A0E642D2EB54AB2CD5442B8A7E1FF45B88F964035DE4C036B5DF3CE8A5C760
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s"$g.NavActivateDownId == g.NavActivateId$g.NavLayer == ImGuiNavLayer_Main || g.NavLayer == ImGuiNavLayer_Menu$g.NavMoveDir == ImGuiDir_None$g.NavWindow != 0
                                                      • API String ID: 0-2167808928
                                                      • Opcode ID: 7671274bc0dd26eb4ebbe6ea0c97f13e0fad0c97d3858c6814ea3660373551da
                                                      • Instruction ID: c771f5f4a1d4a9086502476e088ef2e36a66e93c537d12dd863300c8282585e1
                                                      • Opcode Fuzzy Hash: 7671274bc0dd26eb4ebbe6ea0c97f13e0fad0c97d3858c6814ea3660373551da
                                                      • Instruction Fuzzy Hash: 4172C032D0A6C2C9F765AB3DC0847B9A791EF45B48F8A4335DA5C072F1CB7864A9C721
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$button >= 0 && button < ((int)(sizeof(g.IO.MouseDown) / sizeof(*(g.IO.MouseDown))))$button >= 0 && button < ImGuiMouseButton_COUNT$id != 0
                                                      • API String ID: 2490902527-2768765550
                                                      • Opcode ID: 4c5858ae4fe6bd66d00e95a885ed09769b91269d42ad093b2d2eebc05ab20f39
                                                      • Instruction ID: 1ca4b995b53f8be1a0a0bc4530622c67015a1b77980be51a9d66671c51e6700e
                                                      • Opcode Fuzzy Hash: 4c5858ae4fe6bd66d00e95a885ed09769b91269d42ad093b2d2eebc05ab20f39
                                                      • Instruction Fuzzy Hash: 3E22E932E0E2C6C6EB69AA3D91403B9E6D1AF45344F964235DE5D272F1CF3CB4948B20
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #RESIZE$5$6$C:\Users\55yar\Desktop\imgui-master\imgui.h$idx == 0 || idx == 1
                                                      • API String ID: 0-650503096
                                                      • Opcode ID: d6c8c0afbd8b1871df6ce445ef2f1cba41de2b837bf73b3bb49d2c8bf29cc9b7
                                                      • Instruction ID: fa69f7f9d8d6be658b952678e61cc548b1fe25b4ec01571d3c04a971b3e2efac
                                                      • Opcode Fuzzy Hash: d6c8c0afbd8b1871df6ce445ef2f1cba41de2b837bf73b3bb49d2c8bf29cc9b7
                                                      • Instruction Fuzzy Hash: 4AB24832D09A89C6E356EB3AD4412B9F760EF5A344F5A8731EA4C275B1DF38B485CB10
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$p >= begin() && p < end()$settings->ColumnsCount == table->ColumnsCount && settings->ColumnsCountMax >= settings->ColumnsCount$settings->ID == table->ID
                                                      • API String ID: 0-2168725360
                                                      • Opcode ID: 81fdfe0895e2e1dec32a2632009a5933e542f692bb517f10a4627c86eb4c6a01
                                                      • Instruction ID: 047b171ce5701f48d8c746c4512060ed9cd0b0d2ae9b0f4598b5068dacdb3e5a
                                                      • Opcode Fuzzy Hash: 81fdfe0895e2e1dec32a2632009a5933e542f692bb517f10a4627c86eb4c6a01
                                                      • Instruction Fuzzy Hash: ED61D17390A681CADB50DF29E4842A9BBE0FF41744F85C436DA8D472B5DB3CE595CB20
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                      • String ID:
                                                      • API String ID: 2933794660-0
                                                      • Opcode ID: 68b080e5c74ecdc989d9497fb427bfec2812cf223949a70a0905cf8ba2b6c893
                                                      • Instruction ID: 5808f8c912b0745533ae7b0ac4baa810991b4f6f24ba14ced7aa0ae9173c2a55
                                                      • Opcode Fuzzy Hash: 68b080e5c74ecdc989d9497fb427bfec2812cf223949a70a0905cf8ba2b6c893
                                                      • Instruction Fuzzy Hash: 2D118832B05B05CAFB009F74E8542B873A4FB1A758F800E31EA2D867B4DF38D0698390
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ##NavUpdateWindowing$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0$shared_mods != 0
                                                      • API String ID: 0-1670481530
                                                      • Opcode ID: b7e2bca78996d73e6df91f3e007b39354a8ddc98e3e5df1b4a813864c6d28128
                                                      • Instruction ID: ae16604191cb50dc19864eea906a8fb3f07a1c73b0ca0f89410292002e7d2371
                                                      • Opcode Fuzzy Hash: b7e2bca78996d73e6df91f3e007b39354a8ddc98e3e5df1b4a813864c6d28128
                                                      • Instruction Fuzzy Hash: 6F62E732E0A686D6E759AB3981D43B9A390FF45754F868235CA5C132F2DF3CB498C721
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #CLOSE$#COLLAPSE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 0-766050946
                                                      • Opcode ID: a67e50b83d592246443fcd8d3d152a588ef8dd5db0c3927b8a3e062520e6a67e
                                                      • Instruction ID: 5149a548888c46c9427a417597e9dca9da193e57ebd8d7eff4dc35554ed516a1
                                                      • Opcode Fuzzy Hash: a67e50b83d592246443fcd8d3d152a588ef8dd5db0c3927b8a3e062520e6a67e
                                                      • Instruction Fuzzy Hash: 35122C32E09B89C5E711DB3A90416F9F760EF6A344F569732EE4C236B1DF29A085C710
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$ImMax(size_contents_v, size_visible_v) > 0.0f$idx == 0 || idx == 1
                                                      • API String ID: 0-3128625980
                                                      • Opcode ID: d744e562028f4b66b108c56f552990e2abd130176bffe4103f61c6c0364d74d3
                                                      • Instruction ID: 8458790f3701dc36212c68ad4faa2bf914acd31f497c57f353493593a6815d01
                                                      • Opcode Fuzzy Hash: d744e562028f4b66b108c56f552990e2abd130176bffe4103f61c6c0364d74d3
                                                      • Instruction Fuzzy Hash: 0C123722D19BDDC6E213A67B94412B9E350AF6E385F5DCB32FD48325B1DF28B0C19650
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ##v$#ComboPopup$C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 0-2429816084
                                                      • Opcode ID: 8d46a56935c2483b85baddb845902eca00119b29638dba1ede19879076b754c5
                                                      • Instruction ID: 18d76e5bbfcc90a36640b13c26bf8fdc7cba0180fd7bfcb368c085d223cb1665
                                                      • Opcode Fuzzy Hash: 8d46a56935c2483b85baddb845902eca00119b29638dba1ede19879076b754c5
                                                      • Instruction Fuzzy Hash: 2DE10532E19B89CAE311DB7A84402F9B360FF69348F969726EE08375B5DF28A055D710
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (0) && "Calling PopItemFlag() too many times!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Calling PopItemFlag() too many times!
                                                      • API String ID: 0-102052167
                                                      • Opcode ID: 115397381942e15198dfb801fe7992c76b0b96dc602557bbf8e8a78697b33bdd
                                                      • Instruction ID: 100efbd7569160c230831a5d559226be7d874485079cd53e0a3c91f7f3e4a86e
                                                      • Opcode Fuzzy Hash: 115397381942e15198dfb801fe7992c76b0b96dc602557bbf8e8a78697b33bdd
                                                      • Instruction Fuzzy Hash: 51E1E572919AC9C5E326AB3A94413F9F3A0FF59744F498332EE89271B1DF29A0D5C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID:
                                                      • API String ID: 1173767890-0
                                                      • Opcode ID: 643325f106a4015a9651018ec23825aa08e0a3e246b7ab18464e5e75462acc61
                                                      • Instruction ID: 574457a0e148aaff62e661b6d24b6b9657e63be607deb34ce97ba0409f7262a3
                                                      • Opcode Fuzzy Hash: 643325f106a4015a9651018ec23825aa08e0a3e246b7ab18464e5e75462acc61
                                                      • Instruction Fuzzy Hash: FAB12733A15AD5C6D321EF3994552BEF7A4FF58B84F458322EB8512674EB39E082C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: InfoKeyboardLayoutLocale
                                                      • String ID:
                                                      • API String ID: 1218629382-0
                                                      • Opcode ID: 9e33f65f36021c76e3ce5085f13d9bf961fb33b85001965e3fe80dccfd441406
                                                      • Instruction ID: 82bd28c9236dd5cfef8bf22ae346986516595f14276829e2daa26d73d918349a
                                                      • Opcode Fuzzy Hash: 9e33f65f36021c76e3ce5085f13d9bf961fb33b85001965e3fe80dccfd441406
                                                      • Instruction Fuzzy Hash: 46F0EC22A11A81C2E7A28B3AA0006AEA398FB08750F564037CF8D43230CE38D4C3C700
                                                      Strings
                                                      • (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened, xrefs: 00007FF7AB95C2E4
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF7AB95C2DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened$C:\Users\55yar\Desktop\imgui-master\imgui.cpp
                                                      • API String ID: 0-3836044477
                                                      • Opcode ID: fd5fe447b9d7518a35cc5895bd672c193580b2feb93a140ec6dd6fc64d8195f5
                                                      • Instruction ID: 501e89b442b48d0ec9ec00d388eb1e50f85a7aa55180090699c43a457d558646
                                                      • Opcode Fuzzy Hash: fd5fe447b9d7518a35cc5895bd672c193580b2feb93a140ec6dd6fc64d8195f5
                                                      • Instruction Fuzzy Hash: 16D1C823D4EA8EC1F222763F40821B9E3A09F7E385F5A9732FD5C765B1DB2876894510
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !(o > b->size || o < 0)$C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                      • API String ID: 0-2013812653
                                                      • Opcode ID: fdb839840d1717f9b44b9ca140c23bba9e5d56527fed56afe8963279d5580143
                                                      • Instruction ID: a7c406c68ad71d80434e776c9fa878899a21d381ef2993fee3ca8bbaa8f94ac1
                                                      • Opcode Fuzzy Hash: fdb839840d1717f9b44b9ca140c23bba9e5d56527fed56afe8963279d5580143
                                                      • Instruction Fuzzy Hash: A3B1BE32A08AC4CAE701DF7E94811BDBBB0FB8D385F555325EF8922675DB78A585CB00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i*stride_in_bytes] == 0
                                                      • API String ID: 0-15633718
                                                      • Opcode ID: 32ad749d566af6c39d93c85aa81a55f15b3c0c613e78de5831523cd2df5458f3
                                                      • Instruction ID: 7931128112de4f7ca80933810be8d4fb244d224949887ff5f3de35bbb9d5612c
                                                      • Opcode Fuzzy Hash: 32ad749d566af6c39d93c85aa81a55f15b3c0c613e78de5831523cd2df5458f3
                                                      • Instruction Fuzzy Hash: 4F712773A0D2E287D326572CA85036EFEE1B78D344F5E8235FAC9C2B65C93CD5118A51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i] == 0
                                                      • API String ID: 0-2060079458
                                                      • Opcode ID: 4e2adfccef81c1e3fbce711a22a967c822f26381485c6c60a2143650ecba5023
                                                      • Instruction ID: 0a294fbde6999c4736188fb1822af06497f856bc90fd55cfe99816d69187caf5
                                                      • Opcode Fuzzy Hash: 4e2adfccef81c1e3fbce711a22a967c822f26381485c6c60a2143650ecba5023
                                                      • Instruction Fuzzy Hash: D271256362D6E186C3119B3D981167AFFE1E789304F594235EACC83B74DA3ED104CB11
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$text_end != 0
                                                      • API String ID: 0-48455972
                                                      • Opcode ID: a09c2614e3254487966167fc92d77515f9d689761ec6439a3a093dfee68bc64c
                                                      • Instruction ID: a251bd7607742e17f18f40c783aeed5747b1f1364d22eb23831796b99ea03128
                                                      • Opcode Fuzzy Hash: a09c2614e3254487966167fc92d77515f9d689761ec6439a3a093dfee68bc64c
                                                      • Instruction Fuzzy Hash: 4341A731A0A659C6F9A1A93B5480179E691EF59780FDA8733DD08166B49B38E4C18A10
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 0-1180621679
                                                      • Opcode ID: 6ed20166e65553b91257ace29f513335ab454b8572dbed2f61cfc2601968656f
                                                      • Instruction ID: 11ec839a4ceb9f8892cac7176b7b49b3f745981a2bf9c8c01d1e9beaecc11041
                                                      • Opcode Fuzzy Hash: 6ed20166e65553b91257ace29f513335ab454b8572dbed2f61cfc2601968656f
                                                      • Instruction Fuzzy Hash: AC31AE72B141E58FEB94CB76A860F797B60E3D5782B8A6121EF8417A58C73CD111CB60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 0-1180621679
                                                      • Opcode ID: 41e8903e6fabd6bbd9ecf70a232ba5207c90942fc97139b669773e5e4f2473b7
                                                      • Instruction ID: a68e881c62efc097623e31a1de3c4bdaeccef829143df1f81e2546980b4ceafe
                                                      • Opcode Fuzzy Hash: 41e8903e6fabd6bbd9ecf70a232ba5207c90942fc97139b669773e5e4f2473b7
                                                      • Instruction Fuzzy Hash: 2A110AB1609691C6DB44CB65D4F0079B7A0F788781F82103BEBCE07669DE3CD195C760
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P
                                                      • API String ID: 0-3110715001
                                                      • Opcode ID: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                      • Instruction ID: fdaff0e9fc7219f08d39f51520c1baee09abd8824fa571b517c8a1210c9afaa7
                                                      • Opcode Fuzzy Hash: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                      • Instruction Fuzzy Hash: 8E12E1706187448FD348DF28C490A6AB7E2FBCD308F504AADF58AD7765DA34EA41CB42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: af22b2a64cd9b34464c746f31960b8c553625a99857650b96e506a8a1dbf1dca
                                                      • Instruction ID: ec1a7112c401c5248942de613be487937b399c49e7538149e9f979c49f6cfe31
                                                      • Opcode Fuzzy Hash: af22b2a64cd9b34464c746f31960b8c553625a99857650b96e506a8a1dbf1dca
                                                      • Instruction Fuzzy Hash: 40E12B7421CB888FEBA4DF18D45876AB7E1FB99305F10595DE08EC32A0DB78D885DB06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                      • API String ID: 0-2705777111
                                                      • Opcode ID: 64546066472ca3b8349dd8d249968d4cd0d82be6d00cd49db611cd94df8f4d3b
                                                      • Instruction ID: 4eed2ecab0f294bf22c8eb7f67524078f35b43f16577ea3c2363a38727f695c9
                                                      • Opcode Fuzzy Hash: 64546066472ca3b8349dd8d249968d4cd0d82be6d00cd49db611cd94df8f4d3b
                                                      • Instruction Fuzzy Hash: AB5115B6A250B583EA609F2AC8D15BC77D1E74E742FD48076D25882EB1C52DC14A9F21
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4cec9f3207f90c17bf83e7f319c363e9946d9f7723929caf69ceb34e99a9d0ca
                                                      • Instruction ID: e39814cb6df9727f798bc50a60ee1a3ba099fd6d137dacb3d2fd957af55e06be
                                                      • Opcode Fuzzy Hash: 4cec9f3207f90c17bf83e7f319c363e9946d9f7723929caf69ceb34e99a9d0ca
                                                      • Instruction Fuzzy Hash: E5925F33925B8886C716CF3B9481169BB60FFADB84B16D716EE0823775EB35E494DB00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C612
                                                      • String ID:
                                                      • API String ID: 1428191659-0
                                                      • Opcode ID: fe0cf0a24c23df17e732a26cca348952e46e2a57f34f0cc16e213b989c523f67
                                                      • Instruction ID: 6d5d7a83527668166e1bf52c0dfc980297d15a8bffbd890f6c4fb520d0b1a258
                                                      • Opcode Fuzzy Hash: fe0cf0a24c23df17e732a26cca348952e46e2a57f34f0cc16e213b989c523f67
                                                      • Instruction Fuzzy Hash: FD829E73805BC187D328CF34B9981DAB7A8FB55340F115219DBF623A61DB78E1A6E708
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6bbb6e06cd0572142406bc8820cf09fa7d9373683b7a630237fee7807b62f422
                                                      • Instruction ID: 3e6df2a5a2391efff9aeabd6dd66d0a1f2db03d2f3df4108a17f92255402a5a2
                                                      • Opcode Fuzzy Hash: 6bbb6e06cd0572142406bc8820cf09fa7d9373683b7a630237fee7807b62f422
                                                      • Instruction Fuzzy Hash: F822D172E096C5CAE7119BBA90403FEF7B0EB59349F494335EE48265B5DB38A494CB20
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c9cecffe5e39252dc6b37e68d711e718fe0b460a9a36639389aa25d1d7f6c5b7
                                                      • Instruction ID: 7fe8a463c132f55784e5b2819f07dde2770581723b20a67324ec8291625cbad7
                                                      • Opcode Fuzzy Hash: c9cecffe5e39252dc6b37e68d711e718fe0b460a9a36639389aa25d1d7f6c5b7
                                                      • Instruction Fuzzy Hash: 4E020C23E19B89C7D211A63A94421B9F360FFAF384F655721FE44229B2DF29F0919B10
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e9ad75ff6661641dfb7484e34b5a95549a9178d9c6d9aff604fea6769ac66a9f
                                                      • Instruction ID: 0f209f325bf8e4889621508c648ae9b7b17854edc4fae3b63bd5430c6a290c5e
                                                      • Opcode Fuzzy Hash: e9ad75ff6661641dfb7484e34b5a95549a9178d9c6d9aff604fea6769ac66a9f
                                                      • Instruction Fuzzy Hash: 67F1C2B290A682CAE771AA6D91403BEB7A0EB45745F9E4134DE99072F5CF3FE444C720
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f2afc71bcb6e60fe6b48f1fd428c52dd563754f62c92c5580ba7913ac805761
                                                      • Instruction ID: 9052f5af9320973ec0e7e6cfb25c7e89bbf79c1f9a12379c1c20baf19d809282
                                                      • Opcode Fuzzy Hash: 2f2afc71bcb6e60fe6b48f1fd428c52dd563754f62c92c5580ba7913ac805761
                                                      • Instruction Fuzzy Hash: 9CD1A36290F6C2DDEB65AE3D40003B9A7D0AF1A748F9E8135ED491A5F6CF3CA8459331
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 921d0129446da77aaddaa4aa987365c8784144cb00f78a1ee875d2a03e3975c2
                                                      • Instruction ID: 5cfabf095afd8dd7c591e78f6067ccaa675d2baae6cacf325a58fa847bf6ff3f
                                                      • Opcode Fuzzy Hash: 921d0129446da77aaddaa4aa987365c8784144cb00f78a1ee875d2a03e3975c2
                                                      • Instruction Fuzzy Hash: 15C12A36750B8982EB148F3BD454BAD6771EB9AF89F09D235CE0A17B68DF3AC1458700
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 562b7d3f91c9f74b619fe1397834ae2ab76450cf0a24359a5ff58522b0b22631
                                                      • Instruction ID: 3c83afebc23a68b59caec114f128465548c64d0e6ffbb656212fa965dc41208d
                                                      • Opcode Fuzzy Hash: 562b7d3f91c9f74b619fe1397834ae2ab76450cf0a24359a5ff58522b0b22631
                                                      • Instruction Fuzzy Hash: 48B18722E28FCC81E223A63754821F9E650AF7F3C5F2EDB23FD84756B2AB2561D15510
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4a80b03f7bc89fefc7a1c72021f62cde799e707efb33d253c2770a742c07cca4
                                                      • Instruction ID: 116632f423921f2b9a854e25e3459c011d824e415750250ffda8e1523d4a9c73
                                                      • Opcode Fuzzy Hash: 4a80b03f7bc89fefc7a1c72021f62cde799e707efb33d253c2770a742c07cca4
                                                      • Instruction Fuzzy Hash: 2BD1C132D4A3C1DAE3519F3984807F87B94FB66B08F4E837ADB8817666CB2954549B30
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3416371920b2550550669ab83c2473f1f835fb7ea68a55657360c14b7f5196a9
                                                      • Instruction ID: 9d611ea7753f18ae71fd43546439a64d695fadd02fb2f041f87939b6ea1afab5
                                                      • Opcode Fuzzy Hash: 3416371920b2550550669ab83c2473f1f835fb7ea68a55657360c14b7f5196a9
                                                      • Instruction Fuzzy Hash: EE912432959685C7E356AF3A90803FEB3A0FF04768F598335CB59161F5DB38B5898B20
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                      • Instruction ID: 8f60a195d6f7ff8a9d00f3ef039faeb7920a6cf85c5f7e98934ea5b2fa68ee25
                                                      • Opcode Fuzzy Hash: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                      • Instruction Fuzzy Hash: 48410DDFC0DAC51BC7428664ACAA6827F709A2324EBCF58DBD498CA587F048D409D712
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C6125630
                                                      • String ID: 1.91.6 WIP$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$strcmp(version, "1.91.6 WIP") == 0 && "Mismatched version string!"$sz_idx == sizeof(ImDrawIdx) && "Mismatched struct layout!"$sz_io == sizeof(ImGuiIO) && "Mismatched struct layout!"$sz_style == sizeof(ImGuiStyle) && "Mismatched struct layout!"$sz_vec2 == sizeof(ImVec2) && "Mismatched struct layout!"$sz_vec4 == sizeof(ImVec4) && "Mismatched struct layout!"$sz_vert == sizeof(ImDrawVert) && "Mismatched struct layout!"
                                                      • API String ID: 1529501491-1295771896
                                                      • Opcode ID: 81d2e9201c58c4257a11a08258dd765dc5fa7c07bb397093847fbf6462c9f984
                                                      • Instruction ID: 837c4e150791539ed2e6ccd178cbcc1d0bd30bcf0b9d11d730a4eeb3a1154bb2
                                                      • Opcode Fuzzy Hash: 81d2e9201c58c4257a11a08258dd765dc5fa7c07bb397093847fbf6462c9f984
                                                      • Instruction Fuzzy Hash: 7F317A20A1BA02C4F750BB2DE984170A7A5FF59784FC64035E94E036B6DF2DE259C7A0
                                                      APIs
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0000023830BC722D
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830BC72AA
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830BC72C3
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0000023830BC7303
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830BC7362
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830BC737B
                                                      • _Min_value.LIBCPMTD ref: 0000023830BC73B2
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830BC73CE
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 0000023830BC73E7
                                                      • _Max_value.LIBCPMTD ref: 0000023830BC741E
                                                      • _Min_value.LIBCPMTD ref: 0000023830BC743B
                                                        • Part of subcall function 0000023830BCF190: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 0000023830BCF1B5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Affinity::operator!=Concurrency::details::HardwareMin_value$Max_valueSchedulerScheduler::_
                                                      • String ID:
                                                      • API String ID: 2048856540-0
                                                      • Opcode ID: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                      • Instruction ID: 83e1edbbd997c43d9c0409a9272b82ebe3b5ac476cb006ddf5f9add327aa148e
                                                      • Opcode Fuzzy Hash: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                      • Instruction Fuzzy Hash: 5602EBB0518B888FD7B5EB18C498BDBB3E5FBA8305F40095EE58EC7291DE349545CB42
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: ##Background$##Foreground$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$Size > 0$draw_data->CmdLists.Size == draw_data->CmdListsCount$g.Initialized
                                                      • API String ID: 2490902527-3285338674
                                                      • Opcode ID: 1f975bc8c4991e73a3ff96bd07aa82c4641d671dcbcfc2fcd8acd1bc283286ba
                                                      • Instruction ID: b7ce316d72f45c3b5a404b60bfa3ceea0cdfd4870fcea222552a96723e7fb9c3
                                                      • Opcode Fuzzy Hash: 1f975bc8c4991e73a3ff96bd07aa82c4641d671dcbcfc2fcd8acd1bc283286ba
                                                      • Instruction Fuzzy Hash: CAE1A332B0AA86CAEB50EF29D5446B9B7B5FB44B84F8A4135DA0D43775DF38E851C310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: ((char*)(state->undo_rec + state->redo_point + 1) + move_size) <= buf_end$((char*)(state->undo_rec + state->redo_point)) >= buf_begin$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$C:\Users\55yar\Desktop\imgui-master\imstb_textedit.h$i >= 0 && i < Size$idx <= obj->TextLen
                                                      • API String ID: 2490902527-1648308927
                                                      • Opcode ID: 2120b2c391bdda5362f8aeb3731c43fd56754891b27e07fc2895b1452c4541ea
                                                      • Instruction ID: 68f4bb8686e46a63be503177aed72c292daef91560a443dd2e8f318602040830
                                                      • Opcode Fuzzy Hash: 2120b2c391bdda5362f8aeb3731c43fd56754891b27e07fc2895b1452c4541ea
                                                      • Instruction Fuzzy Hash: 0691FDB2B1678582EB00DF28D4443BCA762FB95B8AF8A4135CA4D07675DB3CE546C720
                                                      APIs
                                                      • 00007FF8B9F61310.VCRUNTIME140(00000000,?,00000000,?,00007FF7AB971E8F), ref: 00007FF7AB971C6E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$Fonts.Size > 0 && "Cannot use MergeMode for the first font"$Size > 0$font_cfg->FontData != 0 && font_cfg->FontDataSize > 0$font_cfg->OversampleH > 0 && font_cfg->OversampleV > 0 && "Is ImFontConfig struct correctly initialized?"$font_cfg->SizePixels > 0.0f && "Is ImFontConfig struct correctly initialized?"
                                                      • API String ID: 2490902527-1408190167
                                                      • Opcode ID: 5bb6bdf7373f25fdb8eced6fed7d171249a11ccea3e327e4bfe4a3ffe85ec404
                                                      • Instruction ID: 71fac287b1de8de93243c8b61a269869efe01a8c90c197250d192b2dd099b326
                                                      • Opcode Fuzzy Hash: 5bb6bdf7373f25fdb8eced6fed7d171249a11ccea3e327e4bfe4a3ffe85ec404
                                                      • Instruction Fuzzy Hash: C691D532A09B92D6EB50EF28D88066CB7E4FB44B84F824136CA4D43275EF3CD5A5D751
                                                      APIs
                                                      • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF7AB96D0B7), ref: 00007FF7AB970A83
                                                      • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF7AB96D0B7), ref: 00007FF7AB970C0C
                                                      • 00007FF8B9F61310.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00007FF7AB96D0B7), ref: 00007FF7AB970C2C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: $C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                      • API String ID: 2490902527-669993125
                                                      • Opcode ID: 139c92e6413d571b4237a587376405bdbf8947d78c653c0cc41edb8b151480ff
                                                      • Instruction ID: 35d52230e776939b36b72e05ea6dd72cd29967a103e3d064d70fe0749a63795d
                                                      • Opcode Fuzzy Hash: 139c92e6413d571b4237a587376405bdbf8947d78c653c0cc41edb8b151480ff
                                                      • Instruction Fuzzy Hash: 9EE10172B09A86C6EB54EF29D444369B3A4FB84B84F868135DA4D877B4DF3CE481CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: <NULL>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$[focus] FocusWindow("%s", UnlessBelowModal): prevented by "%s".$i >= 0 && i < Size$window == 0 || window->RootWindow != 0
                                                      • API String ID: 2490902527-1613245857
                                                      • Opcode ID: 42d04fc1f4cad6f53fa495d4ca8975db62a9802276fde1973ed8bd153aecd329
                                                      • Instruction ID: 04fc3e04424576ee59be38c4440c36ba54e84888635bbd5ce0e35c3c1ea1720e
                                                      • Opcode Fuzzy Hash: 42d04fc1f4cad6f53fa495d4ca8975db62a9802276fde1973ed8bd153aecd329
                                                      • Instruction Fuzzy Hash: FFA19431A4F682D6EB59AF29D1802B9E794BF00784FCA0235DA5E076B5DF3CF4598321
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$i >= 0 && i < Size$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table->MemoryCompacted == false
                                                      • API String ID: 1173767890-1783795845
                                                      • Opcode ID: fc0a72d210a41ad6fc96d4dd79000ba97f4ed6267a4d297a9d124af00df6f25a
                                                      • Instruction ID: 5a60f78d40f601ec53f10749db642e56ae94856ba7674034bde47622fa404b5d
                                                      • Opcode Fuzzy Hash: fc0a72d210a41ad6fc96d4dd79000ba97f4ed6267a4d297a9d124af00df6f25a
                                                      • Instruction Fuzzy Hash: DB51D772A0AA82C6DB10EF28E8542E8B7A4FB55B48F850136CA4C477B4DF7DD196C750
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Decorator::getTableTypeshared_ptr
                                                      • String ID: d
                                                      • API String ID: 143873753-2564639436
                                                      • Opcode ID: 1a6a6722034d945976169db871c6d8bc4f2ed9e348582280147d843b730620fb
                                                      • Instruction ID: 88b33efed4749b027dba1d13c2253fa4bdcb413f0dc35da46936d9f2a8ea77ef
                                                      • Opcode Fuzzy Hash: 1a6a6722034d945976169db871c6d8bc4f2ed9e348582280147d843b730620fb
                                                      • Instruction Fuzzy Hash: 2F9110705187888FE794EB28C058B5ABBE1FFD9744F54099DF08AC73A2DE389945DB02
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Decorator::getTableTypeshared_ptr
                                                      • String ID: d
                                                      • API String ID: 143873753-2564639436
                                                      • Opcode ID: 2612a0b920fc091130e9c3c3613e0ec6eef3206baac283914f1a5a83fc148c58
                                                      • Instruction ID: 97805cfae5117e3073604161728dae854a3363113e31d231302d7e4dca1287d3
                                                      • Opcode Fuzzy Hash: 2612a0b920fc091130e9c3c3613e0ec6eef3206baac283914f1a5a83fc148c58
                                                      • Instruction Fuzzy Hash: 239110705187848FE795EB28C05876ABBE1FFD9744F44099DF08AC73A2DE389A45DB02
                                                      APIs
                                                        • Part of subcall function 00007FF7AB9650E0: 00007FF8C61149A0.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF7AB965139
                                                      • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB9743A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610C61149F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$i >= 0 && i < Size$pack_context != 0$pack_rects[i].w == user_rects[i].Width && pack_rects[i].h == user_rects[i].Height$user_rects.Size >= 1
                                                      • API String ID: 3027678408-766226355
                                                      • Opcode ID: 1be515aab2f97efa54ded198e99e4bd38972ef172aaa4d59dcabceeb4d2ab22d
                                                      • Instruction ID: b575e89d41078ede1874b28e4206c768d67aaa697393f85663924c698f15f7c1
                                                      • Opcode Fuzzy Hash: 1be515aab2f97efa54ded198e99e4bd38972ef172aaa4d59dcabceeb4d2ab22d
                                                      • Instruction Fuzzy Hash: A3A1AE32A0AA52C6EB00EF28D590178B7A4FF44B88F828135DA4D477B5DF3CE596C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: !g.WindowsFocusOrder.contains(window)$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$g.WindowsFocusOrder[window->FocusOrder] == window$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                      • API String ID: 2490902527-3130785268
                                                      • Opcode ID: 21505a3354f30d3a84cbb2dd9f79a5e3063b41b8cb196f85d431d279ccb124c5
                                                      • Instruction ID: 8fa00c52f06cbedbebd8f08e768b6719253fa1b6d48829634372635a3eaeec61
                                                      • Opcode Fuzzy Hash: 21505a3354f30d3a84cbb2dd9f79a5e3063b41b8cb196f85d431d279ccb124c5
                                                      • Instruction Fuzzy Hash: 4171B43670A682D5DB24AF19D5402F8A761FF45B84FC54032DA0D476B4DF79E9A6C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$cmd.ElemCount == 6$i >= 0 && i < Size$it >= Data && it <= Data + Size
                                                      • API String ID: 2490902527-3684587188
                                                      • Opcode ID: ca0d3001d9fa1ebf385f7065992a6b66dff6230fb7e6af56692c7815167da3ab
                                                      • Instruction ID: 35338d6f76d40d264578e96d0a86d40ade455e79675ee7436922837471f45bea
                                                      • Opcode Fuzzy Hash: ca0d3001d9fa1ebf385f7065992a6b66dff6230fb7e6af56692c7815167da3ab
                                                      • Instruction Fuzzy Hash: 8181C222A19AC5C2E7109B2DD5403B9F360FF98748F859331EA8D176B4DF39E596C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: EventMouseTrack$ClientExtraInfoMessageScreen
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 3561655495-3890275027
                                                      • Opcode ID: a2318c1dd2bf4b7b1a3e05d31482f341a3f2fcce7c417795e5c45deee69884fe
                                                      • Instruction ID: 193833fbbbd7a167b6ad5fc574cb757e638a9c750dbe49afdb6f70bc7e9a5336
                                                      • Opcode Fuzzy Hash: a2318c1dd2bf4b7b1a3e05d31482f341a3f2fcce7c417795e5c45deee69884fe
                                                      • Instruction Fuzzy Hash: 8261F032A09602DBF794EB79D4402BCB7B8FB44744F894036EA4A53AB4CF38E481C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: __swprintf_l
                                                      • String ID: #Child$%s/%08X$%s/%s_%08X$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$id != 0
                                                      • API String ID: 1488884202-1586801193
                                                      • Opcode ID: 364a9aa14de91c2b89fbfb7ae7e465da2b37ec99689f6f257b78b0f03dd2e383
                                                      • Instruction ID: 8f6ac6770b923ff9896e416e086175300cc136a49ca92f2a97e5d76dfc12b7f3
                                                      • Opcode Fuzzy Hash: 364a9aa14de91c2b89fbfb7ae7e465da2b37ec99689f6f257b78b0f03dd2e383
                                                      • Instruction Fuzzy Hash: E751A132A09A85DAE758EF2AD4802F9F7A0FF98744F858136DA4D032B1DF38A095C750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID:
                                                      • API String ID: 1173767890-0
                                                      • Opcode ID: 57775b08057a0cb686b1252a14b079b2badbfb1439e6d4f1093d26c913e37d6c
                                                      • Instruction ID: 1e9ef41c9aa2934e0c00fde0871a20136f026a7f5c08e584519b3cacd6d0b99a
                                                      • Opcode Fuzzy Hash: 57775b08057a0cb686b1252a14b079b2badbfb1439e6d4f1093d26c913e37d6c
                                                      • Instruction Fuzzy Hash: 67025B3261A992D2D749FF68C5A50FCB774FB54B44B914232D60E832B1EF38E5AAC350
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$z != 0$z->direction$z->ey >= scan_y_top
                                                      • API String ID: 0-479673919
                                                      • Opcode ID: 6cea98a25611d8d332c81fd29b357c662dc5309cdf7c2bec323427f02e0d1f18
                                                      • Instruction ID: 643373043918dd7bc697340141a14a7986f1fba7ec25eb02b97ad05759c4ae08
                                                      • Opcode Fuzzy Hash: 6cea98a25611d8d332c81fd29b357c662dc5309cdf7c2bec323427f02e0d1f18
                                                      • Instruction Fuzzy Hash: DF12F332909AC5C6D752DF3AD0412A9F3A0FF5DB84F598322DA4963674EF38E195CB01
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$it >= Data && it <= Data + Size$off >= 4 && off < Buf.Size$p >= begin() && p < end()
                                                      • API String ID: 2490902527-15920025
                                                      • Opcode ID: f146da49762cb8cd1275c042e6d03367f461630165a1e30583ec68414f4dae0a
                                                      • Instruction ID: 600aa24828b3647fe50218be057c2c261bc514e46979f491494608dc2f75e296
                                                      • Opcode Fuzzy Hash: f146da49762cb8cd1275c042e6d03367f461630165a1e30583ec68414f4dae0a
                                                      • Instruction Fuzzy Hash: 2A91CF76B1AA46C6EB14AF29D4441B8B3A0FF44B88F858135DA1E477B4DF3CE861C720
                                                      APIs
                                                      • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB948442
                                                      • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB9484FA
                                                      • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB94858A
                                                        • Part of subcall function 00007FF7AB9481E0: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB948269
                                                        • Part of subcall function 00007FF7AB9481E0: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB9482E9
                                                        • Part of subcall function 00007FF7AB9481E0: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB94836A
                                                      • 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB948624
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$DrawList == &DrawListInst
                                                      • API String ID: 1173767890-20161693
                                                      • Opcode ID: c8be5354a01ef17ca92d8d4e428b236ce82e9f2ba0a2a98cb91df7b37cfa96f1
                                                      • Instruction ID: fe7f1e0ad5d606e509a3e9979a89eea97bb2b72518a3c3672257443ce1fb5ee1
                                                      • Opcode Fuzzy Hash: c8be5354a01ef17ca92d8d4e428b236ce82e9f2ba0a2a98cb91df7b37cfa96f1
                                                      • Instruction Fuzzy Hash: 2071C37260AA92C6C745EF28D4951FCB7B5FB04B48F984236DA0E87270DF38D59AC341
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610F020F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->SortOrder < table->SortSpecsCount$p >= Data && p < DataEnd
                                                      • API String ID: 310658293-2291414753
                                                      • Opcode ID: 641654e56ec08bab50e2c861daeedfc856a8fa85ea2999065e45f12bcbe7211b
                                                      • Instruction ID: 61277c5072408311fac65084a6c6120756d26194c37890c085b2eccca8b92bc8
                                                      • Opcode Fuzzy Hash: 641654e56ec08bab50e2c861daeedfc856a8fa85ea2999065e45f12bcbe7211b
                                                      • Instruction Fuzzy Hash: 1361CF3260AA92D6DB08EF28D1841BCB7B0FB44B45F864136DB5D83274EF38E1A6C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$i >= 0 && i < Size$pos <= text_len
                                                      • API String ID: 2490902527-3124524525
                                                      • Opcode ID: 43148d90905608da133ba6f2dc9b7995a38c7d11a5028563e3b51f33180f49da
                                                      • Instruction ID: 66cb40a8a0e25a374fa5b5d5768effb0820b4afc23e02fe4a425afc809b539e2
                                                      • Opcode Fuzzy Hash: 43148d90905608da133ba6f2dc9b7995a38c7d11a5028563e3b51f33180f49da
                                                      • Instruction Fuzzy Hash: FE411672B0D645C6E720AF5DE94027AF795FB44784F850035EE8D436B2DE7DE4428350
                                                      APIs
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 0000023830BAE0A3
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 0000023830BAE0B7
                                                      • std::make_error_code.LIBCPMTD ref: 0000023830BAE0D0
                                                      • std::make_error_code.LIBCPMTD ref: 0000023830BAE132
                                                      • std::make_error_code.LIBCPMTD ref: 0000023830BAE300
                                                        • Part of subcall function 0000023830B56020: Concurrency::details::_ReaderWriterLock::_ReaderWriterLock.LIBCMTD ref: 0000023830B5602E
                                                      • std::make_error_code.LIBCPMTD ref: 0000023830BAE1B7
                                                        • Part of subcall function 0000023830B58FE0: std::error_condition::error_condition.LIBCPMTD ref: 0000023830B58FFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupReaderScheduleSegmentUnrealizedWriter$Concurrency::details::_LockLock::_std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 3233732842-0
                                                      • Opcode ID: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                      • Instruction ID: 0553df4a209bf1b9b178d1c8272f2a769002c10cd61e99c17dbe1cd9273171f1
                                                      • Opcode Fuzzy Hash: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                      • Instruction Fuzzy Hash: 5CF1FF7091C7888FD6A4EB28C455BEAB7E1FFD9B04F40489DF09AC7392DE749A448702
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C610F020F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$p < end()$p >= begin() && p < end()
                                                      • API String ID: 310658293-1901453082
                                                      • Opcode ID: 89c2f9746f56774cf18f660d37daa8c8023ea24d726d88c761ed5e41b9daf93e
                                                      • Instruction ID: c089c21762ae2057d15463d9e6ef815cef4c9c3b61400a85c8524ff87b3f1588
                                                      • Opcode Fuzzy Hash: 89c2f9746f56774cf18f660d37daa8c8023ea24d726d88c761ed5e41b9daf93e
                                                      • Instruction Fuzzy Hash: E681C07270AA41D7EE14AF18D9482A8F7A9FF04B85F858135DA0D472B0EF3CE5A5C714
                                                      APIs
                                                      Strings
                                                      • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF7AB9713DA
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF7AB9713D3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                      • API String ID: 1173767890-3599239301
                                                      • Opcode ID: a27dbbe3b8e8369e739a25ded0ea2982dee22f6b7ac45c46d309ae0859b59bb8
                                                      • Instruction ID: f05350c3e4c2b79e5a90b25a735e7dd98680c7999d53f37d42bd9e629df601ad
                                                      • Opcode Fuzzy Hash: a27dbbe3b8e8369e739a25ded0ea2982dee22f6b7ac45c46d309ae0859b59bb8
                                                      • Instruction Fuzzy Hash: 5361AF72A0AA51D7DB49EF28D1442BCB3B1FB04B84B948226C60E43370EF38D5AAC700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$C6118950$C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$filename && mode
                                                      • API String ID: 3653100989-1878659873
                                                      • Opcode ID: bba858d7dafffe5a3fc5dd742a7e7c40657499637fe3358c359ad359ca6b4ca3
                                                      • Instruction ID: 9fa9e333edae102db707cc6af11d0eb0482d22c05f9724c3263b0adc66d295fa
                                                      • Opcode Fuzzy Hash: bba858d7dafffe5a3fc5dd742a7e7c40657499637fe3358c359ad359ca6b4ca3
                                                      • Instruction Fuzzy Hash: 3741B221A1AA42C2EA94BF2EA594179F7A4FF44B94FD90231E90E437F4DF3CE4568310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Capture$ExtraInfoMessage
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 2172523684-3890275027
                                                      • Opcode ID: 923c053ce066281c7ac671ef25c172f5d6b9f676048f14a3257d116d11b5ca04
                                                      • Instruction ID: 89f155215d323ed295eecb9c1ffc554d4ee3e88ed359dac77e522bb35cbbaca0
                                                      • Opcode Fuzzy Hash: 923c053ce066281c7ac671ef25c172f5d6b9f676048f14a3257d116d11b5ca04
                                                      • Instruction Fuzzy Hash: D121F866616642C2E791DB39D5402ADB3A8FF48BA8FC10132EE2D473B4DF38E5568760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: printf
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$[%05d] $[%s] [%05d]
                                                      • API String ID: 3524737521-3476604433
                                                      • Opcode ID: 5a48e0f4dea9b8b2cafaac37201f2cdc183bbd5d905bebb22584e034e64cb9f7
                                                      • Instruction ID: 62106d41fdf855f387e6db7a14207942c2bc8fa9d779c81b7bbbee5055e164cb
                                                      • Opcode Fuzzy Hash: 5a48e0f4dea9b8b2cafaac37201f2cdc183bbd5d905bebb22584e034e64cb9f7
                                                      • Instruction Fuzzy Hash: 8721C072B0AA42D6EA20AF29F8445EAF7A4FB44B84F854035EE4D57274CF3CE495C710
                                                      APIs
                                                      Strings
                                                      • bd != nullptr && "No platform backend to shutdown, or already shutdown?", xrefs: 00007FF7AB98FA8B
                                                      • GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?", xrefs: 00007FF7AB98FAB1
                                                      • C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp, xrefs: 00007FF7AB98FA84
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF7AB98FAAA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "No platform backend to shutdown, or already shutdown?"
                                                      • API String ID: 3664257935-1332676508
                                                      • Opcode ID: a88f10e153ff5662c3eda2797c9295a1957fe6c79fdca9ae89574122b0fd71b3
                                                      • Instruction ID: e711dbadb622dc00610a6544add5ef588c46ce596d5822983c876c4978a46d15
                                                      • Opcode Fuzzy Hash: a88f10e153ff5662c3eda2797c9295a1957fe6c79fdca9ae89574122b0fd71b3
                                                      • Instruction Fuzzy Hash: 9331617160AA42C6EB44AF28E980678B7A4FB54B89F868536DA0D47370DF3CE465C750
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: Capture$ExtraInfoMessageRelease
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 1767768705-3890275027
                                                      • Opcode ID: cb19a9e6c1605ae45a3bbd78077dd2cfbef91a2a50fb1b9c956a217acb42d625
                                                      • Instruction ID: 9a093413a84f6a6a707760d619c33804a19baf6f0f5017397ffad494b0e83c5c
                                                      • Opcode Fuzzy Hash: cb19a9e6c1605ae45a3bbd78077dd2cfbef91a2a50fb1b9c956a217acb42d625
                                                      • Instruction Fuzzy Hash: 5121F561A26652C2F791AB7DD4002B9A295FF44BD4FC30031E90E473B4CF3DE5868760
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$Base::ChoresConcurrency::details::Func_classGroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 831135708-0
                                                      • Opcode ID: 63f4ccc0c719f990fd2cecc369a8989cbc0d16d11778b62a075870b531d386af
                                                      • Instruction ID: e58138d6db801a1f2a8092f7d7ac28e0f1c5aabbeb2c9277b85af58ab248a560
                                                      • Opcode Fuzzy Hash: 63f4ccc0c719f990fd2cecc369a8989cbc0d16d11778b62a075870b531d386af
                                                      • Instruction Fuzzy Hash: 3BF15470618B488FE7A5FB28C459BDAB2D1FF94704F9049A9F04EC7392DE3C9A458742
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 2527301759-0
                                                      • Opcode ID: 52cd85fabb40296642562d013464caab3b67d2761199756b925dca6721a50769
                                                      • Instruction ID: 72c881ca8d69b0110ad012c8b049b7970a5eec13982930ffc3ee6b80cbc54297
                                                      • Opcode Fuzzy Hash: 52cd85fabb40296642562d013464caab3b67d2761199756b925dca6721a50769
                                                      • Instruction Fuzzy Hash: E991E07191C7888BE365EB14C459BDBB7E1FB94744F40499EF08BCB292DE349A44CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mailbox
                                                      • String ID:
                                                      • API String ID: 1763892119-0
                                                      • Opcode ID: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                      • Instruction ID: b8898f116d8b040ff5eae72597206429ca93dc95a6c0e86e3d08ead1e679d39c
                                                      • Opcode Fuzzy Hash: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                      • Instruction Fuzzy Hash: 6861407150CB8C8FD765EA18C058BEBB7E1FBA8305F440A5EF48AD7291DE74DA848742
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_SchedulerScheduler::_$std::error_condition::error_condition$std::bad_exception::bad_exception
                                                      • String ID:
                                                      • API String ID: 3801495819-0
                                                      • Opcode ID: 855e9fad3cf8b62679a3ed4dce5103e3daddbb4618be66b587f956b2a1f93412
                                                      • Instruction ID: b520526ee55a9777ef74ce3fbd752c15df48ecddc56da11e163caf2d686dbf01
                                                      • Opcode Fuzzy Hash: 855e9fad3cf8b62679a3ed4dce5103e3daddbb4618be66b587f956b2a1f93412
                                                      • Instruction Fuzzy Hash: 7361FB74A18B488FD7A4EB28C449B9AB7E1FB98704F44499DE0CAC7391DF78D945CB02
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork__crt_scoped_stack_ptr$Decorator::getTableTypeshared_ptr
                                                      • String ID:
                                                      • API String ID: 2480882750-0
                                                      • Opcode ID: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                      • Instruction ID: 647839ad30fc44c509b5e2e5d5bdfa217f3db80d1fecd358a7c3966e1cb43d71
                                                      • Opcode Fuzzy Hash: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                      • Instruction Fuzzy Hash: BF61D870918B888FE7A0EF28C449B9AB7E0FB98744F50495EE48DC7261DF74D985CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$00007C610F020
                                                      • String ID:
                                                      • API String ID: 1061835773-0
                                                      • Opcode ID: f164728aac4359f31988e45f3ad8a9c4c692c35e4defae706483efbee8af422e
                                                      • Instruction ID: f2944d45757761b6cec21ad4330242073ba77f84c71a975ea031440f8b9ffed1
                                                      • Opcode Fuzzy Hash: f164728aac4359f31988e45f3ad8a9c4c692c35e4defae706483efbee8af422e
                                                      • Instruction Fuzzy Hash: A141D176609A4186D324EF2AB8400A9BBA5FB48BE4F458236DE4D47BB4DF3CC55AC700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                      • Instruction ID: 84f394a9942e3ab4486174b43c43fbb652153f00a1d661c39702799c31c25a5b
                                                      • Opcode Fuzzy Hash: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                      • Instruction Fuzzy Hash: 1D21D870A18B888FDAA4FB68C05975BB7E1FBD8744F80495DF08EC73A2DE3499408742
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$char_traits
                                                      • String ID:
                                                      • API String ID: 2432257368-3916222277
                                                      • Opcode ID: fc3064d62a3cd5194dff096c9fc33b5f2c68b979ee5dc823d586b5ed394c8f21
                                                      • Instruction ID: 0d418144d275b52394931205ca4a3cc8ff0a788ce72bb644b2ecebfe8112087c
                                                      • Opcode Fuzzy Hash: fc3064d62a3cd5194dff096c9fc33b5f2c68b979ee5dc823d586b5ed394c8f21
                                                      • Instruction Fuzzy Hash: 45C1EE71518B488FE765EB28C459BDBB7E1FB98704F400A69F08ACB291DF34DA44CB42
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: #MOVE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 2490902527-319756798
                                                      • Opcode ID: 8b44fbaeddb07144472a5adb75ac7a8cf491f6c0f3de25d86cc6ff873731802c
                                                      • Instruction ID: da4c8c0bb2008b50fcf0fa1a745ae1be32960ad1a4a5cd7ac55c7e1825fc6961
                                                      • Opcode Fuzzy Hash: 8b44fbaeddb07144472a5adb75ac7a8cf491f6c0f3de25d86cc6ff873731802c
                                                      • Instruction Fuzzy Hash: DFD13832606BC1DAD354DF29E98879DB7A8F705B14FAA4239C7A8073A0DF35E062C704
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B9374F
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B937BB
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B93815
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID: e
                                                      • API String ID: 1865873047-4024072794
                                                      • Opcode ID: a5aedeaa2a5e8da9842271219853bb447ad559dd74de6758b306763cffed3ded
                                                      • Instruction ID: 7ec1059dd732e38ae598cbf024b43031be6ee0752a04c046127a0e12ee73a78c
                                                      • Opcode Fuzzy Hash: a5aedeaa2a5e8da9842271219853bb447ad559dd74de6758b306763cffed3ded
                                                      • Instruction Fuzzy Hash: 3A611D7091CB448FE794EFA8C489B5AB7E0FB98B05F50095DF14ACB3A1DA38D941CB06
                                                      APIs
                                                      • 00007FF8B9F61310.VCRUNTIME140(00000000,?,00000000,000002382C2933D0,00007FF7AB960EC1,?,?,00000000,00007FF7AB949F9A), ref: 00007FF7AB96114C
                                                      • 00007FF8B9F61310.VCRUNTIME140 ref: 00007FF7AB9612A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$g.Initialized
                                                      • API String ID: 2490902527-1422301356
                                                      • Opcode ID: d6bbdb4219d3e0fdddece71820f1c59eca024687e428ec205e5c3619ae4abcbe
                                                      • Instruction ID: c978255c85fa7a86f340a2b4fc6f7bbf19cd85ae9d01309c6c99b03b3af05432
                                                      • Opcode Fuzzy Hash: d6bbdb4219d3e0fdddece71820f1c59eca024687e428ec205e5c3619ae4abcbe
                                                      • Instruction Fuzzy Hash: 2E610C11B0F6A2C5EE11AB2998283BA9791EB49BC4FCA5131DE5C873B4EF3CD445D311
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiUnicodeWideWindow
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 3417139564-3890275027
                                                      • Opcode ID: d9a610a5f53e9fa10297ec8690aded1cef327910e5f6d708596898dc3a383a64
                                                      • Instruction ID: 04d929edade670aefdd9b6bfe291840c0fc23a6283abc5c24233120ff5dd205a
                                                      • Opcode Fuzzy Hash: d9a610a5f53e9fa10297ec8690aded1cef327910e5f6d708596898dc3a383a64
                                                      • Instruction Fuzzy Hash: AE51D622E19662D6E7A5EF3CC4402BDA7A5FF44B48F894035EA4D47AB4DF3CD8429320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                      • API String ID: 1173767890-3599239301
                                                      • Opcode ID: 39a94ab1953bdc714ba20a451d15697837532ad35433a4dd319d13373b39f134
                                                      • Instruction ID: 0a15e3ddc9a06b2059c4e6f2dc26810cf99ee0b147a2cb9302162c420ba68d76
                                                      • Opcode Fuzzy Hash: 39a94ab1953bdc714ba20a451d15697837532ad35433a4dd319d13373b39f134
                                                      • Instruction Fuzzy Hash: 8451D072A0AA52C2DB00EF18E4945BCB7B4FB58B84B964236DA4D43770EF38D196C751
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$i >= 0 && i < Size
                                                      • API String ID: 2490902527-3833649686
                                                      • Opcode ID: 9795f39f3915703e5182b8305a070d8cc95cb5839a0246a7f8836c85aa4fbd7e
                                                      • Instruction ID: b524b8587cb55bf0c3d21629112323f104f921923e72fe3507b001a061371bf5
                                                      • Opcode Fuzzy Hash: 9795f39f3915703e5182b8305a070d8cc95cb5839a0246a7f8836c85aa4fbd7e
                                                      • Instruction Fuzzy Hash: 1F416231B0DB46D5EB14AF29E5D01E9A768FB44B84F864235DA9E436B4CF2CF259C320
                                                      APIs
                                                      Strings
                                                      • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF7AB971640
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF7AB971639
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                      • API String ID: 1173767890-3599239301
                                                      • Opcode ID: 8193d48d8a4ab965047eb9cd85be8e2c2768a0254f95d21a873dfeaeee22ed6b
                                                      • Instruction ID: cc3c5259e655fe9007e66d01438f2e96c6cd23e297b78e654b0dae7520113c9c
                                                      • Opcode Fuzzy Hash: 8193d48d8a4ab965047eb9cd85be8e2c2768a0254f95d21a873dfeaeee22ed6b
                                                      • Instruction Fuzzy Hash: 5331C27360AA52C7D745EF28D4951BCB3B5FB14B84B958236CA0E43270EF38D5AAC740
                                                      APIs
                                                        • Part of subcall function 0000023830B4A170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B4A18D
                                                        • Part of subcall function 0000023830B4A110: char_traits.LIBCPMTD ref: 0000023830B4A13D
                                                      • type_info::_name_internal_method.LIBCMTD ref: 0000023830C07A14
                                                        • Part of subcall function 0000023830C29E50: type_info::_name_internal_method.LIBCMTD ref: 0000023830C29EF0
                                                        • Part of subcall function 0000023830C29E50: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830C29F56
                                                        • Part of subcall function 0000023830C29E50: CreateFileA.KERNEL32 ref: 0000023830C29F82
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0000023830C07AE4
                                                        • Part of subcall function 0000023830B45180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B45217
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$EmptyQueue::StructuredWork$type_info::_name_internal_method$Affinity::operator!=CreateFileHardwarechar_traits
                                                      • String ID:
                                                      • API String ID: 2370075206-0
                                                      • Opcode ID: 1ca1f53479ce3256fdcfa652a2f8c0640dff5af6cc40af6253aed29f3ac4abb4
                                                      • Instruction ID: 4ef8a7fad776db5a128dd091696de74de425ac72d332c1765bd70e3d76baf8a2
                                                      • Opcode Fuzzy Hash: 1ca1f53479ce3256fdcfa652a2f8c0640dff5af6cc40af6253aed29f3ac4abb4
                                                      • Instruction Fuzzy Hash: 44020371518B488BE365EB24C459BEBB3E1FB94704F5049AEF08BC72A2DE349B45CB41
                                                      APIs
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 0000023830BA3951
                                                        • Part of subcall function 0000023830B72880: _Ptr_base.LIBCMTD ref: 0000023830B72893
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Base::ChoresConcurrency::details::GroupPtr_baseScheduleSegmentUnrealized
                                                      • String ID:
                                                      • API String ID: 3333744592-0
                                                      • Opcode ID: 570f11bbdc05f9da95d07b3fdbdb974941727138929f366d8f2bea2d8099bd35
                                                      • Instruction ID: 6643a6cc139b01e2e03e6f4034ce4661746631b2152a1886d0befd2e175878ff
                                                      • Opcode Fuzzy Hash: 570f11bbdc05f9da95d07b3fdbdb974941727138929f366d8f2bea2d8099bd35
                                                      • Instruction Fuzzy Hash: 35F12271518B8C8FE7A5EB18C459BDBB3E1FB98704F40096AF48EC7291DE789644CB42
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B52CA2
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B52E63
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B52E78
                                                        • Part of subcall function 0000023830B4B170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B4B17E
                                                        • Part of subcall function 0000023830B4B170: _Max_value.LIBCPMTD ref: 0000023830B4B1A3
                                                        • Part of subcall function 0000023830B4B170: _Min_value.LIBCPMTD ref: 0000023830B4B1D1
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B52FB7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                                                      • String ID:
                                                      • API String ID: 348937374-0
                                                      • Opcode ID: 9076abe83797b2f5b95f51d9a62a17b5c4646a91e0ea6bac038e2092eb8d8266
                                                      • Instruction ID: 199a4e6dc30a0f4a909f510adac33ef04e5dc351905a2e78cc7c62f0cd30063c
                                                      • Opcode Fuzzy Hash: 9076abe83797b2f5b95f51d9a62a17b5c4646a91e0ea6bac038e2092eb8d8266
                                                      • Instruction Fuzzy Hash: F1D1CD7061CB888FD7A4EB28C459B6AB7E1FBA9745F40095DF08DC7361DA74DA80CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 246976077-0
                                                      • Opcode ID: 5f3126eda9a4eb9af231d5239096d653e2129c4e3c35e502a72c1b9b8bd3846d
                                                      • Instruction ID: 6f5f08ce3fdc42735572b608b1e6a68e7e8c6203c5caaaf1ad1cc524bd8bacb2
                                                      • Opcode Fuzzy Hash: 5f3126eda9a4eb9af231d5239096d653e2129c4e3c35e502a72c1b9b8bd3846d
                                                      • Instruction Fuzzy Hash: 40C11D70918B488FD7A5EB28C459B9AB7E1FB98704F50096DF08AC7391DF78DA41CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 1046759889-0
                                                      • Opcode ID: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                      • Instruction ID: 0dddcbd0910d182467b4c40a6e3b24fee59b2272ae98b4db7116c60b5830f1e7
                                                      • Opcode Fuzzy Hash: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                      • Instruction Fuzzy Hash: B6B1EB70518B888FD2A4EB28C459BDAB7E1FFD8704F40499DE08ECB392DE759945CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 2527301759-0
                                                      • Opcode ID: 58c7311be2cb89b8753877e7c75642fcbb82317ee9f238dba1156d6b4c2a68d4
                                                      • Instruction ID: 14d0ba59a5473e91d373d192c6ec4c61f96c94f5970ec663871bd2c1bea377fe
                                                      • Opcode Fuzzy Hash: 58c7311be2cb89b8753877e7c75642fcbb82317ee9f238dba1156d6b4c2a68d4
                                                      • Instruction Fuzzy Hash: E1810E70518B888FE3A4EB18C455BAEB7E1FF94744F4049A9F0DBC72A2DE349945CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 1927102706-0
                                                      • Opcode ID: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                      • Instruction ID: 02ae57dffed21b2b173538a264baee269f520b669bc85f5212a0e59ada5e1840
                                                      • Opcode Fuzzy Hash: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                      • Instruction Fuzzy Hash: 7D71C57055DB488FE6A5EB28C459BEAB3E1FB98704F800959F08EC7392DE78D941C742
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 1927102706-0
                                                      • Opcode ID: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                      • Instruction ID: 524c0494a6fbd542e6a01f2550203971aa4f89d469255e1bad2e156397aad032
                                                      • Opcode Fuzzy Hash: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                      • Instruction Fuzzy Hash: A8714070518B889FD7A1EB18C499BEAB3E5FB98704F404859F08EC7391CE78DA418B42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID:
                                                      • API String ID: 1173767890-0
                                                      • Opcode ID: 40a382835e6706dba0aacc8cd3f1290a8d22f5a65d183d6c671a3e35b392f7c0
                                                      • Instruction ID: c251254ed98f0843c878d5f36ce0a221e5a69dab3cd5e5f276ff53f91d785de0
                                                      • Opcode Fuzzy Hash: 40a382835e6706dba0aacc8cd3f1290a8d22f5a65d183d6c671a3e35b392f7c0
                                                      • Instruction Fuzzy Hash: E7519FB361A992C7CB49EF68D1954BCB3B1FB54B45B948223DA0E83270EF38D55AC340
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                      • Instruction ID: 83325aeadd8e626f78b43abfdf1e669d4c6d7e7dc787633f52f8380d59f1e13c
                                                      • Opcode Fuzzy Hash: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                      • Instruction Fuzzy Hash: 0B111A70A18F888FEA94EB68C04975BBBE1FBD8744F50095DF089C7362DE34D9408B42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                      • Instruction ID: 11517a25621aa9872b3fbf198ddb406ec58c76c27d75b2f05c123fcd2cf4c925
                                                      • Opcode Fuzzy Hash: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                      • Instruction Fuzzy Hash: 79110870A18F888FEA94EB68C04975ABBE1FBD8744F50095DF089C7362DE3499408B42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Func_class
                                                      • String ID:
                                                      • API String ID: 1670654298-0
                                                      • Opcode ID: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                      • Instruction ID: 053654f59d266ac3483e987c552c48ae5f3e877529e983484cea70bdb437e4dd
                                                      • Opcode Fuzzy Hash: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                      • Instruction Fuzzy Hash: 7E11C970A18A488FD684FB18C44972AB7E1FF99B49F404869F48AC73B2DE35D941CB41
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B9EF0A
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B9EF1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID:
                                                      • API String ID: 1865873047-0
                                                      • Opcode ID: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                      • Instruction ID: d89c2384d5749ceefa7448a19bad3aa0942de44106a655de77a0ef7d4a6ab5bb
                                                      • Opcode Fuzzy Hash: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                      • Instruction Fuzzy Hash: 52012DB0934B894BE3D4DB29C49876975D2FB84708F80099DF05AC63E0DEB9DA408603
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B9EFAA
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 0000023830B9EFBE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3884790620.0000023830B40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023830B40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_23830b40000_WaveExecutor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID:
                                                      • API String ID: 1865873047-0
                                                      • Opcode ID: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                      • Instruction ID: 6cf5cf3f05a132532505dbf20b5fc8c9123a6711fe214078c4e7c22e5ffefbe3
                                                      • Opcode Fuzzy Hash: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                      • Instruction Fuzzy Hash: 700129B0534B594BE3D4DB29C458B6AB6D2FB88748FD00CADF15ACA3A1CAB9C5409603
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C612
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$max_error > 0.0f
                                                      • API String ID: 1428191659-3636960062
                                                      • Opcode ID: 2d8c68fd8c5bb8b87b140409164d2f812e6f1a4e4eb9dcfa91aef82d2f7fa76f
                                                      • Instruction ID: 3e7d8d2bfafdfa97fa158b332b8cae2e8473a9b7b606286a14a476043720be0d
                                                      • Opcode Fuzzy Hash: 2d8c68fd8c5bb8b87b140409164d2f812e6f1a4e4eb9dcfa91aef82d2f7fa76f
                                                      • Instruction Fuzzy Hash: 4261C432D197C9C9E312AB3A84412B9B7A0EF6D744F4DC736EA49361B5DF28B4C18720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$g.SettingsWindows.empty()
                                                      • API String ID: 1173767890-1747592857
                                                      • Opcode ID: 007d639a8cd7b77cc5edf28a83578d95d254dd57ba70a5d0a04cb8c2922fc2c3
                                                      • Instruction ID: bf4bd34576e8a2de06fee0db91432be40190ba257eb42d115b5c8473442a7ec0
                                                      • Opcode Fuzzy Hash: 007d639a8cd7b77cc5edf28a83578d95d254dd57ba70a5d0a04cb8c2922fc2c3
                                                      • Instruction Fuzzy Hash: B341E432A1AA82C6EB44EF29E4A45B8B760FF48B84F994136EA4D03775DF3CE045C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 1173767890-1817040388
                                                      • Opcode ID: f6f134c6f70e70a5f67602879e6ff25eb996bc56e58a3c119fb5f52a3a42ffc6
                                                      • Instruction ID: 170de1d63ef9098703442875ca67fe7fe3f04014da96674f4a72748715bcb158
                                                      • Opcode Fuzzy Hash: f6f134c6f70e70a5f67602879e6ff25eb996bc56e58a3c119fb5f52a3a42ffc6
                                                      • Instruction Fuzzy Hash: CB41D332609A82C2DB14EF28E5901B8F774FB48784F954236DA4D837B0DF38E5A6C750
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 1173767890-1817040388
                                                      • Opcode ID: 096fc74e7037803a42b3bc3964d1e045c6bae19edca2c2f8db86bb480efd3f02
                                                      • Instruction ID: d1da96b8eb945eff383284ab34d0e02748aa85341e53a020c261e0ec8e948729
                                                      • Opcode Fuzzy Hash: 096fc74e7037803a42b3bc3964d1e045c6bae19edca2c2f8db86bb480efd3f02
                                                      • Instruction Fuzzy Hash: 8541D132A0AA82C2D704AF28E4A01B8F774FB48B88B954132DA4D437B4EF3DE556C751
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 1173767890-1817040388
                                                      • Opcode ID: 54c5adaa5e58a39c7ac90b9f1cc2bbe7df99a80503262dc85276a365a363dc12
                                                      • Instruction ID: b5e52d08287524c2e76c909ba8eb6aeb2ab6d17d3c4c5508e61aa5563790d023
                                                      • Opcode Fuzzy Hash: 54c5adaa5e58a39c7ac90b9f1cc2bbe7df99a80503262dc85276a365a363dc12
                                                      • Instruction Fuzzy Hash: 80319272A0AA56C6D704EF28D8900B8F3B4FB88B88B954136DA4D477B4DF3CD556C711
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007C61149
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 3281661635-1817040388
                                                      • Opcode ID: 3a94cb1d79306fdc9a050dd449591057f5d3f3fa0e938ade244f3a3a1197444a
                                                      • Instruction ID: d041f58b17aa33c81b26e2fc1108e11fddf9ee48cabc4ece3c7e2798dc0e26c0
                                                      • Opcode Fuzzy Hash: 3a94cb1d79306fdc9a050dd449591057f5d3f3fa0e938ade244f3a3a1197444a
                                                      • Instruction Fuzzy Hash: E521D13171A686C5EB64EB19E4403BDB760FB89B84F8A5134DA8E43774CE3EE442C710
                                                      APIs
                                                      • 00007FF8B9F61310.VCRUNTIME140 ref: 00007FF7AB986070
                                                        • Part of subcall function 00007FF7AB963900: 00007FF8B9F61310.VCRUNTIME140 ref: 00007FF7AB96393C
                                                        • Part of subcall function 00007FF7AB963900: 00007FF8C610F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7AB9639BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007$F61310$C610F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$state->TextA.Data != 0
                                                      • API String ID: 4093856333-1138122324
                                                      • Opcode ID: 68e42b137ae8442a878239fc68f020be54ccb08d0e866b134796feb8c254f3d3
                                                      • Instruction ID: 39238b39d07c6e38b554feb02a6b6095f51f4f5d3a8fdd9808267c66a6fb11c5
                                                      • Opcode Fuzzy Hash: 68e42b137ae8442a878239fc68f020be54ccb08d0e866b134796feb8c254f3d3
                                                      • Instruction Fuzzy Hash: 0F21D872B06642C2E708DF39D4542A86391EB84B49F894039EE4DCF2B8DF3CE5858720
                                                      APIs
                                                      • 00007FF8B9F61310.VCRUNTIME140(?,?,00000000,00007FF7AB94D62F), ref: 00007FF7AB9638C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$it >= Data && it <= Data + Size
                                                      • API String ID: 2490902527-3870282576
                                                      • Opcode ID: 84a9b61979137050a1197245c5bdd7e55bba15df666dd3b8409ce5f9d3bc927c
                                                      • Instruction ID: 0cb0852bbd43d49263c6fa0533e51242697a85a89762f6974fa07b3adfc3bcbc
                                                      • Opcode Fuzzy Hash: 84a9b61979137050a1197245c5bdd7e55bba15df666dd3b8409ce5f9d3bc927c
                                                      • Instruction Fuzzy Hash: FE21CFB1B1A6C1C2EF149B1EE6401A8A325FB48B80B89D039DB5D47B74DF2CF5A1C300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: $@
                                                      • API String ID: 3568877910-1077428164
                                                      • Opcode ID: 4be356fa8e074784c90dbf701479d069685c3cbf6e883b402ec0f34ae6b6c832
                                                      • Instruction ID: 52d4e468229489f8599f5ab3c442a90467b9af691edda8e3d6eed6b8333255c1
                                                      • Opcode Fuzzy Hash: 4be356fa8e074784c90dbf701479d069685c3cbf6e883b402ec0f34ae6b6c832
                                                      • Instruction Fuzzy Hash: B21149B290978187E725DF25F14412AF7A1FB8AB84F554225EB8907B28DB3CE895CF00
                                                      APIs
                                                      • 00007FF8B9F61310.VCRUNTIME140(?,?,00000000,00007FF7AB977563,?,?,00000000,00007FF7AB971FCF), ref: 00007FF7AB9773A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3887781116.00007FF7AB941000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF7AB940000, based on PE: true
                                                      • Associated: 00000000.00000002.3887752600.00007FF7AB940000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCB0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABCBA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7ABE43000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3887781116.00007FF7AC011000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888153274.00007FF7AC012000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3888177712.00007FF7AC013000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff7ab940000_WaveExecutor.jbxd
                                                      Similarity
                                                      • API ID: 00007F61310
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$stb__dout + length <= stb__barrier_out_e
                                                      • API String ID: 2490902527-3603624656
                                                      • Opcode ID: 17ca0878dc678fdc762dde65a4cd07555298fce1ac43a8728e7920541c5b5e5c
                                                      • Instruction ID: 3422b70ba828be1278c1c7e42f91dafaa00f103853b995a8da87db3c60fcc5c2
                                                      • Opcode Fuzzy Hash: 17ca0878dc678fdc762dde65a4cd07555298fce1ac43a8728e7920541c5b5e5c
                                                      • Instruction Fuzzy Hash: AC113C31B1EA42D6EA80AB09F88046DA365FB88BC0BC69035EE5D03775DF2CE592C710