Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
solara-executor.exe

Overview

General Information

Sample name:solara-executor.exe
Analysis ID:1577819
MD5:6107673fe6de87ac938d8d45ceee771b
SHA1:0ebf97d44da9ce419102f2407e4b92ccc75677dd
SHA256:1d820e33b6818f08161dbd3766b37e971b7531ee018dee1eb21822edb1eaa545
Tags:exeuser-aachum
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contain functionality to detect virtual machines
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
PE file contains section with special chars
Tries to harvest and steal browser information (history, passwords, etc)
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • solara-executor.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\solara-executor.exe" MD5: 6107673FE6DE87AC938D8D45CEEE771B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: solara-executor.exe PID: 7316JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.solara-executor.exe.1984c1381d0.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-18T19:37:15.832886+010028032742Potentially Bad Traffic192.168.2.649714172.67.75.163443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: solara-executor.exeAvira: detected
        Source: solara-executor.exeReversingLabs: Detection: 18%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: solara-executor.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C0B7740 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock,CryptUnprotectData,0_2_000001984C0B7740
        Source: unknownHTTPS traffic detected: 172.67.75.163:443 -> 192.168.2.6:49714 version: TLS 1.2
        Source: solara-executor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C01F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_000001984C01F46A
        Source: Joe Sandbox ViewIP Address: 172.67.75.163 172.67.75.163
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49714 -> 172.67.75.163:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43Host: api.myip.com
        Source: global trafficDNS traffic detected: DNS query: api.myip.com
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://https://https/:://websocketpp.processorGeneric
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: solara-executor.exe, 00000000.00000003.2211474780.000001984C44F000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2246199496.000001984BF94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/Russia
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
        Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
        Source: unknownHTTPS traffic detected: 172.67.75.163:443 -> 192.168.2.6:49714 version: TLS 1.2
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D1D70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF6341D1D70
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D1D70 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF6341D1D70
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D1C20 OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF6341D1C20
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634200330 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF634200330
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634200D02 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF634200D02

        System Summary

        barindex
        Source: solara-executor.exeStatic PE information: section name: "/hR
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634203F90 PostQuitMessage,GetWindowRect,SetWindowPos,NtdllDefWindowProc_A,0_2_00007FF634203F90
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E278 NtdllDefWindowProc_A,0_2_00007FF63420E278
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6342047200_2_00007FF634204720
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FEA600_2_00007FF6341FEA60
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FF2F00_2_00007FF6341FF2F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6342003300_2_00007FF634200330
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FFCE00_2_00007FF6341FFCE0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DAD400_2_00007FF6341DAD40
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FE5B00_2_00007FF6341FE5B0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B5D900_2_00007FF6341B5D90
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341F0DE00_2_00007FF6341F0DE0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E25F00_2_00007FF6341E25F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341ECDD00_2_00007FF6341ECDD0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C46200_2_00007FF6341C4620
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CD6200_2_00007FF6341CD620
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B9E100_2_00007FF6341B9E10
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D96B00_2_00007FF6341D96B0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C46F00_2_00007FF6341C46F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D7EF00_2_00007FF6341D7EF0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C6EC00_2_00007FF6341C6EC0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B97300_2_00007FF6341B9730
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341BDFB00_2_00007FF6341BDFB0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E97F00_2_00007FF6341E97F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DBFC00_2_00007FF6341DBFC0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341F60900_2_00007FF6341F6090
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341EF9E00_2_00007FF6341EF9E0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E59E00_2_00007FF6341E59E0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DB1E00_2_00007FF6341DB1E0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CE1C00_2_00007FF6341CE1C0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341C5A300_2_00007FF6341C5A30
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341F2A000_2_00007FF6341F2A00
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CFA000_2_00007FF6341CFA00
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DC2700_2_00007FF6341DC270
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CC2500_2_00007FF6341CC250
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341CF2500_2_00007FF6341CF250
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FBA800_2_00007FF6341FBA80
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FC3100_2_00007FF6341FC310
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FA3700_2_00007FF6341FA370
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FCB400_2_00007FF6341FCB40
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DDB500_2_00007FF6341DDB50
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341BFBB00_2_00007FF6341BFBB0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B73900_2_00007FF6341B7390
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E6BC00_2_00007FF6341E6BC0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341B6CB00_2_00007FF6341B6CB0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D6C900_2_00007FF6341D6C90
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341E7CE00_2_00007FF6341E7CE0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341D54F00_2_00007FF6341D54F0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341ED5300_2_00007FF6341ED530
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF634200D020_2_00007FF634200D02
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341DBD100_2_00007FF6341DBD10
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C0E0FF00_2_000001984C0E0FF0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C0438410_2_000001984C043841
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C00BA300_2_000001984C00BA30
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: String function: 00007FF6341D1F40 appears 40 times
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: String function: 00007FF6341C85B0 appears 36 times
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: String function: 00007FF63420E460 appears 867 times
        Source: solara-executor.exeStatic PE information: Section: bbbb ZLIB complexity 0.9988679984861591
        Source: classification engineClassification label: mal88.spyw.evad.winEXE@1/1@1/1
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984BFF6FE0 std::_Fac_node::_Fac_node,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_000001984BFF6FE0
        Source: C:\Users\user\Desktop\solara-executor.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\HJWXIAQ3.htmJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: solara-executor.exe, 00000000.00000002.4005978558.000001984C5BA000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C5DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: solara-executor.exeReversingLabs: Detection: 18%
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: d3d9.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: msvcp140.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: vcruntime140_1.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: d3d10warp.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: resourcepolicyclient.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dxcore.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: xinput1_4.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: inputhost.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: solara-executor.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: solara-executor.exeStatic file information: File size 1248295 > 1048576
        Source: solara-executor.exeStatic PE information: Raw size of bbbb is bigger than: 0x100000 < 0x121000
        Source: solara-executor.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp
        Source: Binary string: C:\Users\55yar\Desktop\imgui-master\examples\imgui_loader\Release\example_win32_directx9.pdb/''GCTL source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\solara-executor.exeUnpacked PE file: 0.2.solara-executor.exe.7ff6341b0000.1.unpack "/hR:EW;bbbb:EW;Unknown_Section2:W; vs "/hR:ER;bbbb:ER;Unknown_Section2:W;
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FF7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF6341FF7A0
        Source: initial sampleStatic PE information: section where entry point is pointing to: bbbb
        Source: solara-executor.exeStatic PE information: section name: "/hR
        Source: solara-executor.exeStatic PE information: section name: bbbb
        Source: solara-executor.exeStatic PE information: section name: bNbF
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E578 push rax; retf 0_2_00007FF63420E579
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C16D632 pushfd ; retf BD37h0_2_000001984C16D7D9
        Source: solara-executor.exeStatic PE information: section name: bbbb entropy: 7.999761627141752

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: SOFTWARE\VMware, Inc.\VMware Tools SOFTWARE\VMware, Inc.\VMware Tools SOFTWARE\VMware, Inc.\VMware Tools 0_2_00007FF634203D40
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: \\.\VBoxMiniRdrDN \\.\VBoxMiniRdrDN \\.\VBoxMiniRdrDN 0_2_00007FF634203C00
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened / queried: VBoxMiniRdrDNJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeWindow / User API: threadDelayed 5529Jump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeWindow / User API: foregroundWindowGot 1664Jump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_000001984C01F46A Concurrency::details::WorkQueue::IsStructuredEmpty,FindFirstFileA,type_info::_name_internal_method,type_info::_name_internal_method,type_info::_name_internal_method,0_2_000001984C01F46A
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware ToolsNOPQRSTUVWXYZABCDEFGHIJKLMnopqrstuvwxyzabcdefghijklm0123456789+/LoadLibraryA
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsdvboxserviceu
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Kernel32.dllKernel32.dll\\.\VBoxMiniRdrDN
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayx64dbgh
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: \\.\VBoxMiniRdrDN
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2211474780.000001984C45E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2208261026.000001984C45E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005708630.000001984C45E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4004385732.000001984BF2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
        Source: solara-executor.exe, 00000000.00000002.4004385732.000001984BF2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-gaVGAuthServicevmwaretrayv
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
        Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
        Source: solara-executor.exe, 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: wiresharkvmwareuseri
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
        Source: solara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
        Source: solara-executor.exe, 00000000.00000003.2183482801.000001984C5E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
        Source: C:\Users\user\Desktop\solara-executor.exeAPI call chain: ExitProcess graph end nodegraph_0-76664
        Source: C:\Users\user\Desktop\solara-executor.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C628 IsProcessorFeaturePresent,00007FFDA46F19C0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFDA46F19C0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63420C628
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF6341FF7A0 QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF6341FF7A0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C628 IsProcessorFeaturePresent,00007FFDA46F19C0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFDA46F19C0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63420C628
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C80C SetUnhandledExceptionFilter,0_2_00007FF63420C80C
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E0B0 SetUnhandledExceptionFilter,0_2_00007FF63420E0B0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E0D0 SetUnhandledExceptionFilter,0_2_00007FF63420E0D0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420E0C0 SetUnhandledExceptionFilter,0_2_00007FF63420E0C0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: QueryPerformanceFrequency,QueryPerformanceCounter,GetKeyboardLayout,GetLocaleInfoA,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF6341FF7A0
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: GetKeyboardLayout,GetLocaleInfoA,0_2_00007FF63420105B
        Source: C:\Users\user\Desktop\solara-executor.exeCode function: 0_2_00007FF63420C8B8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF63420C8B8

        Stealing of Sensitive Information

        barindex
        Source: solara-executor.exeString found in binary or memory: Electrum-LTC
        Source: solara-executor.exeString found in binary or memory: \ElectronCash\wallets
        Source: solara-executor.exeString found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
        Source: solara-executor.exeString found in binary or memory: \Exodus\exodus.wallet
        Source: solara-executor.exeString found in binary or memory: \Ethereum\keystore
        Source: solara-executor.exeString found in binary or memory: Exodus Web
        Source: solara-executor.exeString found in binary or memory: Ethereum
        Source: solara-executor.exeString found in binary or memory: \Coinomi\Coinomi\wallets
        Source: solara-executor.exeString found in binary or memory: \Ethereum\keystore
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\solara-executor.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: Yara matchFile source: 0.2.solara-executor.exe.1984c1381d0.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: solara-executor.exe PID: 7316, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        1
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Input Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
        Virtualization/Sandbox Evasion
        1
        Input Capture
        121
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Deobfuscate/Decode Files or Information
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS2
        Process Discovery
        Distributed Component Object Model3
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
        Software Packing
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        solara-executor.exe18%ReversingLabs
        solara-executor.exe100%AviraHEUR/AGEN.1314582
        solara-executor.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://https://https/:://websocketpp.processorGeneric0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.myip.com
        172.67.75.163
        truefalse
          high
          fp2e7a.wpc.phicdn.net
          192.229.221.95
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://api.myip.com/false
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://https://https/:://websocketpp.processorGenericsolara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ac.ecosia.org/autocomplete?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/chrome_newtabsolara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://duckduckgo.com/ac/?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icosolara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgsolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usagesolara-executor.exe, solara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpfalse
                            high
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsolara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYisolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2212662127.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://api.myip.com/Russiasolara-executor.exe, 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Holdsolara-executor.exe, 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmpfalse
                                          high
                                          https://www.ecosia.org/newtab/solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgsolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=solara-executor.exe, 00000000.00000003.2239000405.000001984C787000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2224404179.000001984C836000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4005978558.000001984C6AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_solara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctasolara-executor.exe, 00000000.00000003.2202318264.000001984C79C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    172.67.75.163
                                                    api.myip.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1577819
                                                    Start date and time:2024-12-18 19:36:18 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 6m 47s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Run name:Run with higher sleep bypass
                                                    Number of analysed new started processes analysed:17
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:solara-executor.exe
                                                    Detection:MAL
                                                    Classification:mal88.spyw.evad.winEXE@1/1@1/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 88%
                                                    • Number of executed functions: 31
                                                    • Number of non-executed functions: 138
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 40.126.53.6, 20.223.36.55, 13.107.246.63, 20.109.210.53, 20.223.35.26, 2.18.40.157, 150.171.28.10, 2.18.40.144, 23.218.208.109
                                                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • VT rate limit hit for: solara-executor.exe
                                                    No simulations
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    172.67.75.163http://keynstrings.com/qdop/shriejeapd-xtre-czoyj-wux-182-n-ql72-dn6/?c=fg228vRhwgeAXmTlARVFPNkYQLEru1SQGolYq6DI2QO81BQyaFaUvmsyEbo4THF&dx6ywq7xi--6pmvnh36bm-q6ly=LedZebpban&f5W%2bAIcMkGZ9Lp3h7Da%2bJcuQl1mIISCF0%2bsnvlLl1C7JZwlOpPadnHGgzJCg9kkRnhKcM0BjIT2Bh9Pj1vF476j%3d%1d&url=htths%2a%0v%0wfr-tr.fazeboak.bon%2fUrbanZoccer%7cGet hashmaliciousGRQ ScamBrowse
                                                    • trk.adtrk18.com/aff_c?offer_id=15108&aff_id=1850&url_id=14904&aff_sub=ee27fca9-b066-4ae9-9cbc-def0df49be21&aff_sub5=cm3l19374
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    api.myip.comWaveExecutor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.8.59
                                                    Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    WaveExecutor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Nexus-Executor.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    Fortexternal.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                    • 104.26.9.59
                                                    file.exeGet hashmaliciousAmadey, CryptbotBrowse
                                                    • 172.67.75.163
                                                    file.exeGet hashmaliciousAmadey, XWormBrowse
                                                    • 172.67.75.163
                                                    fp2e7a.wpc.phicdn.netg8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                    • 192.229.221.95
                                                    http://golden1-alert.net/onlineGet hashmaliciousUnknownBrowse
                                                    • 192.229.221.95
                                                    ji2xlo1f.exeGet hashmaliciousLummaCBrowse
                                                    • 192.229.221.95
                                                    random.exe.2.exeGet hashmaliciousLummaCBrowse
                                                    • 192.229.221.95
                                                    https://pluginvest.freshdesk.com/en/support/solutions/articles/157000010678-pluginvest-laadoplossingGet hashmaliciousUnknownBrowse
                                                    • 192.229.221.95
                                                    stail.exe.3.exeGet hashmaliciousSocks5SystemzBrowse
                                                    • 192.229.221.95
                                                    GV7DzNoqCI.exeGet hashmaliciousUnknownBrowse
                                                    • 192.229.221.95
                                                    sxVHUOSqVC.exeGet hashmaliciousUnknownBrowse
                                                    • 192.229.221.95
                                                    R0SkdJNujW.exeGet hashmaliciousUnknownBrowse
                                                    • 192.229.221.95
                                                    zWkO4hyEk4.exeGet hashmaliciousUnknownBrowse
                                                    • 192.229.221.95
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUShttp://mee6.xyzGet hashmaliciousUnknownBrowse
                                                    • 172.66.0.227
                                                    g8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                    • 162.159.61.3
                                                    https://usemployee-hrdbenefits.comGet hashmaliciousUnknownBrowse
                                                    • 104.16.123.96
                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                    • 172.67.131.246
                                                    https://em.navan.com/MDM3LUlLWi04NzEAAAGXecU3IyvXka_yOfm1UXs3oOmq7mq-S6uBgGscrsY0kWMgpLalbadmEIYbTEXYqyKQHEXyRQM=Get hashmaliciousUnknownBrowse
                                                    • 104.16.79.73
                                                    A file has been sent to you via DROPBOX.pdfGet hashmaliciousUnknownBrowse
                                                    • 104.17.25.14
                                                    https://usps.com-parcelbvxce.vip/i/Get hashmaliciousUnknownBrowse
                                                    • 104.21.4.80
                                                    http://golden1-alert.net/onlineGet hashmaliciousUnknownBrowse
                                                    • 104.17.25.14
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    37f463bf4616ecd445d4a1937da06e19List of required items and services.pdf.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                    • 172.67.75.163
                                                    g8ix97hz.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                                    • 172.67.75.163
                                                    Setup.msiGet hashmaliciousUnknownBrowse
                                                    • 172.67.75.163
                                                    InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.75.163
                                                    T2dvU8f2xg.exeGet hashmaliciousUnknownBrowse
                                                    • 172.67.75.163
                                                    PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    • 172.67.75.163
                                                    z68scancopy.vbsGet hashmaliciousFormBookBrowse
                                                    • 172.67.75.163
                                                    oiBxz37xUo.dllGet hashmaliciousUnknownBrowse
                                                    • 172.67.75.163
                                                    No context
                                                    Process:C:\Users\user\Desktop\solara-executor.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):57
                                                    Entropy (8bit):4.406851198109578
                                                    Encrypted:false
                                                    SSDEEP:3:YMb1gXME2OMfQxaNmGGL4:YMeX32uxaNmRL4
                                                    MD5:720F698997A1D19594ED650E32E02974
                                                    SHA1:A4F89E711434820EAA2250F0421904468ED9D13F
                                                    SHA-256:0949A3EF0FE90F28780ADDE31202E2DC9C5FA57123355DF9C9FAA89A6EECCC04
                                                    SHA-512:32D94C8297E64041F851F62D168A7AB8418ABEFB97B1AD0B33D2D801DDF204AF2228D29470AEF18F3A9309FF3E9A8C78CC657D7D5DFC40F70F27EE34100812FA
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:{"ip":"8.46.123.189","country":"United States","cc":"US"}
                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Entropy (8bit):7.941670398228598
                                                    TrID:
                                                    • Win64 Executable GUI (202006/5) 93.51%
                                                    • Win64 Executable (generic) (12005/4) 5.56%
                                                    • DOS Executable Generic (2002/1) 0.93%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:solara-executor.exe
                                                    File size:1'248'295 bytes
                                                    MD5:6107673fe6de87ac938d8d45ceee771b
                                                    SHA1:0ebf97d44da9ce419102f2407e4b92ccc75677dd
                                                    SHA256:1d820e33b6818f08161dbd3766b37e971b7531ee018dee1eb21822edb1eaa545
                                                    SHA512:798affa3cabc3537d226ebdffa458309b0fa81a21939990eebdf121971e870d70d96f8b75ff6746b5d397e28015beb81f8af35df51f10adbf91c378d4dce74d2
                                                    SSDEEP:24576:PDnqyaenIySWhuUSC/i/dH9ONOznpY4sEkm30TEhibtyuk5mj5dRvgRnFpt:PGy5LSwUdbznqfEZ3RGN2Fpt
                                                    TLSH:DE45122BB7E46771D934D473CB9BC71AB330A262D0768B5B05C28B1F665A00A774BF18
                                                    File Content Preview:MZ......................@.2.92.UPX!._0x001818c..........................!..L.!This program cannot be run in DOS mode....$.......4=..p\..p\..p\..y$P.`\..`...v\..`...r\..`...y\..`...n\..;$..`\..W...s\..p\...\..;...x\..;.<.q\..;...q\..Richp\.................
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x140631280
                                                    Entrypoint Section:bbbb
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6761A24F [Tue Dec 17 16:09:51 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:b20f1daac672151d282f9ffd530ca36b
                                                    Instruction
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    push ebp
                                                    dec eax
                                                    lea esi, dword ptr [FFEDFD75h]
                                                    dec eax
                                                    lea edi, dword ptr [esi-00510000h]
                                                    push edi
                                                    mov eax, 0062FDCFh
                                                    push eax
                                                    dec eax
                                                    mov ecx, esp
                                                    dec eax
                                                    mov edx, edi
                                                    dec eax
                                                    mov edi, esi
                                                    mov esi, 00120274h
                                                    push ebp
                                                    dec eax
                                                    mov ebp, esp
                                                    inc esp
                                                    mov ecx, dword ptr [ecx]
                                                    dec ecx
                                                    mov eax, edx
                                                    dec eax
                                                    mov edx, esi
                                                    dec eax
                                                    lea esi, dword ptr [edi+02h]
                                                    push esi
                                                    mov al, byte ptr [edi]
                                                    dec edx
                                                    mov cl, al
                                                    and al, 07h
                                                    shr cl, 00000003h
                                                    dec eax
                                                    mov ebx, FFFFFD00h
                                                    dec eax
                                                    shl ebx, cl
                                                    mov cl, al
                                                    dec eax
                                                    lea ebx, dword ptr [esp+ebx*2-00000E78h]
                                                    dec eax
                                                    and ebx, FFFFFFC0h
                                                    push 00000000h
                                                    dec eax
                                                    cmp esp, ebx
                                                    jne 00007FE4B148D8CBh
                                                    push ebx
                                                    dec eax
                                                    lea edi, dword ptr [ebx+08h]
                                                    mov cl, byte ptr [esi-01h]
                                                    dec edx
                                                    mov byte ptr [edi+02h], al
                                                    mov al, cl
                                                    shr cl, 00000004h
                                                    mov byte ptr [edi+01h], cl
                                                    and al, 0Fh
                                                    mov byte ptr [edi], al
                                                    dec eax
                                                    lea ecx, dword ptr [edi-04h]
                                                    push eax
                                                    inc ecx
                                                    push edi
                                                    dec eax
                                                    lea eax, dword ptr [edi+04h]
                                                    inc ebp
                                                    xor edi, edi
                                                    inc ecx
                                                    push esi
                                                    inc ecx
                                                    mov esi, 00000001h
                                                    inc ecx
                                                    push ebp
                                                    inc ebp
                                                    xor ebp, ebp
                                                    inc ecx
                                                    push esp
                                                    push ebp
                                                    push ebx
                                                    dec eax
                                                    sub esp, 48h
                                                    dec eax
                                                    mov dword ptr [esp+38h], ecx
                                                    dec eax
                                                    mov dword ptr [esp+20h], eax
                                                    mov eax, 00000001h
                                                    dec eax
                                                    mov dword ptr [esp+40h], esi
                                                    dec esp
                                                    mov dword ptr [esp+30h], eax
                                                    mov ebx, eax
                                                    inc esp
                                                    mov dword ptr [esp+2Ch], ecx
                                                    movzx ecx, byte ptr [edi+02h]
                                                    shl ebx, cl
                                                    mov ecx, ebx
                                                    Programming Language:
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [IMP] VS2005 build 50727
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x6411b00x504bNbF
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6320000xf1b0bNbF
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3220000x4410"/hR
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6416b40x20bNbF
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x631e600x28bbbb
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x631e900x140bbbb
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    "/hR0x10000x5100000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    bbbb0x5110000x1210000x121000fb76c604981fcb6c4067a2c5117730c7False0.9988679984861591data7.999761627141752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    bNbF0x6320000x100000xf8000c5ce6f0a1e32589f6d634730baa9e50False0.2612462197580645data3.9453169926813554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    None0x640ff40x2edata1.108695652173913
                                                    RT_RCDATA0x3360200x3201empty0
                                                    RT_RCDATA0x3392240x3201empty0
                                                    RT_RCDATA0x33c4280x3201empty0
                                                    RT_RCDATA0x33f62c0x3201empty0
                                                    RT_RCDATA0x3428300x3201empty0
                                                    RT_RCDATA0x345a340x3201empty0
                                                    RT_RCDATA0x348c380x3201empty0
                                                    RT_RCDATA0x34be3c0x3201empty0
                                                    RT_RCDATA0x34f0400x3201empty0
                                                    RT_RCDATA0x3522440x3201empty0
                                                    RT_RCDATA0x3554480x3201empty0
                                                    RT_RCDATA0x35864c0x3201empty0
                                                    RT_RCDATA0x35b8500x3201empty0
                                                    RT_RCDATA0x35ea540x3201empty0
                                                    RT_RCDATA0x361c580x3201empty0
                                                    RT_RCDATA0x364e5c0x3201empty0
                                                    RT_RCDATA0x3680600x3201empty0
                                                    RT_RCDATA0x36b2640x3201empty0
                                                    RT_RCDATA0x36e4680x3201empty0
                                                    RT_RCDATA0x37166c0x3201empty0
                                                    RT_RCDATA0x3748700x3201empty0
                                                    RT_RCDATA0x377a740x3201empty0
                                                    RT_RCDATA0x37ac780x3201empty0
                                                    RT_RCDATA0x37de7c0x3201empty0
                                                    RT_RCDATA0x3810800x3201empty0
                                                    RT_RCDATA0x3842840x3201empty0
                                                    RT_RCDATA0x3874880x3201empty0
                                                    RT_RCDATA0x38a68c0x3201empty0
                                                    RT_RCDATA0x38d8900x76empty0
                                                    RT_RCDATA0x38d9080x22empty0
                                                    RT_RCDATA0x38d92c0x3201empty0
                                                    RT_RCDATA0x390b300x3201empty0
                                                    RT_RCDATA0x393d340x3201empty0
                                                    RT_RCDATA0x396f380x3201empty0
                                                    RT_RCDATA0x39a13c0x3201empty0
                                                    RT_RCDATA0x39d3400x796empty0
                                                    RT_RCDATA0x39dad80xfempty0
                                                    RT_RCDATA0x39dae80x3201empty0
                                                    RT_RCDATA0x3a0cec0x3201empty0
                                                    RT_RCDATA0x3a3ef00xedcf4empty0
                                                    RT_RCDATA0x491be40x3201empty0
                                                    RT_RCDATA0x494de80x9418empty0
                                                    RT_RCDATA0x49e2000x3201empty0
                                                    RT_RCDATA0x4a14040x3201empty0
                                                    RT_RCDATA0x4a46080x55empty0
                                                    RT_RCDATA0x4a46600x3201empty0
                                                    RT_RCDATA0x4a78640x3201empty0
                                                    RT_RCDATA0x4aaa680x3201empty0
                                                    RT_RCDATA0x4adc6c0x3201empty0
                                                    RT_RCDATA0x4b0e700x3201empty0
                                                    RT_RCDATA0x4b40740x3201empty0
                                                    RT_RCDATA0x4b72780x9eempty0
                                                    RT_RCDATA0x4b73180x1f2empty0
                                                    RT_RCDATA0x4b750c0x3201empty0
                                                    RT_RCDATA0x4ba7100x3201empty0
                                                    RT_RCDATA0x4bd9140x3201empty0
                                                    RT_RCDATA0x4c0b180x3201empty0
                                                    RT_RCDATA0x4c3d1c0x7dempty0
                                                    RT_RCDATA0x4c3d9c0x7dempty0
                                                    RT_RCDATA0x4c3e1c0x7dempty0
                                                    RT_RCDATA0x4c3e9c0x7dempty0
                                                    RT_RCDATA0x4c3f1c0x7dempty0
                                                    RT_RCDATA0x4c3f9c0x7dempty0
                                                    RT_RCDATA0x4c401c0x7dempty0
                                                    RT_RCDATA0x4c409c0x7dempty0
                                                    RT_RCDATA0x4c411c0x7dempty0
                                                    RT_RCDATA0x4c419c0x7dempty0
                                                    RT_RCDATA0x4c421c0x7dempty0
                                                    RT_RCDATA0x4c429c0x7dempty0
                                                    RT_RCDATA0x4c431c0x7dempty0
                                                    RT_RCDATA0x4c439c0x7dempty0
                                                    RT_RCDATA0x4c441c0x7dempty0
                                                    RT_RCDATA0x4c449c0x7dempty0
                                                    RT_RCDATA0x4c451c0x7dempty0
                                                    RT_RCDATA0x4c459c0x7dempty0
                                                    RT_RCDATA0x4c461c0x3201empty0
                                                    RT_RCDATA0x4c78200x3201empty0
                                                    RT_RCDATA0x4caa240x3201empty0
                                                    RT_RCDATA0x4cdc280x3201empty0
                                                    RT_RCDATA0x4d0e2c0x3201empty0
                                                    RT_RCDATA0x4d40300x3201empty0
                                                    RT_RCDATA0x4d72340x3201empty0
                                                    RT_RCDATA0x4da4380x3201empty0
                                                    RT_RCDATA0x4dd63c0x3201empty0
                                                    RT_RCDATA0x4e08400x3201empty0
                                                    RT_RCDATA0x4e3a440x3201empty0
                                                    RT_RCDATA0x4e6c480x3201empty0
                                                    RT_RCDATA0x4e9e4c0x3201empty0
                                                    RT_RCDATA0x4ed0500x3201empty0
                                                    RT_RCDATA0x4f02540x3201empty0
                                                    RT_RCDATA0x4f34580x3201empty0
                                                    RT_RCDATA0x4f665c0x3201empty0
                                                    RT_RCDATA0x4f98600x3201empty0
                                                    RT_RCDATA0x4fca640x3201empty0
                                                    RT_RCDATA0x4ffc680x3201empty0
                                                    RT_RCDATA0x502e6c0x3201empty0
                                                    RT_RCDATA0x5060700x3201empty0
                                                    RT_RCDATA0x5092740x3201empty0
                                                    RT_RCDATA0x50c4780x3201empty0
                                                    RT_RCDATA0x50f67c0x3201empty0
                                                    RT_RCDATA0x5128800x3201data1.0008593078665728
                                                    RT_RCDATA0x515a840x3201data1.0008593078665728
                                                    RT_RCDATA0x518c880x3201data1.0008593078665728
                                                    RT_RCDATA0x51be8c0x3201data1.0008593078665728
                                                    RT_RCDATA0x51f0900x3201data1.0008593078665728
                                                    RT_RCDATA0x5222940x3201data1.0008593078665728
                                                    RT_RCDATA0x5254980x3201data1.0008593078665728
                                                    RT_RCDATA0x52869c0x3201data1.0008593078665728
                                                    RT_RCDATA0x52b8a00x3201data1.0008593078665728
                                                    RT_RCDATA0x52eaa40x3201data1.0008593078665728
                                                    RT_RCDATA0x531ca80x3201data1.0008593078665728
                                                    RT_RCDATA0x534eac0x3201data1.0008593078665728
                                                    RT_RCDATA0x5380b00x3201data1.0008593078665728
                                                    RT_RCDATA0x53b2b40x3201data1.0008593078665728
                                                    RT_RCDATA0x53e4b80x3201OpenPGP Public Key1.0008593078665728
                                                    RT_RCDATA0x5416bc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5448c00x3201data1.0008593078665728
                                                    RT_RCDATA0x547ac40x3201data1.0008593078665728
                                                    RT_RCDATA0x54acc80x3201data1.0008593078665728
                                                    RT_RCDATA0x54decc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5510d00x3201data1.0008593078665728
                                                    RT_RCDATA0x5542d40x3201data1.0008593078665728
                                                    RT_RCDATA0x5574d80x3201data1.0008593078665728
                                                    RT_RCDATA0x55a6dc0x3201data1.0008593078665728
                                                    RT_RCDATA0x55d8e00x3201data1.0008593078665728
                                                    RT_RCDATA0x560ae40x3201data1.0008593078665728
                                                    RT_RCDATA0x563ce80x3201data1.0008593078665728
                                                    RT_RCDATA0x566eec0x3201data1.0008593078665728
                                                    RT_RCDATA0x56a0f00x3201SysEx File -1.0008593078665728
                                                    RT_RCDATA0x56d2f40x3201data1.0008593078665728
                                                    RT_RCDATA0x5704f80x3201data1.0008593078665728
                                                    RT_RCDATA0x5736fc0x3201data1.0008593078665728
                                                    RT_RCDATA0x5769000x3201data1.0008593078665728
                                                    RT_RCDATA0x579b040x3201data1.0008593078665728
                                                    RT_RCDATA0x57cd080x3201data1.0008593078665728
                                                    RT_RCDATA0x57ff0c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5831100x3201data1.0008593078665728
                                                    RT_RCDATA0x5863140x3201data1.0008593078665728
                                                    RT_RCDATA0x5895180x3201data1.0008593078665728
                                                    RT_RCDATA0x58c71c0x3201data1.0008593078665728
                                                    RT_RCDATA0x58f9200x3201data1.0008593078665728
                                                    RT_RCDATA0x592b240x3201data1.0008593078665728
                                                    RT_RCDATA0x595d280x3201data1.0008593078665728
                                                    RT_RCDATA0x598f2c0x3201data1.0008593078665728
                                                    RT_RCDATA0x59c1300x3201data1.0008593078665728
                                                    RT_RCDATA0x59f3340x3201data1.0008593078665728
                                                    RT_RCDATA0x5a25380x3201OpenPGP Public Key1.0008593078665728
                                                    RT_RCDATA0x5a573c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5a89400x3201data1.0008593078665728
                                                    RT_RCDATA0x5abb440x3201data1.0008593078665728
                                                    RT_RCDATA0x5aed480x3201data1.0008593078665728
                                                    RT_RCDATA0x5b1f4c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5b51500x3201OpenPGP Public Key1.0008593078665728
                                                    RT_RCDATA0x5b83540x3201data1.0008593078665728
                                                    RT_RCDATA0x5bb5580x3201data1.0008593078665728
                                                    RT_RCDATA0x5be75c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5c19600x3201data1.0008593078665728
                                                    RT_RCDATA0x5c4b640x3201data1.0008593078665728
                                                    RT_RCDATA0x5c7d680x3201data1.0008593078665728
                                                    RT_RCDATA0x5caf6c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5ce1700x3201data1.0008593078665728
                                                    RT_RCDATA0x5d13740x3201data1.0008593078665728
                                                    RT_RCDATA0x5d45780x3201data1.0008593078665728
                                                    RT_RCDATA0x5d777c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5da9800x3201data1.0008593078665728
                                                    RT_RCDATA0x5ddb840x3201data1.0008593078665728
                                                    RT_RCDATA0x5e0d880x3201data1.0008593078665728
                                                    RT_RCDATA0x5e3f8c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5e71900x3201data1.0008593078665728
                                                    RT_RCDATA0x5ea3940x3201data1.0008593078665728
                                                    RT_RCDATA0x5ed5980x3201data1.0008593078665728
                                                    RT_RCDATA0x5f079c0x3201data1.0008593078665728
                                                    RT_RCDATA0x5f39a00x3201data1.0008593078665728
                                                    RT_RCDATA0x5f6ba40x3201data1.0008593078665728
                                                    RT_RCDATA0x5f9da80x3201data1.0008593078665728
                                                    RT_RCDATA0x5fcfac0x3201data1.0008593078665728
                                                    RT_RCDATA0x6001b00x3201data1.0008593078665728
                                                    RT_RCDATA0x6033b40x3201data1.0008593078665728
                                                    RT_RCDATA0x6065b80x3201data1.0008593078665728
                                                    RT_RCDATA0x6097bc0x3201data1.0008593078665728
                                                    RT_RCDATA0x60c9c00x3201data1.0008593078665728
                                                    RT_RCDATA0x60fbc40x3201data1.0008593078665728
                                                    RT_RCDATA0x612dc80x3201data1.0008593078665728
                                                    RT_RCDATA0x615fcc0x3201data1.0008593078665728
                                                    RT_RCDATA0x6191d00x3201data1.0008593078665728
                                                    RT_RCDATA0x61c3d40x3201data1.0008593078665728
                                                    RT_RCDATA0x61f5d80x3201data1.0008593078665728
                                                    RT_RCDATA0x6227dc0x3201data1.0008593078665728
                                                    RT_RCDATA0x6259e00x3201data1.0008593078665728
                                                    RT_MANIFEST0x6410280x2data5.0
                                                    RT_MANIFEST0x6410300x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                    None0x628d680x102data1.0426356589147288
                                                    None0x628e6c0xdadata1.0504587155963303
                                                    None0x628f480xbadata1.0591397849462365
                                                    None0x6290040x12adata1.0369127516778522
                                                    None0x6291300x16edata1.030054644808743
                                                    None0x6292a00x16cdata1.0302197802197801
                                                    None0x62940c0xfadata1.044
                                                    None0x6295080x11adata1.0390070921985815
                                                    None0x6296240x178data1.0292553191489362
                                                    None0x62979c0xe0data1.0491071428571428
                                                    None0x62987c0xbcdata1.0585106382978724
                                                    None0x6299380x124data1.0376712328767124
                                                    None0x629a5c0xb0data1.0625
                                                    None0x629b0c0xa6data1.0662650602409638
                                                    None0x629bb40x7edata1.0873015873015872
                                                    None0x629c340xd6data1.0514018691588785
                                                    None0x629d0c0xe6data1.0478260869565217
                                                    None0x629df40xeadata1.047008547008547
                                                    None0x629ee00xcadata1.0544554455445545
                                                    None0x629fac0xdedata1.0495495495495495
                                                    None0x62a08c0x98data1.0723684210526316
                                                    None0x62a1240xe4data1.0482456140350878
                                                    None0x62a2080xc2data1.056701030927835
                                                    None0x62a2cc0xbedata1.0578947368421052
                                                    None0x62a38c0x11adata1.0390070921985815
                                                    None0x62a4a80xa8data1.0654761904761905
                                                    None0x62a5500xdadata1.0504587155963303
                                                    None0x62a62c0xa2data1.0679012345679013
                                                    None0x62a6d00xeadata1.047008547008547
                                                    None0x62a7bc0x88data1.0808823529411764
                                                    None0x62a8440xd8data1.0509259259259258
                                                    None0x62a91c0x152data1.032544378698225
                                                    None0x62aa700x134data1.0357142857142858
                                                    None0x62aba40xecdata1.0466101694915255
                                                    None0x62ac900x120data1.0381944444444444
                                                    None0x62adb00x116data1.039568345323741
                                                    None0x62aec80x7edata1.0873015873015872
                                                    None0x62af480xf2data1.0454545454545454
                                                    None0x62b03c0x106data1.0419847328244274
                                                    None0x62b1440xdcdata1.05
                                                    None0x62b2200xdeOpenPGP Secret Key1.0495495495495495
                                                    None0x62b3000x152data1.032544378698225
                                                    None0x62b4540x154data1.0323529411764707
                                                    None0x62b5a80xe4data1.0482456140350878
                                                    None0x62b68c0xc0OpenPGP Secret Key1.0572916666666667
                                                    None0x62b74c0xacdata1.063953488372093
                                                    None0x62b7f80xf2data1.0454545454545454
                                                    None0x62b8ec0xdcdata1.05
                                                    None0x62b9c80x126data1.0374149659863945
                                                    None0x62baf00x9cdata1.0705128205128205
                                                    None0x62bb8c0x8adata1.0797101449275361
                                                    None0x62bc180x15adata1.0317919075144508
                                                    None0x62bd740xf8data1.0443548387096775
                                                    None0x62be6c0xe2data1.0486725663716814
                                                    None0x62bf500x5adata1.1222222222222222
                                                    None0x62bfac0x106data1.0419847328244274
                                                    None0x62c0b40xc8data1.055
                                                    None0x62c17c0xccdata1.053921568627451
                                                    None0x62c2480xd6data1.0514018691588785
                                                    None0x62c3200x144data1.0339506172839505
                                                    None0x62c4640x138data1.0352564102564104
                                                    None0x62c59c0xf8data1.0443548387096775
                                                    None0x62c6940xe2data1.0486725663716814
                                                    None0x62c7780xd6data1.0514018691588785
                                                    None0x62c8500x140data1.034375
                                                    None0x62c9900x88data1.0808823529411764
                                                    None0x62ca180x10cdata1.041044776119403
                                                    None0x62cb240x9adata1.0714285714285714
                                                    None0x62cbc00x88data1.0808823529411764
                                                    None0x62cc480xc4data1.0561224489795917
                                                    None0x62cd0c0xbcdata1.0585106382978724
                                                    None0x62cdc80xa2data1.0679012345679013
                                                    None0x62ce6c0x100OpenPGP Secret Key1.04296875
                                                    None0x62cf6c0x100data1.04296875
                                                    None0x62d06c0x126data1.0374149659863945
                                                    None0x62d1940x100data1.04296875
                                                    None0x62d2940x80data1.0859375
                                                    None0x62d3140xeedata1.046218487394958
                                                    None0x62d4040x9edata1.0696202531645569
                                                    None0x62d4a40x94data1.0743243243243243
                                                    None0x62d5380xf8OpenPGP Public Key1.0443548387096775
                                                    None0x62d6300xe0data1.0491071428571428
                                                    None0x62d7100x100data1.04296875
                                                    None0x62d8100x8adata1.0797101449275361
                                                    None0x62d89c0x5adata1.1222222222222222
                                                    None0x62d8f80x100data1.04296875
                                                    None0x62d9f80xacdata1.063953488372093
                                                    None0x62daa40x144data1.0339506172839505
                                                    None0x62dbe80x14edata1.032934131736527
                                                    None0x62dd380xa4data1.0670731707317074
                                                    None0x62dddc0xd0data1.0528846153846154
                                                    None0x62deac0xf8data1.0443548387096775
                                                    None0x62dfa40x15adata1.0317919075144508
                                                    None0x62e1000xb2data1.0617977528089888
                                                    None0x62e1b40xf2data1.0454545454545454
                                                    None0x62e2a80xbcdata1.0585106382978724
                                                    None0x62e3640xc2data1.056701030927835
                                                    None0x62e4280xe8data1.0474137931034482
                                                    None0x62e5100x164data1.0308988764044944
                                                    None0x62e6740x98data1.0723684210526316
                                                    None0x62e70c0xf4OpenPGP Public Key1.0450819672131149
                                                    None0x62e8000x158data1.0319767441860466
                                                    None0x62e9580xe0data1.0491071428571428
                                                    None0x62ea380x82data1.0846153846153845
                                                    None0x62eabc0x126data1.0374149659863945
                                                    DLLImport
                                                    ADVAPI32.dllRegOpenKeyExA
                                                    api-ms-win-crt-heap-l1-1-0.dllfree
                                                    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                    api-ms-win-crt-math-l1-1-0.dllcosf
                                                    api-ms-win-crt-runtime-l1-1-0.dllexit
                                                    api-ms-win-crt-stdio-l1-1-0.dllfseek
                                                    api-ms-win-crt-string-l1-1-0.dllstrcmp
                                                    api-ms-win-crt-utility-l1-1-0.dllqsort
                                                    d3d9.dllDirect3DCreate9
                                                    IMM32.dllImmGetContext
                                                    kErneL32.DlLLoadLibraryA, DeleteAtom, GetProcAddress, VirtualProtect
                                                    MSVCP140.dll_Query_perf_counter
                                                    olE32.dllCoTaskMemFree
                                                    SHELL32.dllShellExecuteA
                                                    USER32.dllSetCursor
                                                    VCRUNTIME140.dllmemset
                                                    VCRUNTIME140_1.dll__CxxFrameHandler4
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-12-18T19:37:15.832886+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649714172.67.75.163443TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 18, 2024 19:37:13.628911018 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:13.628950119 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:13.629035950 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:13.642235041 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:13.642246962 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:14.875044107 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:14.877188921 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.349327087 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.349348068 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.349687099 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.349746943 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.364975929 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.411345005 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.832880020 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.832948923 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.832968950 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.832988977 CET44349714172.67.75.163192.168.2.6
                                                    Dec 18, 2024 19:37:15.833010912 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.833034039 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.834861040 CET49714443192.168.2.6172.67.75.163
                                                    Dec 18, 2024 19:37:15.834884882 CET44349714172.67.75.163192.168.2.6
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 18, 2024 19:37:13.482150078 CET5779753192.168.2.61.1.1.1
                                                    Dec 18, 2024 19:37:13.622361898 CET53577971.1.1.1192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 18, 2024 19:37:13.482150078 CET192.168.2.61.1.1.10x4496Standard query (0)api.myip.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 18, 2024 19:37:09.661267042 CET1.1.1.1192.168.2.60x25aeNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                    Dec 18, 2024 19:37:09.661267042 CET1.1.1.1192.168.2.60x25aeNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 19:37:13.622361898 CET1.1.1.1192.168.2.60x4496No error (0)api.myip.com172.67.75.163A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 19:37:13.622361898 CET1.1.1.1192.168.2.60x4496No error (0)api.myip.com104.26.9.59A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 19:37:13.622361898 CET1.1.1.1192.168.2.60x4496No error (0)api.myip.com104.26.8.59A (IP address)IN (0x0001)false
                                                    • api.myip.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.649714172.67.75.1634437316C:\Users\user\Desktop\solara-executor.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-12-18 18:37:15 UTC182OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.74 Safari/537.36 Edg/79.0.309.43
                                                    Host: api.myip.com
                                                    2024-12-18 18:37:15 UTC778INHTTP/1.1 200 OK
                                                    Date: Wed, 18 Dec 2024 18:37:15 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    vary: Accept-Encoding
                                                    cf-cache-status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Koq5Uo3GRzsjwrxdV03B3gqHetFLSmdq26EwM4Rbrcoyrg1HHyFZAnF5ojWTWk6jTtZjU30QzKJT%2Bf7AMpMIQ1keRcmQUS83ifh%2BGX%2F9WX62KfK4sSeS4AKG7kgtmA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8f41435c3a31729f-EWR
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2027&min_rtt=2020&rtt_var=771&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2817&recv_bytes=820&delivery_rate=1405873&cwnd=169&unsent_bytes=0&cid=a320fb49e9069f24&ts=971&x=0"
                                                    2024-12-18 18:37:15 UTC63INData Raw: 33 39 0d 0a 7b 22 69 70 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 63 22 3a 22 55 53 22 7d 0d 0a
                                                    Data Ascii: 39{"ip":"8.46.123.189","country":"United States","cc":"US"}
                                                    2024-12-18 18:37:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Target ID:0
                                                    Start time:13:37:12
                                                    Start date:18/12/2024
                                                    Path:C:\Users\user\Desktop\solara-executor.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\solara-executor.exe"
                                                    Imagebase:0x7ff6341b0000
                                                    File size:1'248'295 bytes
                                                    MD5 hash:6107673FE6DE87AC938D8D45CEEE771B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3.2%
                                                      Dynamic/Decrypted Code Coverage:34.5%
                                                      Signature Coverage:28.3%
                                                      Total number of Nodes:950
                                                      Total number of Limit Nodes:44
                                                      execution_graph 77205 1984c01f46a Concurrency::details::WorkQueue::IsStructuredEmpty FindFirstFileA 77206 1984c01f4e9 77205->77206 77223 1984c01f4a4 77205->77223 77207 1984bffa170 std::bad_alloc::bad_alloc 77206->77207 77210 1984c01f559 77206->77210 77208 1984c01f551 77207->77208 77298 1984c01fe00 6 API calls 77208->77298 77211 1984bffa110 std::bad_alloc::bad_alloc 77210->77211 77212 1984c01f5a0 77211->77212 77213 1984bffa170 std::bad_alloc::bad_alloc 77212->77213 77214 1984c01f5cd 77213->77214 77254 1984c1075a0 77214->77254 77216 1984c01f5ea 77217 1984c01f6c1 77216->77217 77218 1984c01f5fb 77216->77218 77217->77223 77267 1984c1036d0 std::bad_alloc::bad_alloc allocator 77217->77267 77222 1984bffa170 std::bad_alloc::bad_alloc 77218->77222 77218->77223 77220 1984c01f724 77221 1984bffa170 std::bad_alloc::bad_alloc 77220->77221 77224 1984c01f74e 77221->77224 77225 1984c01f675 77222->77225 77268 1984c0ba1e0 77224->77268 77299 1984c01fe00 6 API calls 77225->77299 77228 1984c01f773 type_info::_name_internal_method 77241 1984c01f9fc 77228->77241 77300 1984c1036d0 std::bad_alloc::bad_alloc allocator 77228->77300 77231 1984c01f7dd 77232 1984bffa170 std::bad_alloc::bad_alloc 77231->77232 77233 1984c01f807 77232->77233 77301 1984c0bacc0 CryptUnprotectData std::bad_alloc::bad_alloc Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock allocator Concurrency::details::FreeThreadProxyFactory::Retire 77233->77301 77235 1984c01fa2c 77304 1984c1036d0 std::bad_alloc::bad_alloc allocator 77235->77304 77237 1984c01fa67 77305 1984c1036d0 std::bad_alloc::bad_alloc allocator 77237->77305 77238 1984c01f82c type_info::_name_internal_method 77238->77241 77242 1984c01f874 77238->77242 77240 1984c01faa2 77306 1984c1036d0 std::bad_alloc::bad_alloc allocator 77240->77306 77303 1984c1036d0 std::bad_alloc::bad_alloc allocator 77241->77303 77243 1984bffa170 std::bad_alloc::bad_alloc 77242->77243 77246 1984c01f8b9 type_info::_name_internal_method 77243->77246 77245 1984c01fadd 77307 1984c1036d0 std::bad_alloc::bad_alloc allocator 77245->77307 77248 1984bffa170 std::bad_alloc::bad_alloc 77246->77248 77251 1984c01f905 77246->77251 77249 1984c01f94a 77248->77249 77302 1984c01e2c0 21 API calls 77249->77302 77252 1984c01fb18 77308 1984c0228c0 std::bad_alloc::bad_alloc 77252->77308 77255 1984bffa170 std::bad_alloc::bad_alloc 77254->77255 77256 1984c1075d0 77255->77256 77257 1984c0d8720 3 API calls 77256->77257 77258 1984c1075e0 77257->77258 77266 1984c1075f7 77258->77266 77309 1984c119d5c 77258->77309 77260 1984c107682 77261 1984bffa170 std::bad_alloc::bad_alloc 77260->77261 77264 1984c1076c2 77260->77264 77262 1984c1076ae 77261->77262 77313 1984c1033c0 77262->77313 77265 1984bffa170 std::bad_alloc::bad_alloc 77264->77265 77264->77266 77265->77266 77266->77216 77267->77220 77273 1984c0ba202 Concurrency::details::FreeThreadProxyFactory::Retire 77268->77273 77269 1984c0ba26c 77270 1984c0ba27c 77269->77270 77278 1984c0ba2c1 77269->77278 77272 1984bffa110 std::bad_alloc::bad_alloc 77270->77272 77274 1984c0ba290 allocator 77272->77274 77273->77269 77362 1984bff5130 std::bad_alloc::bad_alloc 77273->77362 77274->77228 77275 1984c0ba3cb 77276 1984bffa110 std::bad_alloc::bad_alloc 77275->77276 77277 1984c0ba3df 77276->77277 77279 1984c0ba429 77277->77279 77280 1984c0ba478 77277->77280 77278->77275 77283 1984c0ba7af 77278->77283 77282 1984bffa170 std::bad_alloc::bad_alloc 77279->77282 77281 1984bffa170 std::bad_alloc::bad_alloc 77280->77281 77285 1984c0ba448 77281->77285 77282->77285 77365 1984c0b7740 77283->77365 77286 1984bffa170 std::bad_alloc::bad_alloc 77285->77286 77287 1984c0ba4fe 77286->77287 77330 1984c0b7990 77287->77330 77288 1984c0ba831 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77371 1984c026b70 std::bad_alloc::bad_alloc 77288->77371 77291 1984c0ba50e 77358 1984c0b9f40 77291->77358 77293 1984c0ba6f2 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77364 1984c026b70 std::bad_alloc::bad_alloc 77293->77364 77295 1984c0ba580 Concurrency::details::FreeThreadProxyFactory::Retire 77295->77293 77296 1984c0ba632 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77295->77296 77363 1984c026b70 std::bad_alloc::bad_alloc 77296->77363 77298->77210 77299->77223 77300->77231 77301->77238 77302->77223 77303->77235 77304->77237 77305->77240 77306->77245 77307->77252 77308->77223 77310 1984c119d67 77309->77310 77312 1984c119d80 std::_Facet_Register 77310->77312 77325 1984c11a810 std::bad_alloc::bad_alloc 77310->77325 77312->77260 77326 1984bff5740 77313->77326 77315 1984c1033ee std::_Fac_node::_Fac_node 77316 1984c103482 77315->77316 77317 1984bffa170 std::bad_alloc::bad_alloc 77316->77317 77318 1984c1034f3 77317->77318 77319 1984c0d8720 3 API calls 77318->77319 77320 1984c103503 77319->77320 77323 1984c103510 type_info::_name_internal_method 77320->77323 77327 1984c0d8ca0 Concurrency::details::WorkQueue::IsStructuredEmpty CreateFileA ReadFile 77320->77327 77322 1984c103573 77322->77323 77329 1984bff5130 std::bad_alloc::bad_alloc 77322->77329 77323->77264 77326->77315 77328 1984c0d8d2f 77327->77328 77328->77322 77329->77322 77331 1984c0b79ac 77330->77331 77332 1984bffa170 std::bad_alloc::bad_alloc 77331->77332 77333 1984c0b79c8 77332->77333 77334 1984bffa110 std::bad_alloc::bad_alloc 77333->77334 77335 1984c0b79fc type_info::_name_internal_method 77334->77335 77336 1984bffa170 std::bad_alloc::bad_alloc 77335->77336 77337 1984c0b7a47 77336->77337 77338 1984c0d8720 3 API calls 77337->77338 77339 1984c0b7a57 Concurrency::details::HardwareAffinity::operator!= 77338->77339 77340 1984c0b7a64 77339->77340 77341 1984c026a80 std::bad_alloc::bad_alloc 77339->77341 77340->77291 77342 1984c0b7af1 77341->77342 77372 1984c0d8d40 77342->77372 77344 1984c0b7b6f 77345 1984bffa110 std::bad_alloc::bad_alloc 77344->77345 77346 1984c0b7ba3 77345->77346 77346->77340 77378 1984bff9f20 std::bad_alloc::bad_alloc Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77346->77378 77348 1984c0b7d4f 77349 1984c0b7d8a Concurrency::details::WorkQueue::IsStructuredEmpty 77348->77349 77350 1984c0b7dbd 77349->77350 77351 1984bffa110 std::bad_alloc::bad_alloc 77350->77351 77352 1984c0b7ddd 77351->77352 77379 1984bffb8c0 std::bad_alloc::bad_alloc Concurrency::details::FreeThreadProxyFactory::Retire 77352->77379 77354 1984c0b7df2 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77380 1984bff5100 std::bad_alloc::bad_alloc 77354->77380 77356 1984c0b7e74 77357 1984c0b7740 2 API calls 77356->77357 77357->77340 77359 1984c0b9f9f Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77358->77359 77382 1984bff3d40 77359->77382 77361 1984c0ba15c 77361->77295 77362->77273 77363->77274 77364->77274 77366 1984c0b7794 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77365->77366 77367 1984c0b787c CryptUnprotectData 77366->77367 77369 1984c0b78bd 77367->77369 77370 1984c0b791d type_info::_name_internal_method 77369->77370 77403 1984bff5130 std::bad_alloc::bad_alloc 77369->77403 77370->77288 77371->77274 77373 1984c11a108 77372->77373 77374 1984c0d8d60 Concurrency::details::WorkQueue::IsStructuredEmpty CreateFileA ReadFile 77373->77374 77375 1984c0d8df5 77374->77375 77381 1984c026b70 std::bad_alloc::bad_alloc 77375->77381 77377 1984c0d8e15 type_info::_name_internal_method 77377->77344 77378->77348 77379->77354 77380->77356 77381->77377 77383 1984bff3d69 77382->77383 77384 1984bff5360 std::bad_alloc::bad_alloc 77383->77384 77385 1984bff3db4 77384->77385 77386 1984bff5360 std::bad_alloc::bad_alloc 77385->77386 77387 1984bff3dff 77386->77387 77388 1984bff5360 std::bad_alloc::bad_alloc 77387->77388 77389 1984bff3e4a 77388->77389 77396 1984bff4740 77389->77396 77391 1984bff3e77 77400 1984bff4850 std::bad_alloc::bad_alloc Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77391->77400 77393 1984bff3eb1 77401 1984bff5100 std::bad_alloc::bad_alloc 77393->77401 77395 1984bff4111 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77395->77361 77397 1984bff4771 Concurrency::details::WorkQueue::IsStructuredEmpty 77396->77397 77402 1984bff53c0 std::bad_alloc::bad_alloc Concurrency::details::WorkQueue::IsStructuredEmpty allocator type_info::_name_internal_method 77397->77402 77399 1984bff47b6 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::FreeThreadProxyFactory::Retire 77399->77391 77400->77393 77401->77395 77402->77399 77403->77369 76314 7ff6341ff7a0 76316 7ff6341ff7b6 76314->76316 76315 7ff6341ff7fb QueryPerformanceFrequency 76317 7ff6341ff811 QueryPerformanceCounter 76315->76317 76318 7ff6341ffa2e 76315->76318 76316->76315 76317->76318 76319 7ff6341ff827 76317->76319 76320 7ff6341ff8cc GetKeyboardLayout GetLocaleInfoA 76319->76320 76322 7ff6341ff936 76320->76322 76321 7ff6341ff9c0 LoadLibraryA 76321->76322 76323 7ff6341ff9ef GetProcAddress GetProcAddress 76321->76323 76322->76321 76324 7ff6341ff9dc 76322->76324 76325 1984c0d8bc0 Concurrency::details::WorkQueue::IsStructuredEmpty CreateFileA 76326 1984c0d8c25 76325->76326 76331 1984bffa170 76326->76331 76330 1984c0d8c59 76332 1984bffa192 Concurrency::details::WorkQueue::IsStructuredEmpty allocator Concurrency::task_continuation_context::task_continuation_context type_info::_name_internal_method 76331->76332 76348 1984bffae40 76332->76348 76334 1984bffa1f6 76335 1984c0d8720 76334->76335 76336 1984c0d8742 76335->76336 76353 1984c001fd0 76336->76353 76341 1984c026a80 std::bad_alloc::bad_alloc 76342 1984c0d881e Concurrency::details::WorkQueue::IsStructuredEmpty CreateFileA 76341->76342 76343 1984c0d8863 76342->76343 76345 1984c0d8918 76343->76345 76347 1984c0d8878 76343->76347 76360 1984bff9f20 std::bad_alloc::bad_alloc Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 76343->76360 76361 1984bff9f20 std::bad_alloc::bad_alloc Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 76345->76361 76347->76330 76349 1984bffae67 Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 76348->76349 76351 1984bffaeb2 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock type_info::_name_internal_method 76349->76351 76352 1984bffb4c0 std::bad_alloc::bad_alloc type_info::_name_internal_method 76349->76352 76351->76334 76352->76351 76362 1984c0025e0 76353->76362 76356 1984c026a80 76357 1984c026a98 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock Concurrency::task_continuation_context::task_continuation_context UnDecorator::getVbTableType 76356->76357 76358 1984c002710 type_info::_name_internal_method std::bad_alloc::bad_alloc 76357->76358 76359 1984c026a9f 76357->76359 76358->76359 76359->76341 76360->76345 76361->76347 76363 1984c0025f8 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock char_traits 76362->76363 76366 1984c002710 76363->76366 76365 1984c001fed 76365->76356 76367 1984c002793 76366->76367 76369 1984c002734 Concurrency::task_continuation_context::task_continuation_context char_traits 76366->76369 76370 1984c002b00 std::bad_alloc::bad_alloc Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock type_info::_name_internal_method 76367->76370 76369->76365 76370->76369 77404 7ff634201b90 77407 7ff634201c2c 77404->77407 77405 7ff634201eef 77406 7ff634201dbb LoadLibraryA 77406->77407 77407->77405 77407->77406 77408 7ff634203f90 77409 7ff634203fcd 77408->77409 77410 7ff634203ff2 77409->77410 77411 7ff63420409a PostQuitMessage 77409->77411 77420 7ff634203fd2 77409->77420 77412 7ff634204024 77410->77412 77413 7ff634203ff9 77410->77413 77411->77420 77418 7ff634203f20 6 API calls 77412->77418 77412->77420 77414 7ff6342040be 77413->77414 77417 7ff634204011 77413->77417 77416 7ff6342040cd GetWindowRect 77414->77416 77414->77420 77415 7ff6342041b1 NtdllDefWindowProc_A 77415->77420 77419 7ff634204151 77416->77419 77416->77420 77417->77415 77417->77420 77418->77420 77419->77420 77421 7ff634204176 SetWindowPos 77419->77421 77421->77420 76371 7ff63420c0cc 76372 7ff63420c0dc 76371->76372 76380 7ff63420be9c 76372->76380 76375 7ff63420c181 76376 7ff63420c100 Concurrency::details::ResourceManager::CreateNodeTopology _RTC_Initialize 76377 7ff63420c14e 00007FFDB2241B20 76376->76377 76378 7ff63420c15a 76376->76378 76377->76378 76379 7ff63420c171 76378->76379 76385 7ff63420c628 9 API calls 76378->76385 76381 7ff63420bead 76380->76381 76382 7ff63420beb2 __scrt_release_startup_lock 76380->76382 76381->76382 76386 7ff63420c628 9 API calls 76381->76386 76382->76376 76384 7ff63420bf26 76385->76375 76386->76384 76387 1984c0fcb40 76401 1984bff52b0 76387->76401 76389 1984c0fcb66 CreateToolhelp32Snapshot 76390 1984c0fcb82 76389->76390 76391 1984c0fcbd7 Process32NextW 76390->76391 76392 1984c0fcb89 76390->76392 76391->76392 76398 1984c0fcbfd 76391->76398 76394 1984bffa170 std::bad_alloc::bad_alloc 76394->76398 76395 1984c0fcc59 Concurrency::details::WorkQueue::IsStructuredEmpty 76396 1984bffa170 std::bad_alloc::bad_alloc 76395->76396 76396->76398 76397 1984c0fcc92 Concurrency::details::WorkQueue::IsStructuredEmpty 76397->76398 76398->76394 76398->76395 76398->76397 76399 1984c0fcd30 Process32NextW 76398->76399 76400 1984c026a80 std::bad_alloc::bad_alloc 76398->76400 76403 1984bff5360 76398->76403 76399->76392 76399->76398 76400->76398 76402 1984bff52d2 UnDecorator::getVbTableType 76401->76402 76402->76389 76404 1984bff5387 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock _WChar_traits 76403->76404 76407 1984bff5b70 76404->76407 76406 1984bff53ac 76406->76398 76408 1984bff5b97 Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 76407->76408 76410 1984bff5bdc Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock type_info::_name_internal_method char_traits 76408->76410 76411 1984bff6540 std::bad_alloc::bad_alloc 76408->76411 76410->76406 76411->76410 76412 1984bff3590 76415 1984c1101c0 76412->76415 76414 1984bff35a0 std::make_error_code 76416 1984c1101ed 76415->76416 76417 1984c1101f5 76416->76417 76418 1984c1102a4 76416->76418 76424 1984bffa110 76417->76424 76419 1984bffa110 std::bad_alloc::bad_alloc 76418->76419 76422 1984c110273 allocator 76419->76422 76421 1984c110207 76421->76422 76428 1984c026990 std::bad_alloc::bad_alloc Concurrency::task_continuation_context::task_continuation_context 76421->76428 76422->76414 76425 1984bffa137 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock char_traits 76424->76425 76429 1984bffacb0 76425->76429 76427 1984bffa15c 76427->76421 76428->76422 76430 1984bffacd7 Concurrency::details::WorkQueue::IsStructuredEmpty type_info::_name_internal_method 76429->76430 76432 1984bffad1c Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock type_info::_name_internal_method char_traits 76430->76432 76433 1984bffb4c0 std::bad_alloc::bad_alloc type_info::_name_internal_method 76430->76433 76432->76427 76433->76432 77422 1984bff6fe0 77423 1984bff7001 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77422->77423 77424 1984bffa110 std::bad_alloc::bad_alloc 77423->77424 77425 1984bff7039 77424->77425 77426 1984bffa110 std::bad_alloc::bad_alloc 77425->77426 77427 1984bff706c 77426->77427 77428 1984bffa110 std::bad_alloc::bad_alloc 77427->77428 77429 1984bff709f 77428->77429 77430 1984bffa110 std::bad_alloc::bad_alloc 77429->77430 77431 1984bff70d2 77430->77431 77432 1984bffa110 std::bad_alloc::bad_alloc 77431->77432 77433 1984bff7105 77432->77433 77434 1984bffa110 std::bad_alloc::bad_alloc 77433->77434 77435 1984bff7138 77434->77435 77436 1984bffa110 std::bad_alloc::bad_alloc 77435->77436 77437 1984bff716b 77436->77437 77438 1984bffa110 std::bad_alloc::bad_alloc 77437->77438 77439 1984bff719e 77438->77439 77440 1984bffa110 std::bad_alloc::bad_alloc 77439->77440 77441 1984bff71d1 77440->77441 77442 1984bffa110 std::bad_alloc::bad_alloc 77441->77442 77443 1984bff7204 77442->77443 77444 1984bffa110 std::bad_alloc::bad_alloc 77443->77444 77445 1984bff7237 77444->77445 77446 1984bffa110 std::bad_alloc::bad_alloc 77445->77446 77447 1984bff726a 77446->77447 77448 1984bffa110 std::bad_alloc::bad_alloc 77447->77448 77449 1984bff729d 77448->77449 77450 1984bffa110 std::bad_alloc::bad_alloc 77449->77450 77451 1984bff72d0 77450->77451 77452 1984bffa110 std::bad_alloc::bad_alloc 77451->77452 77453 1984bff7303 77452->77453 77454 1984bffa110 std::bad_alloc::bad_alloc 77453->77454 77455 1984bff7336 77454->77455 77456 1984bffa110 std::bad_alloc::bad_alloc 77455->77456 77457 1984bff7369 77456->77457 77458 1984bffa110 std::bad_alloc::bad_alloc 77457->77458 77459 1984bff739c 77458->77459 77460 1984bffa110 std::bad_alloc::bad_alloc 77459->77460 77461 1984bff73cf 77460->77461 77462 1984bffa110 std::bad_alloc::bad_alloc 77461->77462 77463 1984bff7402 77462->77463 77464 1984bffa110 std::bad_alloc::bad_alloc 77463->77464 77465 1984bff7435 77464->77465 77466 1984bffa110 std::bad_alloc::bad_alloc 77465->77466 77467 1984bff7468 77466->77467 77468 1984bffa110 std::bad_alloc::bad_alloc 77467->77468 77469 1984bff749b 77468->77469 77470 1984bffa110 std::bad_alloc::bad_alloc 77469->77470 77471 1984bff74ce 77470->77471 77472 1984bffa110 std::bad_alloc::bad_alloc 77471->77472 77473 1984bff7501 77472->77473 77474 1984bffa110 std::bad_alloc::bad_alloc 77473->77474 77475 1984bff7534 std::_Fac_node::_Fac_node 77474->77475 77492 1984bff9e90 77475->77492 77477 1984bff759d 77478 1984bff75bc CreateToolhelp32Snapshot 77477->77478 77479 1984bff7633 Process32FirstW 77478->77479 77483 1984bff75d7 77478->77483 77480 1984bff77b9 77479->77480 77486 1984bff7659 77479->77486 77482 1984bffa110 std::bad_alloc::bad_alloc 77480->77482 77481 1984bff5360 std::bad_alloc::bad_alloc 77481->77486 77491 1984bff761b 77482->77491 77484 1984bffa110 std::bad_alloc::bad_alloc 77483->77484 77484->77491 77485 1984bff779d Process32NextW 77485->77480 77485->77486 77486->77481 77486->77485 77487 1984bff7708 77486->77487 77488 1984bffa170 std::bad_alloc::bad_alloc 77487->77488 77489 1984bff7759 77488->77489 77496 1984bff6f30 std::bad_alloc::bad_alloc allocator 77489->77496 77493 1984bff9ec1 Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores std::error_category::equivalent Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock 77492->77493 77497 1984bffa960 77493->77497 77495 1984bff9f09 77495->77477 77496->77491 77498 1984bffa982 Concurrency::details::WorkQueue::IsStructuredEmpty 77497->77498 77500 1984bffa9f5 type_info::_name_internal_method 77498->77500 77503 1984bffb090 std::bad_alloc::bad_alloc 77498->77503 77500->77495 77501 1984bffa9c9 77504 1984bffb350 std::bad_alloc::bad_alloc Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores 77501->77504 77503->77501 77504->77500 77505 1984bff3560 77508 1984c110380 77505->77508 77507 1984bff3577 std::make_error_code 77509 1984c1103b3 77508->77509 77510 1984c1103bb 77509->77510 77511 1984c1104bf 77509->77511 77513 1984bffa110 std::bad_alloc::bad_alloc 77510->77513 77512 1984bffa110 std::bad_alloc::bad_alloc 77511->77512 77516 1984c11048e allocator 77512->77516 77514 1984c110422 77513->77514 77514->77516 77517 1984c026990 std::bad_alloc::bad_alloc Concurrency::task_continuation_context::task_continuation_context 77514->77517 77516->77507 77517->77516 76434 1984c0e0ebc 76436 1984c0e0ec1 76434->76436 76435 1984c1da584 76436->76435 76437 1984c1da5c6 VirtualAlloc 76436->76437 76438 1984c1da5e7 76437->76438 76438->76435 76440 1984c1da382 76438->76440 76442 1984c1da395 76440->76442 76441 1984c1da3e9 76441->76435 76442->76441 76443 1984c1da428 VirtualProtect 76442->76443 76443->76441 76444 7ff63420c1b0 76445 7ff63420c1c4 76444->76445 76446 7ff63420c2fc 76445->76446 76447 7ff63420c1cc 76445->76447 76494 7ff63420c628 9 API calls 76446->76494 76449 7ff63420c306 76447->76449 76457 7ff63420c1ea _RTC_Initialize __scrt_release_startup_lock 76447->76457 76495 7ff63420c628 9 API calls 76449->76495 76451 7ff63420c20f 76452 7ff63420c311 76496 7ff63420c8b8 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 76452->76496 76454 7ff63420c32d __scrt_common_main_seh 76456 7ff63420c29a 76464 7ff634206c10 76456->76464 76457->76451 76463 7ff63420c770 00007FFDA46F19C0 GetStartupInfoW 76457->76463 76461 7ff63420c2bd 76461->76452 76462 7ff63420c2c1 76461->76462 76462->76451 76463->76456 76467 7ff634206c3f 76464->76467 76466 7ff634206d55 76501 7ff6342041e0 7 API calls 76466->76501 76497 7ff6342081c0 76467->76497 76469 7ff634206d82 76470 7ff6342081c0 00007FFDB222F020 76469->76470 76471 7ff634206d8f 76470->76471 76472 7ff6342081c0 00007FFDB222F020 76471->76472 76473 7ff634206d9d 76472->76473 76502 7ff634204370 00007FFD940B5F50 76473->76502 76477 7ff634206da8 76509 7ff634205ce0 GetModuleFileNameA 76477->76509 76479 7ff634206ec4 76709 7ff634204520 90 API calls 76479->76709 76482 7ff634206ec9 76710 7ff634204340 DestroyWindow UnregisterClassA 76482->76710 76486 7ff634206ed3 76493 7ff63420c7b8 GetModuleHandleW 76486->76493 76489 7ff634206dad 76489->76479 76490 7ff634206e58 MessageBoxA 76489->76490 76492 7ff6342081c0 00007FFDB222F020 76489->76492 76593 7ff634204540 76489->76593 76602 7ff634204720 76489->76602 76693 7ff6342045d0 76489->76693 76700 7ff6342089b0 76489->76700 76704 7ff634208d40 76489->76704 76491 7ff6342081c0 00007FFDB222F020 76490->76491 76491->76489 76492->76489 76493->76461 76494->76449 76495->76452 76496->76454 76499 7ff6342081e0 Concurrency::details::ResourceManager::CreateNodeTopology 76497->76499 76498 7ff634208291 76498->76466 76499->76498 76711 7ff63420bd38 76499->76711 76501->76469 76503 7ff634204392 76502->76503 76504 7ff6342044a0 76503->76504 76714 7ff6341c7c60 00007FFDB2245630 76504->76714 76506 7ff6342044dc 76717 7ff6341b5be0 76506->76717 76508 7ff6342044e3 76508->76477 76511 7ff634205d31 76509->76511 76510 7ff6342081c0 00007FFDB222F020 76526 7ff634205e4a 76510->76526 76511->76510 76512 7ff6342060a8 76514 7ff6342060c6 76512->76514 76515 7ff6342081c0 00007FFDB222F020 76512->76515 76513 7ff6342081c0 00007FFDB222F020 76513->76512 76516 7ff6342060e4 76514->76516 76518 7ff6342081c0 00007FFDB222F020 76514->76518 76515->76514 76517 7ff634206102 76516->76517 76519 7ff6342081c0 00007FFDB222F020 76516->76519 76520 7ff6342065d6 76517->76520 76538 7ff634206110 76517->76538 76518->76516 76519->76517 76521 7ff634206821 76520->76521 76522 7ff63420661a 76520->76522 76527 7ff634207cd0 00007FFDB222F020 76521->76527 76743 7ff634207b80 00007FFDB222F020 76522->76743 76524 7ff63420662e 76744 7ff634207b80 00007FFDB222F020 76524->76744 76525 7ff6342081c0 00007FFDB222F020 76529 7ff634205fff 76525->76529 76526->76525 76526->76529 76530 7ff6342068a4 76527->76530 76529->76512 76529->76513 76531 7ff6342081c0 00007FFDB222F020 76530->76531 76534 7ff6342068b1 76531->76534 76532 7ff6342081c0 00007FFDB222F020 76535 7ff634206254 76532->76535 76533 7ff634206964 76746 7ff634207b80 00007FFDB222F020 76533->76746 76534->76533 76543 7ff634207cd0 00007FFDB222F020 76534->76543 76739 7ff634207cd0 76535->76739 76538->76532 76539 7ff634206289 76541 7ff6342081c0 00007FFDB222F020 76539->76541 76540 7ff634206979 76747 7ff634207b80 00007FFDB222F020 76540->76747 76544 7ff634206296 76541->76544 76545 7ff634206957 76543->76545 76546 7ff6342081c0 00007FFDB222F020 76544->76546 76547 7ff6342081c0 00007FFDB222F020 76545->76547 76569 7ff6342062a4 76546->76569 76547->76533 76548 7ff6342081c0 00007FFDB222F020 76550 7ff634206788 76548->76550 76549 7ff634206642 76549->76548 76745 7ff634209020 00007FFDB222F020 76550->76745 76552 7ff6342067d6 76553 7ff634207cd0 00007FFDB222F020 76552->76553 76554 7ff6342067f2 76553->76554 76555 7ff6342081c0 00007FFDB222F020 76554->76555 76556 7ff6342067ff 76555->76556 76557 7ff6342081c0 00007FFDB222F020 76556->76557 76559 7ff63420680d 76557->76559 76558 7ff6342081c0 00007FFDB222F020 76560 7ff634206ad3 76558->76560 76561 7ff6342081c0 00007FFDB222F020 76559->76561 76748 7ff634209020 00007FFDB222F020 76560->76748 76562 7ff63420681b 76561->76562 76570 7ff6342081c0 00007FFDB222F020 76562->76570 76563 7ff63420698d 76563->76558 76564 7ff6342081c0 00007FFDB222F020 76567 7ff6342063ea 76564->76567 76566 7ff634206b21 76568 7ff634207cd0 00007FFDB222F020 76566->76568 76571 7ff634207cd0 00007FFDB222F020 76567->76571 76573 7ff634206b3d 76568->76573 76569->76564 76574 7ff6342065d0 GetCurrentDirectoryA 76570->76574 76572 7ff63420641f 76571->76572 76575 7ff6342081c0 00007FFDB222F020 76572->76575 76576 7ff6342081c0 00007FFDB222F020 76573->76576 76584 7ff634206b98 76574->76584 76578 7ff63420642c 76575->76578 76579 7ff634206b4a 76576->76579 76580 7ff6342081c0 00007FFDB222F020 76578->76580 76581 7ff6342081c0 00007FFDB222F020 76579->76581 76587 7ff63420643a 76580->76587 76582 7ff634206b58 76581->76582 76583 7ff6342081c0 00007FFDB222F020 76582->76583 76583->76562 76584->76489 76584->76584 76585 7ff6342081c0 00007FFDB222F020 76586 7ff634206580 76585->76586 76588 7ff634207cd0 00007FFDB222F020 76586->76588 76587->76585 76589 7ff6342065b5 76588->76589 76590 7ff6342081c0 00007FFDB222F020 76589->76590 76591 7ff6342065c2 76590->76591 76592 7ff6342081c0 00007FFDB222F020 76591->76592 76592->76574 76594 7ff634204544 PeekMessageA 76593->76594 76595 7ff634204563 TranslateMessage DispatchMessageA 76594->76595 76597 7ff6342045ad 76594->76597 76596 7ff6342045ab 76595->76596 76601 7ff634204581 76595->76601 76596->76594 76749 7ff634200330 76597->76749 76601->76489 76603 7ff634204758 76602->76603 76606 7ff634204a24 76603->76606 76864 7ff634203ad0 76603->76864 76608 7ff634205387 76606->76608 76611 7ff634204a64 76606->76611 76609 7ff6342089b0 00007FFDB222F020 76608->76609 76610 7ff6342053d9 76609->76610 76612 7ff6342081c0 00007FFDB222F020 76610->76612 76613 7ff634204acb SHBrowseForFolder 76611->76613 76616 7ff634204c18 76611->76616 76621 7ff6342053e7 76612->76621 76614 7ff634204b2d SHGetPathFromIDList 76613->76614 76613->76616 76615 7ff634204c09 CoTaskMemFree 76614->76615 76620 7ff634204b4b 76614->76620 76615->76616 76617 7ff6342089b0 00007FFDB222F020 76616->76617 76618 7ff634204c6a 76617->76618 76619 7ff6342081c0 00007FFDB222F020 76618->76619 76623 7ff634204c78 76619->76623 76620->76615 76985 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76621->76985 76952 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76623->76952 76625 7ff63420550c 76986 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76625->76986 76627 7ff634204dc3 76953 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76627->76953 76629 7ff6342055de 76987 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76629->76987 76631 7ff634204ea8 76954 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76631->76954 76633 7ff6342056b0 76988 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76633->76988 76635 7ff634204f7a 76955 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76635->76955 76637 7ff634205782 76989 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76637->76989 76639 7ff634205859 76990 7ff6341ef580 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 __swprintf_l 76639->76990 76641 7ff63420504c 76956 7ff6341e02a0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 76641->76956 76642 7ff634205891 76991 7ff6341c92e0 00007FFDB222F020 76642->76991 76645 7ff6342058ab 76992 7ff6341f1520 9 API calls 76645->76992 76646 7ff634205123 76957 7ff6341c92e0 00007FFDB222F020 76646->76957 76648 7ff6342058d7 76993 7ff6341c9390 25 API calls 76648->76993 76651 7ff63420515c 76958 7ff6341ef580 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 __swprintf_l 76651->76958 76653 7ff634205168 76959 7ff6341c9390 25 API calls 76653->76959 76655 7ff6342058dd 76662 7ff6342059be 76655->76662 76994 7ff6341b39b0 00007FFDB222F020 76655->76994 76656 7ff63420516d 76960 7ff6341c92e0 00007FFDB222F020 76656->76960 76659 7ff6342051a6 76961 7ff6341f32d0 27 API calls 76659->76961 76661 7ff634205936 76995 7ff6341b39b0 00007FFDB222F020 76661->76995 76663 7ff634205a3c 76662->76663 76664 7ff634205a33 ExitProcess 76662->76664 76665 7ff634205a6b 76663->76665 76997 7ff6341b3a20 25 API calls 76663->76997 76664->76663 76668 7ff6342081c0 00007FFDB222F020 76665->76668 76666 7ff6342051d7 76962 7ff6341c9390 25 API calls 76666->76962 76672 7ff634205381 76668->76672 76671 7ff634205a57 76998 7ff6341b3a20 25 API calls 76671->76998 76969 7ff6341c2ba0 76672->76969 76674 7ff634205a61 76999 7ff6341b3a20 25 API calls 76674->76999 76676 7ff63420597a 76996 7ff6341b39b0 00007FFDB222F020 76676->76996 76678 7ff634205a7f 76678->76489 76679 7ff6342051dc 76963 7ff6341c92e0 00007FFDB222F020 76679->76963 76682 7ff634205215 76964 7ff6341c9390 25 API calls 76682->76964 76684 7ff63420521a 76685 7ff634205325 76684->76685 76686 7ff634205282 RemoveDirectoryA CreateDirectoryA 76684->76686 76687 7ff6342081c0 00007FFDB222F020 76685->76687 76688 7ff6342052a3 MessageBoxA 76686->76688 76689 7ff6342052ca 76686->76689 76687->76672 76688->76685 76965 7ff63420c064 76689->76965 77086 7ff6341bbc50 76693->77086 76697 7ff634204712 76697->76489 76698 7ff634204697 76698->76697 77138 7ff634203f20 76698->77138 76701 7ff6342089e1 76700->76701 76701->76701 77187 7ff63420a530 76701->77187 76703 7ff634208a24 76703->76489 77192 7ff634208d70 76704->77192 76706 7ff634208d58 77195 7ff63420a800 76706->77195 76709->76482 76710->76486 76712 7ff63420c338 00007FFDB222F020 76711->76712 76715 7ff6341c7c98 00007FFDB2245630 76714->76715 76716 7ff6341c7cad 76714->76716 76715->76716 76716->76506 76718 7ff6341b5bfd 76717->76718 76719 7ff6341b5c91 76718->76719 76733 7ff6341b5d90 6 API calls 76718->76733 76723 7ff6341b6cb0 76719->76723 76722 7ff6341b5ca0 76722->76508 76724 7ff6341b6cda 76723->76724 76734 7ff6341d26b0 76724->76734 76726 7ff6341b6e3e 76727 7ff6341d26b0 00007FFDB222F020 76726->76727 76732 7ff6341b6f6c 76727->76732 76728 7ff6341b722d 76730 7ff6341b728a 76728->76730 76738 7ff6341d3900 00007FFDB222F020 76728->76738 76730->76722 76731 7ff6341b7224 00007FFDB222F020 76731->76728 76732->76728 76732->76731 76733->76719 76735 7ff6341d27ac 76734->76735 76737 7ff6341d26d2 76734->76737 76735->76726 76736 7ff6341d27a3 00007FFDB222F020 76736->76735 76737->76735 76737->76736 76738->76730 76740 7ff634207cfb 76739->76740 76742 7ff634207cf4 76739->76742 76741 7ff6342081c0 00007FFDB222F020 76740->76741 76741->76742 76742->76539 76743->76524 76744->76549 76745->76552 76746->76540 76747->76563 76748->76566 76753 7ff634200344 76749->76753 76750 7ff63420039b GetClientRect QueryPerformanceCounter 76751 7ff634200445 GetForegroundWindow 76750->76751 76752 7ff63420042b 76750->76752 76754 7ff6342004df 76751->76754 76755 7ff634200457 76751->76755 76752->76751 76753->76750 76757 7ff6342004f8 GetKeyState 76754->76757 76758 7ff634200526 76754->76758 76756 7ff634200460 ClientToScreen 76755->76756 76759 7ff634200495 76755->76759 76756->76759 76760 7ff634200487 SetCursorPos 76756->76760 76757->76758 76762 7ff63420050a 76757->76762 76763 7ff63420053f GetKeyState 76758->76763 76765 7ff63420056d 76758->76765 76759->76754 76761 7ff6342004a4 GetCursorPos 76759->76761 76760->76759 76761->76754 76766 7ff6342004b3 ScreenToClient 76761->76766 76762->76758 76835 7ff6341b1f90 00007FFDB222F020 76762->76835 76763->76765 76767 7ff634200551 76763->76767 76764 7ff6342005b4 76770 7ff6342005cd GetKeyState 76764->76770 76778 7ff6342005fb 76764->76778 76765->76764 76768 7ff634200586 GetKeyState 76765->76768 76766->76754 76769 7ff6342004c5 76766->76769 76767->76765 76836 7ff6341b1f90 00007FFDB222F020 76767->76836 76768->76764 76772 7ff634200598 76768->76772 76834 7ff6341b2260 00007FFDB222F020 76769->76834 76774 7ff6342005df 76770->76774 76770->76778 76772->76764 76837 7ff6341b1f90 00007FFDB222F020 76772->76837 76774->76778 76838 7ff6341b1f90 00007FFDB222F020 76774->76838 76777 7ff634200625 76784 7ff6341ffce0 76777->76784 76778->76777 76839 7ff6341ffb70 LoadCursorA SetCursor SetCursor 76778->76839 76783 7ff6341b9e10 47 API calls 76783->76601 76786 7ff6341ffd07 76784->76786 76785 7ff634200301 76785->76783 76786->76785 76788 7ff6341ffdd3 76786->76788 76840 7ff6341b1f90 00007FFDB222F020 76786->76840 76790 7ff6341ffe0a 76788->76790 76841 7ff6341b1f90 00007FFDB222F020 76788->76841 76792 7ff6341ffe41 76790->76792 76842 7ff6341b1f90 00007FFDB222F020 76790->76842 76793 7ff6341ffe79 76792->76793 76843 7ff6341b1f90 00007FFDB222F020 76792->76843 76796 7ff6341ffeae 76793->76796 76844 7ff6341b1f90 00007FFDB222F020 76793->76844 76797 7ff6341ffee6 76796->76797 76845 7ff6341b1f90 00007FFDB222F020 76796->76845 76800 7ff6341fff1c 76797->76800 76846 7ff6341b1f90 00007FFDB222F020 76797->76846 76801 7ff6341fff53 76800->76801 76847 7ff6341b1f90 00007FFDB222F020 76800->76847 76805 7ff6341fff86 76801->76805 76848 7ff6341b1f90 00007FFDB222F020 76801->76848 76804 7ff634200025 76852 7ff6341b1f90 00007FFDB222F020 76804->76852 76807 7ff6341fffbc 76805->76807 76849 7ff6341b1f90 00007FFDB222F020 76805->76849 76808 7ff6341ffff8 76807->76808 76850 7ff6341b1f90 00007FFDB222F020 76807->76850 76808->76804 76851 7ff6341b1f90 00007FFDB222F020 76808->76851 76812 7ff634200070 76853 7ff6341b1f90 00007FFDB222F020 76812->76853 76814 7ff63420010d 76856 7ff6341b1f90 00007FFDB222F020 76814->76856 76815 7ff6342000a9 76817 7ff6342000dd 76815->76817 76854 7ff6341b1f90 00007FFDB222F020 76815->76854 76817->76814 76855 7ff6341b1f90 00007FFDB222F020 76817->76855 76820 7ff634200151 76857 7ff6341b1f90 00007FFDB222F020 76820->76857 76822 7ff634200195 76858 7ff6341b1f90 00007FFDB222F020 76822->76858 76824 7ff6342001d0 76859 7ff6341b1f90 00007FFDB222F020 76824->76859 76826 7ff63420020b 76860 7ff6341b1f90 00007FFDB222F020 76826->76860 76828 7ff634200246 76861 7ff6341b1f90 00007FFDB222F020 76828->76861 76830 7ff634200281 76862 7ff6341b1f90 00007FFDB222F020 76830->76862 76832 7ff6342002c2 76863 7ff6341b1f90 00007FFDB222F020 76832->76863 76834->76754 76835->76758 76836->76765 76837->76764 76838->76778 76839->76777 76840->76788 76841->76790 76842->76792 76843->76793 76844->76796 76845->76797 76846->76800 76847->76801 76848->76805 76849->76807 76850->76808 76851->76804 76852->76812 76853->76815 76854->76817 76855->76814 76856->76820 76857->76822 76858->76824 76859->76826 76860->76828 76861->76830 76862->76832 76863->76785 77000 7ff634203c00 76864->77000 76866 7ff634203af7 76867 7ff634203aff CreateFileA 76866->76867 76868 7ff634203b63 76867->76868 76869 7ff634203b3c CloseHandle 76867->76869 77004 7ff634203d40 76868->77004 76870 7ff634203b52 76869->76870 76872 7ff634203bd7 76870->76872 76872->76606 76875 7ff6342026c0 76872->76875 76873 7ff634203ba8 76874 7ff634203bb0 RegOpenKeyExA 76873->76874 76874->76872 76876 7ff6342026e5 76875->76876 76877 7ff6342026de 76875->76877 77010 7ff6342032e0 76876->77010 76877->76606 76879 7ff6342027a4 77014 7ff6342031c0 76879->77014 76881 7ff6342027db 76882 7ff634202805 GetModuleHandleA 76881->76882 76883 7ff634202865 76882->76883 76884 7ff634202831 76882->76884 76887 7ff634202872 GetProcAddress 76883->76887 76885 7ff6342081c0 00007FFDB222F020 76884->76885 76886 7ff634202847 76885->76886 76889 7ff6342081c0 00007FFDB222F020 76886->76889 76888 7ff6342081c0 00007FFDB222F020 76887->76888 76890 7ff6342028b5 76888->76890 76893 7ff634202852 76889->76893 76891 7ff6342081c0 00007FFDB222F020 76890->76891 76892 7ff6342028c0 76891->76892 76892->76893 77018 7ff634202150 76893->77018 76896 7ff6342081c0 00007FFDB222F020 76897 7ff63420298a VirtualAlloc 76896->76897 76899 7ff634202b4c 76897->76899 76900 7ff634202b69 76897->76900 76901 7ff634208090 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFDB222F020 76899->76901 77032 7ff634203520 76900->77032 76901->76877 76903 7ff634202bc9 77036 7ff634203400 76903->77036 76905 7ff634202c03 76906 7ff634202c33 GetModuleHandleA 76905->76906 76907 7ff634202c5f 76906->76907 76908 7ff634202c99 76906->76908 76909 7ff6342081c0 00007FFDB222F020 76907->76909 76911 7ff634202ca9 GetProcAddress 76908->76911 76910 7ff634202c78 76909->76910 76912 7ff6342081c0 00007FFDB222F020 76910->76912 76913 7ff6342081c0 00007FFDB222F020 76911->76913 76914 7ff634202c86 76912->76914 76915 7ff634202cef 76913->76915 77040 7ff634203760 76914->77040 76916 7ff6342081c0 00007FFDB222F020 76915->76916 76917 7ff634202cfd 76916->76917 76917->76914 76919 7ff634202d6a 77044 7ff634203640 76919->77044 76921 7ff634202da4 76922 7ff634202dd4 GetModuleHandleA 76921->76922 76923 7ff634202e00 76922->76923 76924 7ff634202e3a 76922->76924 76925 7ff6342081c0 00007FFDB222F020 76923->76925 76927 7ff634202e4a GetProcAddress 76924->76927 76926 7ff634202e19 76925->76926 76928 7ff6342081c0 00007FFDB222F020 76926->76928 76929 7ff6342081c0 00007FFDB222F020 76927->76929 76933 7ff634202e27 76928->76933 76930 7ff634202e90 76929->76930 76931 7ff6342081c0 00007FFDB222F020 76930->76931 76932 7ff634202e9e 76931->76932 76932->76933 77048 7ff6342039b0 76933->77048 76935 7ff634203014 77052 7ff634203890 76935->77052 76937 7ff63420304e 76938 7ff63420307e GetModuleHandleA 76937->76938 76939 7ff6342030e4 76938->76939 76940 7ff6342030aa 76938->76940 76943 7ff6342030f4 GetProcAddress 76939->76943 76941 7ff6342081c0 00007FFDB222F020 76940->76941 76942 7ff6342030c3 76941->76942 76944 7ff6342081c0 00007FFDB222F020 76942->76944 76945 7ff6342081c0 00007FFDB222F020 76943->76945 76946 7ff6342030d1 76944->76946 76947 7ff63420313a 76945->76947 76948 7ff634203159 CreateThread 76946->76948 76949 7ff6342081c0 00007FFDB222F020 76947->76949 77056 7ff634208090 76948->77056 76951 7ff634203148 76949->76951 76951->76948 76952->76627 76953->76631 76954->76635 76955->76641 76956->76646 76957->76651 76958->76653 76959->76656 76960->76659 76961->76666 76962->76679 76963->76682 76964->76684 76966 7ff63420c06f Concurrency::cancel_current_task 76965->76966 76967 7ff6342052db 76966->76967 76968 7ff63420bd38 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFDB222F020 76966->76968 76967->76685 76984 7ff63420a630 00007FFDB222F020 76967->76984 76968->76967 76970 7ff6341c2bc3 76969->76970 76974 7ff6341c2c12 76969->76974 76971 7ff6341c2bcc 76970->76971 76970->76974 77080 7ff6341c85b0 25 API calls 76971->77080 76973 7ff6341c2c6a 76975 7ff6341c2ca0 76973->76975 77082 7ff6341ee910 25 API calls 76973->77082 76974->76973 77081 7ff6341c85b0 25 API calls 76974->77081 77083 7ff6341c4290 25 API calls 76975->77083 76979 7ff6341c2bd8 76979->76678 76980 7ff6341c2cb3 76982 7ff6341c2d12 76980->76982 77084 7ff6341d0d50 00007FFDB222F020 76980->77084 76982->76979 77085 7ff6341c80d0 25 API calls 76982->77085 76984->76685 76985->76625 76986->76629 76987->76633 76988->76637 76989->76639 76990->76642 76991->76645 76992->76648 76993->76655 76994->76661 76995->76676 76996->76662 76997->76671 76998->76674 76999->76665 77001 7ff634203c98 77000->77001 77003 7ff634203ca4 77000->77003 77008 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77001->77008 77003->76866 77005 7ff634203e2d 77004->77005 77007 7ff634203e39 77004->77007 77009 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77005->77009 77007->76873 77011 7ff63420335f 77010->77011 77013 7ff63420336b 77010->77013 77060 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77011->77060 77013->76879 77015 7ff63420323f 77014->77015 77017 7ff63420324b 77014->77017 77061 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77015->77061 77017->76881 77021 7ff6342021bb Concurrency::details::ResourceManager::CreateNodeTopology 77018->77021 77019 7ff6342081c0 00007FFDB222F020 77020 7ff6342022d7 77019->77020 77022 7ff634207cd0 00007FFDB222F020 77020->77022 77021->77019 77023 7ff63420230c 77022->77023 77024 7ff6342081c0 00007FFDB222F020 77023->77024 77030 7ff634202319 77024->77030 77025 7ff634202674 77026 7ff634208090 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFDB222F020 77025->77026 77028 7ff6342026a1 77026->77028 77027 7ff63420252c 77027->77025 77029 7ff6342091b0 00007FFDB222F020 77027->77029 77028->76896 77029->77027 77030->77027 77062 7ff6342091b0 77030->77062 77033 7ff63420359f 77032->77033 77035 7ff6342035ab 77032->77035 77074 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77033->77074 77035->76903 77037 7ff63420347f 77036->77037 77039 7ff63420348b 77036->77039 77075 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77037->77075 77039->76905 77041 7ff6342037e9 77040->77041 77043 7ff6342037f5 77040->77043 77076 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77041->77076 77043->76919 77045 7ff6342036bf 77044->77045 77047 7ff6342036cb 77044->77047 77077 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77045->77077 77047->76921 77049 7ff634203a2f 77048->77049 77051 7ff634203a3b 77048->77051 77078 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77049->77078 77051->76935 77053 7ff63420390f 77052->77053 77055 7ff63420391b 77052->77055 77079 7ff63420bdac RtlAcquireSRWLockExclusive SleepConditionVariableSRW RtlReleaseSRWLockExclusive 77053->77079 77055->76937 77057 7ff6342080fa Concurrency::details::ResourceManager::CreateNodeTopology 77056->77057 77058 7ff63420bd38 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFDB222F020 77057->77058 77059 7ff63420818a 77057->77059 77058->77059 77059->76877 77063 7ff634209207 77062->77063 77064 7ff6342091e9 77062->77064 77066 7ff63420a9e0 77063->77066 77064->77030 77067 7ff63420aaeb 77066->77067 77070 7ff63420b0d0 77067->77070 77071 7ff63420b149 Concurrency::details::ResourceManager::CreateNodeTopology 77070->77071 77072 7ff63420ace3 77071->77072 77073 7ff63420bd38 Concurrency::details::ResourceManager::CreateNodeTopology 00007FFDB222F020 77071->77073 77072->77064 77073->77072 77080->76979 77081->76973 77082->76975 77083->76980 77084->76982 77085->76979 77092 7ff6341bbc62 77086->77092 77087 7ff6341bbdb5 77093 7ff6341bbdc8 77087->77093 77143 7ff6341c80d0 25 API calls 77087->77143 77089 7ff6341c85b0 25 API calls 77089->77092 77091 7ff6341c2ba0 25 API calls 77091->77092 77092->77087 77092->77089 77092->77091 77092->77093 77115 7ff6341bc1ec 77092->77115 77142 7ff6341bcd70 25 API calls 77092->77142 77144 7ff6341c87d0 28 API calls 77093->77144 77095 7ff6341c2ba0 25 API calls 77097 7ff6341bbf96 77095->77097 77096 7ff6341bbecf 77099 7ff6341bbf2e 77096->77099 77145 7ff6341d1f40 00007FFDB222F020 00007FFDB222F020 printf 77096->77145 77103 7ff6341bbfae 77097->77103 77146 7ff6341d0500 25 API calls 77097->77146 77099->77095 77101 7ff6341bc076 77149 7ff6341b94d0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 77101->77149 77103->77101 77110 7ff6341bc041 77103->77110 77147 7ff6341d08d0 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 77103->77147 77104 7ff6341bc095 77105 7ff6341bc0bc 77104->77105 77150 7ff6341d3400 00007FFDB222F020 77104->77150 77151 7ff6341d3400 00007FFDB222F020 77105->77151 77109 7ff6341bc11a 77109->77115 77153 7ff6341d39e0 00007FFDB222F020 77109->77153 77110->77101 77148 7ff6341ca780 25 API calls 77110->77148 77111 7ff6341bc0d5 77111->77109 77152 7ff6341bb200 00007FFDB22349A0 00007FFDB222F020 77111->77152 77115->76698 77116 7ff6341bc240 77115->77116 77117 7ff6341bc254 77116->77117 77118 7ff6341bbc50 30 API calls 77117->77118 77124 7ff6341bc283 77117->77124 77118->77124 77119 7ff6341bc6ba 77119->76698 77120 7ff6341bc414 77156 7ff6341bb850 6 API calls 77120->77156 77122 7ff6341d3400 00007FFDB222F020 77122->77124 77124->77119 77124->77120 77124->77122 77154 7ff6341b9280 7 API calls 77124->77154 77155 7ff6341e0e30 00007FFDB222F020 77124->77155 77126 7ff6341bc4fc 77137 7ff6341bc524 77126->77137 77160 7ff6341b57a0 7 API calls 77126->77160 77127 7ff6341bc4ac 77129 7ff6341bc4d4 77127->77129 77158 7ff6341bb310 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 77127->77158 77129->77126 77159 7ff6341bb310 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 77129->77159 77132 7ff6341bc419 77132->77127 77157 7ff6341bb310 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 77132->77157 77135 7ff6341d3400 00007FFDB222F020 77135->77137 77137->77119 77137->77135 77161 7ff6341b9280 7 API calls 77137->77161 77162 7ff6341e0e30 00007FFDB222F020 77137->77162 77139 7ff634203f29 77138->77139 77163 7ff6341ff630 77139->77163 77142->77092 77143->77093 77144->77096 77145->77099 77146->77103 77147->77110 77148->77101 77149->77104 77150->77105 77151->77111 77152->77111 77153->77115 77154->77124 77155->77124 77156->77132 77157->77132 77158->77129 77159->77126 77160->77137 77161->77137 77162->77137 77164 7ff6341ff640 77163->77164 77166 7ff6341ff657 77163->77166 77164->77166 77167 7ff6341ff2f0 77164->77167 77166->76697 77168 7ff6341ff313 77167->77168 77173 7ff6341e1770 77168->77173 77170 7ff6341ff36a 77171 7ff6341ff583 77170->77171 77172 7ff6341ff57a 00007FFDB222F020 77170->77172 77171->77166 77172->77171 77174 7ff6341e190a 77173->77174 77175 7ff6341e17a6 77173->77175 77174->77170 77175->77174 77177 7ff6341e21b0 77175->77177 77178 7ff6341e21e2 77177->77178 77182 7ff6341e1ec0 77178->77182 77185 7ff6341e1f23 77182->77185 77184 7ff6341e2191 00007FFDB222F020 77184->77174 77186 7ff6341e1d00 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 00007FFDB222F020 77185->77186 77186->77184 77188 7ff63420a5e8 77187->77188 77189 7ff63420a56a 77187->77189 77191 7ff63420ad00 00007FFDB222F020 Concurrency::details::ResourceManager::CreateNodeTopology 77188->77191 77189->76703 77191->77189 77199 7ff634201ab0 77192->77199 77194 7ff634208d94 77194->76706 77196 7ff63420a80c 77195->77196 77197 7ff634201ab0 00007FFDA34336D0 77196->77197 77198 7ff634208d60 77196->77198 77197->77196 77198->76489 77203 7ff63420e188 77199->77203 77201 7ff634201ac3 00007FFDA34336D0 77202 7ff634201ad8 _Subatomic 77201->77202 77202->77194 77204 7ff63420e197 77203->77204

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff634204720-7ff6342049ff call 7ff634201840 call 7ff6341d4a60 call 7ff6341b3880 call 7ff634201840 call 7ff6341d4a60 call 7ff6341b3880 call 7ff634201840 call 7ff6341d4a60 call 7ff6341b3880 call 7ff634201840 call 7ff6341d4a60 call 7ff6341b3880 call 7ff634201840 call 7ff6341d4a60 call 7ff6341b3880 call 7ff634201840 call 7ff6341d4a60 call 7ff6341b3880 call 7ff6341b1080 * 2 call 7ff6341c40a0 call 7ff6341b1080 call 7ff6341c4130 47 7ff634204a25-7ff634204a5e call 7ff634208780 call 7ff6341c0340 0->47 48 7ff634204a01-7ff634204a11 call 7ff634203ad0 0->48 58 7ff634204a64-7ff634204ac5 call 7ff6341b1080 call 7ff6341c9240 call 7ff6341b1080 call 7ff6341f04f0 47->58 59 7ff634205387-7ff6342058ed call 7ff6341c41b0 call 7ff634207ee0 call 7ff6342089b0 call 7ff6342081c0 call 7ff6342079b0 call 7ff6341bc720 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6341b1080 call 7ff6341c9240 call 7ff6341ef580 call 7ff6341c92a0 call 7ff6341c92e0 call 7ff6341b1080 call 7ff6341f1520 call 7ff6341c9390 47->59 48->47 53 7ff634204a13-7ff634204a1f call 7ff6342026c0 48->53 57 7ff634204a24 53->57 57->47 77 7ff634204acb-7ff634204b27 SHBrowseForFolder 58->77 78 7ff634204c18-7ff63420527c call 7ff6341c41b0 call 7ff634207ee0 call 7ff6342089b0 call 7ff6342081c0 call 7ff634208780 call 7ff6341bc720 call 7ff634208780 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff634208780 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6342079b0 call 7ff6341d4a30 call 7ff6341d4a50 call 7ff6341b1080 call 7ff6341c41e0 call 7ff6341e02a0 call 7ff6341b1080 call 7ff6341c9240 call 7ff6341c92e0 call 7ff6341ef580 call 7ff6341c9390 call 7ff6341b1080 call 7ff6341c9240 call 7ff6341c92e0 call 7ff6341f32d0 call 7ff6341c9390 call 7ff6341b1080 call 7ff6341c9240 call 7ff6341c92e0 call 7ff6341c9390 call 7ff6341b1080 call 7ff6341c9240 call 7ff6341b1080 call 7ff6341f04f0 58->78 248 7ff6342058f3-7ff6342059be call 7ff634201840 call 7ff6341d4a60 call 7ff6341b39b0 call 7ff634201840 call 7ff6341d4a60 call 7ff6341b39b0 call 7ff634201840 call 7ff6341d4a60 call 7ff6341b39b0 59->248 249 7ff6342059bf-7ff634205a20 call 7ff6341b1080 call 7ff6341c9240 call 7ff6341b1080 call 7ff6341f04f0 59->249 77->78 81 7ff634204b2d-7ff634204b45 SHGetPathFromIDList 77->81 320 7ff634205374-7ff634205382 call 7ff6342081c0 78->320 321 7ff634205282-7ff6342052a1 RemoveDirectoryA CreateDirectoryA 78->321 84 7ff634204b4b-7ff634204b86 81->84 85 7ff634204c09-7ff634204c17 CoTaskMemFree 81->85 88 7ff634204b8b-7ff634204b98 84->88 85->78 88->88 91 7ff634204b9a-7ff634204bde call 7ff634208780 88->91 100 7ff634204be3-7ff634204bf0 91->100 100->100 103 7ff634204bf2-7ff634204bf7 100->103 106 7ff634204bf9-7ff634204c07 103->106 106->85 106->106 248->249 276 7ff634205a22-7ff634205a31 249->276 277 7ff634205a3c-7ff634205a4b 249->277 276->277 278 7ff634205a33-7ff634205a3b ExitProcess 276->278 279 7ff634205a4d-7ff634205a6b call 7ff6341b3a20 * 3 277->279 280 7ff634205a6c-7ff634205a79 call 7ff6342081c0 277->280 278->277 279->280 293 7ff634205a7a-7ff634205a89 call 7ff6341c2ba0 280->293 320->293 323 7ff6342052a3-7ff6342052c5 MessageBoxA 321->323 324 7ff6342052ca-7ff6342052d6 call 7ff63420c064 321->324 323->320 327 7ff6342052db-7ff6342052ec 324->327 328 7ff6342052ee-7ff634205346 call 7ff63420a630 327->328 329 7ff634205348 327->329 331 7ff634205354-7ff63420536c 328->331 329->331 331->320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$BrowseCloseExitFileFolderFreeFromHandleListMessagePathProcessRemoveTask
                                                      • String ID: Loader$...$C:\Users\user\Desktop\solara-executor$Fail$Failed to create setup directory$Install$P$Solara$choose install folder$continue$destinatinal folder$f$installation...$solara-executor
                                                      • API String ID: 380753353-2219470131
                                                      • Opcode ID: 8d7d44eaddbc20831c6762e85175d0632f03872633d4611175878a45b0127301
                                                      • Instruction ID: e56570930b2b94378d369c7c8dd2997253375cdd7816b54ffae65da06993dfab
                                                      • Opcode Fuzzy Hash: 8d7d44eaddbc20831c6762e85175d0632f03872633d4611175878a45b0127301
                                                      • Instruction Fuzzy Hash: 3BA21E3191DA8685E660DB22E5D13BAF360FF89340F404635EA8DE77A6DF3DE144AB40

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: AddressPerformanceProcQuery$CounterFrequencyInfoKeyboardLayoutLibraryLoadLocale
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$XInputGetCapabilities$XInputGetState$i >= 0 && i < Size$imgui_impl_win32$io.BackendPlatformUserData == nullptr && "Already initialized a platform backend!"$xinput1_1.dll$xinput1_2.dll$xinput1_3.dll$xinput1_4.dll$xinput9_1_0.dll
                                                      • API String ID: 2839060773-805143068
                                                      • Opcode ID: b7794f76b813ba0ffa93ba3e4a0341deb698b7340ee9810f303d84f49f8841cb
                                                      • Instruction ID: d3a78e764d841ced8169ab6c8f821934463dba856a0fed8547ff446ef1d8ed65
                                                      • Opcode Fuzzy Hash: b7794f76b813ba0ffa93ba3e4a0341deb698b7340ee9810f303d84f49f8841cb
                                                      • Instruction Fuzzy Hash: CD716D32A19F86C6E7148F15FA902A9B3A5FB48784F444236CA8DD3B64EF7DE095D700

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 362 7ff634200330-7ff634200342 363 7ff634200344-7ff63420034e 362->363 364 7ff634200352 362->364 365 7ff634200375-7ff634200378 363->365 366 7ff634200350 363->366 367 7ff634200354-7ff63420036e call 7ff63420e460 364->367 368 7ff63420039b-7ff634200429 GetClientRect QueryPerformanceCounter 365->368 369 7ff63420037a-7ff634200394 call 7ff63420e460 365->369 366->367 367->365 372 7ff634200445-7ff634200451 GetForegroundWindow 368->372 373 7ff63420042b-7ff63420043f call 7ff63420e460 368->373 369->368 377 7ff6342004df-7ff6342004ed 372->377 378 7ff634200457-7ff63420045e 372->378 373->372 379 7ff6342004ef-7ff6342004f6 377->379 380 7ff634200526-7ff634200534 377->380 381 7ff634200460-7ff634200485 ClientToScreen 378->381 382 7ff63420049e-7ff6342004a2 378->382 379->380 383 7ff6342004f8-7ff634200508 GetKeyState 379->383 384 7ff63420056d-7ff63420057b 380->384 385 7ff634200536-7ff63420053d 380->385 386 7ff634200495-7ff63420049c 381->386 387 7ff634200487-7ff63420048f SetCursorPos 381->387 382->377 388 7ff6342004a4-7ff6342004b1 GetCursorPos 382->388 383->380 389 7ff63420050a-7ff634200511 383->389 391 7ff6342005b4-7ff6342005c2 384->391 392 7ff63420057d-7ff634200584 384->392 385->384 390 7ff63420053f-7ff63420054f GetKeyState 385->390 386->377 386->382 387->386 388->377 393 7ff6342004b3-7ff6342004c3 ScreenToClient 388->393 389->380 396 7ff634200513-7ff634200521 call 7ff6341b1f90 389->396 390->384 397 7ff634200551-7ff634200558 390->397 394 7ff6342005c4-7ff6342005cb 391->394 395 7ff6342005fb-7ff6342005ff 391->395 392->391 398 7ff634200586-7ff634200596 GetKeyState 392->398 393->377 399 7ff6342004c5-7ff6342004da call 7ff6341b2260 393->399 394->395 400 7ff6342005cd-7ff6342005dd GetKeyState 394->400 402 7ff634200601-7ff634200606 395->402 403 7ff634200608-7ff63420060f 395->403 396->380 397->384 404 7ff63420055a-7ff634200568 call 7ff6341b1f90 397->404 398->391 405 7ff634200598-7ff63420059f 398->405 399->377 400->395 408 7ff6342005df-7ff6342005e6 400->408 409 7ff634200615-7ff634200618 402->409 403->409 404->384 405->391 407 7ff6342005a1-7ff6342005af call 7ff6341b1f90 405->407 407->391 408->395 412 7ff6342005e8-7ff6342005f6 call 7ff6341b1f90 408->412 413 7ff634200625-7ff634200628 call 7ff6341ffce0 409->413 414 7ff63420061a-7ff634200620 call 7ff6341ffb70 409->414 412->395 418 7ff63420062d-7ff634200634 413->418 414->413
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: State$Client$CursorScreen$CounterForegroundPerformanceQueryRectWindow
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "Context or backend not initialized? Did you call ImGui_ImplWin32_Init()?"$bd->hWnd != 0
                                                      • API String ID: 1576454153-990843061
                                                      • Opcode ID: b9b1333f0241c167bb0d36fc47031ea75db285839677a006f3658dc029a391cc
                                                      • Instruction ID: 4470b959499319dd7980e4091266cbfd99577bcc859d899a67daac52c4f2eaa5
                                                      • Opcode Fuzzy Hash: b9b1333f0241c167bb0d36fc47031ea75db285839677a006f3658dc029a391cc
                                                      • Instruction Fuzzy Hash: C091B122E0868686FB21CB25E694379E7E1FF86784F084131D94DE7796CF6DE484DB00

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: NtdllProc_Window
                                                      • String ID: E
                                                      • API String ID: 4255912815-3568589458
                                                      • Opcode ID: 60b10af7e7726b57b2a11d93ff49d429ce7ba957dc1b0bd3a5e91d316a4ed560
                                                      • Instruction ID: d469adc5bfedc44801262ae5c9e6e31f872813f1dc98603977ff90cfae4c0fb5
                                                      • Opcode Fuzzy Hash: 60b10af7e7726b57b2a11d93ff49d429ce7ba957dc1b0bd3a5e91d316a4ed560
                                                      • Instruction Fuzzy Hash: 70514F31A0C6968AE7648B14E59437AF2E1EB86791F104135EA8DD3B99DF3ED484EB00

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 669 1984c01f46a-1984c01f4a2 Concurrency::details::WorkQueue::IsStructuredEmpty FindFirstFileA 670 1984c01f4e9-1984c01f520 669->670 671 1984c01f4a4-1984c01f4df call 1984bff5180 call 1984bffa060 call 1984c001e90 call 1984bffa060 669->671 672 1984c01f55d-1984c01f5f5 call 1984c01fcb0 call 1984c021a30 call 1984bffa110 call 1984bffa170 call 1984c1075a0 670->672 673 1984c01f522-1984c01f559 call 1984bffa170 call 1984c01fe00 670->673 694 1984c01fbf5-1984c01fbfd 671->694 697 1984c01f5fb-1984c01f642 call 1984c01fd60 call 1984c0219a0 call 1984c001f30 672->697 698 1984c01f6c1-1984c01f6e3 call 1984c103860 672->698 673->672 715 1984c01f681-1984c01f6bc call 1984bff5180 call 1984bffa060 call 1984c001e90 call 1984bffa060 697->715 716 1984c01f644-1984c01f67d call 1984bffa170 call 1984c01fe00 697->716 706 1984c01fb69-1984c01fba4 call 1984bff5180 call 1984bffa060 call 1984c001e90 call 1984bffa060 698->706 707 1984c01f6e9-1984c01f76e call 1984c01d260 call 1984c1036d0 call 1984bffa170 call 1984c0ba1e0 698->707 706->694 735 1984c01f773-1984c01f7aa call 1984bffc590 call 1984bffa060 call 1984bffc9c0 707->735 715->694 716->715 747 1984c01fa0f-1984c01fb63 call 1984c1036d0 call 1984bffc590 call 1984bffa060 call 1984c1036d0 call 1984bffc590 call 1984bffa060 call 1984c1036d0 call 1984bffc590 call 1984bffa060 call 1984c1036d0 call 1984bffc590 call 1984bffa060 call 1984c1036d0 call 1984bffc590 call 1984bffa060 call 1984c0228c0 call 1984bffd2a0 735->747 748 1984c01f7b0-1984c01f863 call 1984c1036d0 call 1984bffa170 call 1984c0bacc0 call 1984bffc590 call 1984bffa060 call 1984bffc9c0 735->748 747->706 748->747 774 1984c01f869-1984c01f86e 748->774 776 1984c01f9fc-1984c01fa09 call 1984bffd2a0 774->776 777 1984c01f874-1984c01f903 call 1984bffa170 call 1984c0bfff0 * 3 call 1984c037950 774->777 776->747 801 1984c01f925-1984c01f9f7 call 1984bffa170 call 1984c01e2c0 call 1984c001e50 call 1984bff5180 call 1984c001e90 call 1984bffa060 call 1984bffd2a0 call 1984bffa060 call 1984c001e90 call 1984bffa060 777->801 802 1984c01f905-1984c01f920 call 1984bffa060 call 1984bffd2a0 777->802 801->694
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C01F47B
                                                      • FindFirstFileA.KERNEL32 ref: 000001984C01F48B
                                                        • Part of subcall function 000001984BFF5180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF5217
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$FileFindFirst
                                                      • String ID:
                                                      • API String ID: 2113789597-0
                                                      • Opcode ID: 06887e1307c0165ed681ee8080f10d51a9ecc12a7ddf961e6366d459280c14db
                                                      • Instruction ID: 7bc6abf49cd82ec696fba97ed359d8aed05c41abd8b0fe148b0347d3bdd4ef35
                                                      • Opcode Fuzzy Hash: 06887e1307c0165ed681ee8080f10d51a9ecc12a7ddf961e6366d459280c14db
                                                      • Instruction Fuzzy Hash: FD12BE31518B898FE765EB18C4A5BDFB7E5FFD9300F50496EA08EC3192EE3099458B42

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 888 7ff6341ff2f0-7ff6341ff311 889 7ff6341ff313-7ff6341ff337 call 7ff63420e460 888->889 890 7ff6341ff339-7ff6341ff340 888->890 889->890 896 7ff6341ff342 889->896 891 7ff6341ff344-7ff6341ff365 call 7ff6341e1770 890->891 895 7ff6341ff36a-7ff6341ff388 891->895 898 7ff6341ff594-7ff6341ff597 895->898 899 7ff6341ff38e-7ff6341ff3ae 895->899 896->891 900 7ff6341ff59b-7ff6341ff5a3 898->900 905 7ff6341ff3b4-7ff6341ff3c5 899->905 906 7ff6341ff58a-7ff6341ff58e 899->906 902 7ff6341ff5a9-7ff6341ff5ce call 7ff6341b9150 900->902 903 7ff6341ff416 900->903 904 7ff6341ff41a-7ff6341ff46c 902->904 909 7ff6341ff5d4-7ff6341ff5db 902->909 903->904 913 7ff6341ff472-7ff6341ff48e 904->913 914 7ff6341ff60d 904->914 905->906 915 7ff6341ff3cb-7ff6341ff410 905->915 906->898 912 7ff6341ff5e0-7ff6341ff606 909->912 912->912 916 7ff6341ff608 912->916 913->914 920 7ff6341ff494-7ff6341ff497 913->920 917 7ff6341ff60f-7ff6341ff628 914->917 915->900 915->903 916->904 922 7ff6341ff499-7ff6341ff4a8 920->922 923 7ff6341ff4d8-7ff6341ff4f6 920->923 924 7ff6341ff4b0-7ff6341ff4d1 call 7ff63420cafd 922->924 927 7ff6341ff583-7ff6341ff585 923->927 928 7ff6341ff4fc-7ff6341ff504 923->928 931 7ff6341ff4d3 924->931 927->917 928->927 930 7ff6341ff506-7ff6341ff509 928->930 932 7ff6341ff50b-7ff6341ff515 930->932 933 7ff6341ff57a-7ff6341ff57d 00007FFDB222F020 930->933 931->923 932->933 934 7ff6341ff517-7ff6341ff534 932->934 933->927 935 7ff6341ff56f-7ff6341ff573 934->935 936 7ff6341ff536-7ff6341ff568 934->936 935->933 936->935
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: $C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"
                                                      • API String ID: 2168931217-1764846569
                                                      • Opcode ID: 6e28a316da41b94bf50931ee6c5702acf42ef958fdcde222e39192c421343862
                                                      • Instruction ID: 01f281e6161b4583992d69b1153b1eb8db21c309880481c27a82d5b8522b817e
                                                      • Opcode Fuzzy Hash: 6e28a316da41b94bf50931ee6c5702acf42ef958fdcde222e39192c421343862
                                                      • Instruction Fuzzy Hash: 87916A32705A8586EB10CF26D4903ADBBA5FB89B88F448136DE4E93B64DF78E446D700

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 937 1984bff6fe0-1984bff75d5 call 1984bff5740 call 1984bff77f0 call 1984bff9d80 call 1984bffa110 call 1984bff78a0 call 1984bff9cf0 call 1984bffa110 call 1984bff7960 call 1984bff9c60 call 1984bffa110 call 1984bff7a10 call 1984bff9c60 call 1984bffa110 call 1984bff7ac0 call 1984bff9c60 call 1984bffa110 call 1984bff7b70 call 1984bff9bd0 call 1984bffa110 call 1984bff7c20 call 1984bff9b40 call 1984bffa110 call 1984bff7ce0 call 1984bff9a00 call 1984bffa110 call 1984bff7dc0 call 1984bff98c0 call 1984bffa110 call 1984bff7e90 call 1984bff9830 call 1984bffa110 call 1984bff7f60 call 1984bff97a0 call 1984bffa110 call 1984bff8010 call 1984bff9bd0 call 1984bffa110 call 1984bff80c0 call 1984bff9710 call 1984bffa110 call 1984bff8170 call 1984bff95d0 call 1984bffa110 call 1984bff8230 call 1984bff9710 call 1984bffa110 call 1984bff82e0 call 1984bff9540 call 1984bffa110 call 1984bff8390 call 1984bff94b0 call 1984bffa110 call 1984bff8450 call 1984bff9370 call 1984bffa110 call 1984bff8500 call 1984bff9370 call 1984bffa110 call 1984bff85b0 call 1984bff9230 call 1984bffa110 call 1984bff8670 call 1984bff9230 call 1984bffa110 call 1984bff8730 call 1984bff91a0 call 1984bffa110 call 1984bff8800 call 1984bff9370 call 1984bffa110 call 1984bff88b0 call 1984bff9060 call 1984bffa110 call 1984bff8960 call 1984bff8f20 call 1984bffa110 call 1984bff8a20 call 1984bff8de0 call 1984bffa110 std::_Fac_node::_Fac_node call 1984bff9e90 call 1984bff8ba0 CreateToolhelp32Snapshot 1100 1984bff75d7-1984bff75df 937->1100 1101 1984bff7633-1984bff7653 Process32FirstW 937->1101 1104 1984bff75e1-1984bff75e6 1100->1104 1105 1984bff75e8-1984bff762e call 1984bff8af0 call 1984bff8c70 call 1984bffa110 call 1984bff9e70 1100->1105 1102 1984bff77b9-1984bff77d8 call 1984bffa110 call 1984bff9e70 1101->1102 1103 1984bff7659-1984bff76ab call 1984bff5360 call 1984c110640 call 1984c110900 1101->1103 1119 1984bff77df-1984bff77e8 1102->1119 1123 1984bff76b7-1984bff76d3 call 1984bff9e40 1103->1123 1104->1105 1105->1119 1128 1984bff7790-1984bff77b3 call 1984bffa060 Process32NextW 1123->1128 1129 1984bff76d9-1984bff7702 call 1984bff9e10 call 1984bff9fe0 1123->1129 1128->1102 1128->1103 1136 1984bff778b 1129->1136 1137 1984bff7708-1984bff7710 1129->1137 1136->1123 1139 1984bff7712-1984bff7719 1137->1139 1140 1984bff771b-1984bff7723 1137->1140 1141 1984bff773a-1984bff7789 call 1984bffa170 call 1984bff6f30 call 1984bffa060 call 1984bff9e70 1139->1141 1140->1141 1142 1984bff7725-1984bff772a 1140->1142 1141->1119 1142->1141 1143 1984bff772c-1984bff7738 1142->1143 1143->1142
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CreateFac_nodeFac_node::_FirstNextSnapshotToolhelp32char_traitsstd::_
                                                      • String ID:
                                                      • API String ID: 4114415025-0
                                                      • Opcode ID: b447e1fdda4dec36b7a34e48ad19bb37ccf871ec3052bdc89735a2700575b0cd
                                                      • Instruction ID: 42207b9be169c904b1964cc3023a29b8707d0a4b734dac2a2dbec68e5ee5f4c9
                                                      • Opcode Fuzzy Hash: b447e1fdda4dec36b7a34e48ad19bb37ccf871ec3052bdc89735a2700575b0cd
                                                      • Instruction Fuzzy Hash: 6E321D32A18A4D4BE755EB28C4657EFB2E2FF99300F91497BA04EC3292ED31D945CB41
                                                      APIs
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0B77D6
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0B7854
                                                      • CryptUnprotectData.CRYPT32 ref: 000001984C0B78AD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$CryptDataUnprotect
                                                      • String ID:
                                                      • API String ID: 3418212865-0
                                                      • Opcode ID: 4a58d185219048462ed20adef7d46b637afd1ce34fa3cdcfcaa02483a53deee4
                                                      • Instruction ID: bb94439eb01d25b2732567c185ed832712251f5618272970c81d3e50c77caccf
                                                      • Opcode Fuzzy Hash: 4a58d185219048462ed20adef7d46b637afd1ce34fa3cdcfcaa02483a53deee4
                                                      • Instruction Fuzzy Hash: 2F519E70518B898FE7A4EB28C4697EEB7E1FF99301F50492E948DC3261DF749444CB42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 0-1817040388
                                                      • Opcode ID: 56d521ff8339707aadcb59bad46e377d0a037c71524e825469e81c85201c9fb9
                                                      • Instruction ID: 6ae26529d00a18188626aada7b87ea798b048960457c7b1f15cd7cebfd9d5285
                                                      • Opcode Fuzzy Hash: 56d521ff8339707aadcb59bad46e377d0a037c71524e825469e81c85201c9fb9
                                                      • Instruction Fuzzy Hash: 6F027936705B8586DB20CF26D484AAE7BA5FB88B88F068626DF4D87764DF39D445CB00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f85459a4f5f85dc817c154eb3d07b0bf51aad233fa7be8da4c6d5771264566b4
                                                      • Instruction ID: 9726d5a4d782d2b240d3d12e2548d045f102eccea62f3a6474245c2c6a2dcfcd
                                                      • Opcode Fuzzy Hash: f85459a4f5f85dc817c154eb3d07b0bf51aad233fa7be8da4c6d5771264566b4
                                                      • Instruction Fuzzy Hash: 74020902E28ABA85F752963555813F9A3C1CF6A384F188732ED59F3BD6DF5DA4829200

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 419 7ff6342026c0-7ff6342026dc 420 7ff6342026e5-7ff634202717 419->420 421 7ff6342026de-7ff6342026e0 419->421 423 7ff634202723-7ff634202730 420->423 422 7ff6342031ad-7ff6342031b6 421->422 424 7ff634202732-7ff634202756 423->424 425 7ff634202758-7ff63420282f call 7ff6342032e0 call 7ff634207240 call 7ff634207e20 call 7ff6342031c0 call 7ff634207240 call 7ff634207e20 call 7ff634208780 GetModuleHandleA 423->425 424->423 441 7ff634202865-7ff6342028c9 call 7ff634208780 GetProcAddress call 7ff6342081c0 * 2 425->441 442 7ff634202831-7ff634202863 call 7ff6342081c0 * 2 425->442 452 7ff6342028d1-7ff634202993 call 7ff634201a40 call 7ff634209610 call 7ff634209670 call 7ff634202150 call 7ff6342081c0 441->452 442->452 464 7ff63420299f-7ff6342029e1 452->464 465 7ff6342029e3-7ff634202a39 464->465 466 7ff634202a3e-7ff634202b4a VirtualAlloc 464->466 465->464 468 7ff634202b4c-7ff634202b64 call 7ff634208090 466->468 469 7ff634202b69-7ff634202c5d call 7ff634203520 call 7ff6342071b0 call 7ff634207e20 call 7ff634203400 call 7ff6342071b0 call 7ff634207e20 call 7ff634208780 GetModuleHandleA 466->469 468->422 486 7ff634202c5f-7ff634202c97 call 7ff6342081c0 * 2 469->486 487 7ff634202c99-7ff634202d06 call 7ff634208780 GetProcAddress call 7ff6342081c0 * 2 469->487 496 7ff634202d0e-7ff634202dfe call 7ff634203760 call 7ff634207090 call 7ff634207e20 call 7ff634203640 call 7ff634207120 call 7ff634207e20 call 7ff634208780 GetModuleHandleA 486->496 487->496 513 7ff634202e00-7ff634202e38 call 7ff6342081c0 * 2 496->513 514 7ff634202e3a-7ff634202ea7 call 7ff634208780 GetProcAddress call 7ff6342081c0 * 2 496->514 523 7ff634202eaf-7ff634202f0b 513->523 514->523 526 7ff634202f25-7ff634202f35 523->526 527 7ff634202f7f-7ff6342030a8 call 7ff6342072d0 call 7ff6342039b0 call 7ff634207000 call 7ff634207e20 call 7ff634203890 call 7ff634207000 call 7ff634207e20 call 7ff634208780 GetModuleHandleA 526->527 528 7ff634202f37-7ff634202f40 526->528 548 7ff6342030e4-7ff634203151 call 7ff634208780 GetProcAddress call 7ff6342081c0 * 2 527->548 549 7ff6342030aa-7ff6342030e2 call 7ff6342081c0 * 2 527->549 529 7ff634202f42-7ff634202f7b 528->529 530 7ff634202f7d 528->530 529->530 530->526 558 7ff634203159-7ff6342031a2 CreateThread call 7ff634208090 548->558 549->558 562 7ff6342031a7-7ff6342031a8 558->562 562->422
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: HandleModule
                                                      • String ID:
                                                      • API String ID: 4139908857-0
                                                      • Opcode ID: ce6c98c5b26b5447e9699c6d82b08a0c665aec57600c35ced484b5b0925df019
                                                      • Instruction ID: e0948afcc54f4e57f54adc80002e226e287fadefc8fb4d6d77a25d731273672d
                                                      • Opcode Fuzzy Hash: ce6c98c5b26b5447e9699c6d82b08a0c665aec57600c35ced484b5b0925df019
                                                      • Instruction Fuzzy Hash: 5C42B03660ABC585DAB0DB15E5A43ABF3A5FBC8B80F004536DA8D93B69DF3DD4449B00

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Window$MetricsSystem$ClassCreateHandleModuleRegisterShowUpdate
                                                      • String ID: class001
                                                      • API String ID: 3666473625-3656631403
                                                      • Opcode ID: 53389c19fc29f04132dcce79cdbd498e5441cdc0ef18e48b201337a412e8095a
                                                      • Instruction ID: e039bde37433750c06374bd30fd943d7172f46e16d6830dc7d1c2f239ccf4083
                                                      • Opcode Fuzzy Hash: 53389c19fc29f04132dcce79cdbd498e5441cdc0ef18e48b201337a412e8095a
                                                      • Instruction Fuzzy Hash: 4531D770A18B428AF7508F64F9D836AB7A0FB46744F510139D98DD6B6ACF7EE048E740

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: v2.1.1 Setup$ v2.1.1 Setup!Before starting the installation, select the folder where the files will be installed$A$FrghcZrah$Solara$Welcome to
                                                      • API String ID: 2030045667-4036644300
                                                      • Opcode ID: 818e4b6d2888c4cba2b6a02a4dad209fdc6011418aa973f574071f8947bbbd02
                                                      • Instruction ID: e200d00b57dbfc8bb9ba2b2f6bfe5b07eeb887b7e3fa041d5c63cdede82728a2
                                                      • Opcode Fuzzy Hash: 818e4b6d2888c4cba2b6a02a4dad209fdc6011418aa973f574071f8947bbbd02
                                                      • Instruction Fuzzy Hash: 2C71102260DB8281DB60DB65F5E12AEE7E0EF85784F404035EACDD3BAADE2DD145DB00

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyNextProcess32Queue::StructuredWork$CreateSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 2993956496-0
                                                      • Opcode ID: ccef948bbded8c3c363223a2ce267501defc5825a781fad79f845297002980c6
                                                      • Instruction ID: fc5308b3a15e73fde2bcd7b19890d11ea294eb82b52fb3373d0f21e26d3cb88c
                                                      • Opcode Fuzzy Hash: ccef948bbded8c3c363223a2ce267501defc5825a781fad79f845297002980c6
                                                      • Instruction Fuzzy Hash: A6513F31518B898BE365EB28C455BDEB7E5FFD5300F405A2EA08EC31A1DF709945CB41

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1153 1984c1da382-1984c1da3d3 1157 1984c1da3e9-1984c1da3eb 1153->1157 1158 1984c1da3d9-1984c1da3e3 1153->1158 1160 1984c1da533-1984c1da53c 1157->1160 1158->1157 1161 1984c1da3f0-1984c1da43e VirtualProtect 1158->1161 1165 1984c1da444-1984c1da44b 1161->1165 1166 1984c1da450-1984c1da531 1161->1166 1165->1160 1166->1160
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID: %$d
                                                      • API String ID: 544645111-2062555646
                                                      • Opcode ID: 54094574cc393b862cd2771380fe1ec476da5795c3c02fbf705b5334c7136e22
                                                      • Instruction ID: a4ce7eb53bbe8114f9f3d3395495385a5f2fed1d6750b36a1cd81c8581d056ca
                                                      • Opcode Fuzzy Hash: 54094574cc393b862cd2771380fe1ec476da5795c3c02fbf705b5334c7136e22
                                                      • Instruction Fuzzy Hash: 0041C130A1CA568FE318CA6DD4A83EAB2D5FBD9316F50462EF087C32D0CB68D5058B46

                                                      Control-flow Graph

                                                      APIs
                                                      • type_info::_name_internal_method.LIBCMTD ref: 000001984C0D87C0
                                                        • Part of subcall function 000001984C026A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C026AAB
                                                        • Part of subcall function 000001984C026A80: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C026ABA
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C0D8826
                                                      • CreateFileA.KERNEL32 ref: 000001984C0D8852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFiletype_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 645652700-0
                                                      • Opcode ID: 819d9873fe87e5e0672c7b493bbbe385e55e3c781ecdd4f5973528374cac9e4f
                                                      • Instruction ID: 6b61d8c117c5c3ca91fc266219c9ad1bf1f65829d9b1ea388e7d0c2e38e1ac99
                                                      • Opcode Fuzzy Hash: 819d9873fe87e5e0672c7b493bbbe385e55e3c781ecdd4f5973528374cac9e4f
                                                      • Instruction Fuzzy Hash: 71812F30619A498FE7A4EB68C865BDEB7E1FF99310F404A6DA08DC32D1DE35D845CB02
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID: %$d
                                                      • API String ID: 4275171209-2062555646
                                                      • Opcode ID: 0397274e70c8a7f3d789460244b764dcb58fce8343aaa3aac63c8b35ee727e9f
                                                      • Instruction ID: 6c193635efd7c6c8079edcaadc40b11c5c52ce61774f1aeff88dbe4e53d6af00
                                                      • Opcode Fuzzy Hash: 0397274e70c8a7f3d789460244b764dcb58fce8343aaa3aac63c8b35ee727e9f
                                                      • Instruction Fuzzy Hash: 4951E331628A0ACFD31CDA28C4A87EE77D5FB9D355F500A2EB08BC32D1DA64D5468B42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                      • String ID:
                                                      • API String ID: 586831839-0
                                                      • Opcode ID: ebd15ed829b08a1b500daa4d553f069842ecabd0a130300aab089dd93fe54596
                                                      • Instruction ID: bb1d41957c92ab9c4dc603cad346395bff170139d8e3e735318aadb60cfe08cc
                                                      • Opcode Fuzzy Hash: ebd15ed829b08a1b500daa4d553f069842ecabd0a130300aab089dd93fe54596
                                                      • Instruction Fuzzy Hash: 3E21B470658B888FDB94EF1CC498B9ABBE0FB99305F50491DE489C3260DBB5D844CB42
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF476C
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF477E
                                                        • Part of subcall function 000001984BFF53C0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF53DD
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF47BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID:
                                                      • API String ID: 1865873047-0
                                                      • Opcode ID: 56f0e97885bd8304239a8f2878fdd14305f6cae0faeb2e433c02dacfefb3af0e
                                                      • Instruction ID: a147e0f0ef9776f0bd141aab3953123dbfd4727779bded2883b7de854dd8ea8b
                                                      • Opcode Fuzzy Hash: 56f0e97885bd8304239a8f2878fdd14305f6cae0faeb2e433c02dacfefb3af0e
                                                      • Instruction Fuzzy Hash: 6931BA71528B989FD794EF28C455B9EBBE1FF95300F80492EB489C32A1DF70A455CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateFileHandleOpen
                                                      • String ID:
                                                      • API String ID: 420164193-0
                                                      • Opcode ID: 400d762f45c222ad54dc4951f779c31423d5e1f4fd11ce37fb757c510c9c0084
                                                      • Instruction ID: 44ec4eb57d9446710ffb5b4a079fc914749429ff4147b3f65cdb78329af3a0f4
                                                      • Opcode Fuzzy Hash: 400d762f45c222ad54dc4951f779c31423d5e1f4fd11ce37fb757c510c9c0084
                                                      • Instruction Fuzzy Hash: 2721A03160C68186E720CB64F5A87BAE6E1FB847A4F500235E69DD3BD8DF7EC4459B00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Concurrency::details::CreateEmptyQueue::ReadStructuredWork
                                                      • String ID:
                                                      • API String ID: 586831839-0
                                                      • Opcode ID: 00f0e8137a90342245313ce85138990c6ed6b9c8d6714f93bfdec8d0e61b2606
                                                      • Instruction ID: bd3a2a9440ff0a52350d6e51c60f6053511d9fccdd2676b3eaffcdf6ebfe59a1
                                                      • Opcode Fuzzy Hash: 00f0e8137a90342245313ce85138990c6ed6b9c8d6714f93bfdec8d0e61b2606
                                                      • Instruction Fuzzy Hash: 06010274618B488FD744EF28C85871ABBE0FB9A304F50091DF08AC32A0DB79C9498B42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Message$DispatchPeekTranslate
                                                      • String ID:
                                                      • API String ID: 4217535847-0
                                                      • Opcode ID: fb7ffd9013c6280f3680469662e411462aaa5576de6003425bd1f7d40c52d67d
                                                      • Instruction ID: 609aaee31f3e1fdeb1bee1d757262304384db5eaae84d6fc54f43a9328efca81
                                                      • Opcode Fuzzy Hash: fb7ffd9013c6280f3680469662e411462aaa5576de6003425bd1f7d40c52d67d
                                                      • Instruction Fuzzy Hash: A501842192C49286F3509B20AAE177AEAE0BFA1345F505031F14FD2795CF2EE549BB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: gfff
                                                      • API String ID: 2168931217-1553575800
                                                      • Opcode ID: 6015d84ae1b1d65a6ab8ddef2866e44c8506d770f6cc5ed3b1f5fe4bfbead1f1
                                                      • Instruction ID: e9081f8ff5f5f781de762859d78385b9cbe65d1a7c54fe8e64d37c7ded06e4d4
                                                      • Opcode Fuzzy Hash: 6015d84ae1b1d65a6ab8ddef2866e44c8506d770f6cc5ed3b1f5fe4bfbead1f1
                                                      • Instruction Fuzzy Hash: 65514663708A8586D7058F28D9912BDFBB2FB8CB80F498226DA48D7799CF3CD195C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007D940
                                                      • String ID: @
                                                      • API String ID: 1355977542-2766056989
                                                      • Opcode ID: c9bde2acb797ea5a268e1411900f8b57382d5fe92209a827650add27bf516a59
                                                      • Instruction ID: a3e8aae1a03f74d4943b4aa7d746578062546c8c547d961ee0ff0172bcc3b8d8
                                                      • Opcode Fuzzy Hash: c9bde2acb797ea5a268e1411900f8b57382d5fe92209a827650add27bf516a59
                                                      • Instruction Fuzzy Hash: C011C370A0860686F7108F41E994365A6E0EF46788F424135D94DD77ABDF7EA184AB00
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C0D8BE0
                                                      • CreateFileA.KERNEL32 ref: 000001984C0D8C0F
                                                        • Part of subcall function 000001984BFFA170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFFA18D
                                                        • Part of subcall function 000001984C0D8720: type_info::_name_internal_method.LIBCMTD ref: 000001984C0D87C0
                                                        • Part of subcall function 000001984C0D8720: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C0D8826
                                                        • Part of subcall function 000001984C0D8720: CreateFileA.KERNEL32 ref: 000001984C0D8852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFile$type_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 2627539804-0
                                                      • Opcode ID: cc7fafd89d896ea43074705b9a37fd9b433cefd388bc7ac13a0765c05240d101
                                                      • Instruction ID: e4cf19e8e97bb30bcc5afc9dc8dd25cd9b61599303eb6c65837af16a76177dc4
                                                      • Opcode Fuzzy Hash: cc7fafd89d896ea43074705b9a37fd9b433cefd388bc7ac13a0765c05240d101
                                                      • Instruction Fuzzy Hash: FA11DB70618B898FE794EF28C45979AB7E1FBDA341F40492EE08DC3261DF79D8458B42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B2241Initialize
                                                      • String ID:
                                                      • API String ID: 1127141782-0
                                                      • Opcode ID: 5b54a8b9123677f748fd2ee654e194cb8d97a930d90aeec746cf412f2530cc20
                                                      • Instruction ID: 70c9f169efdcb29c3a48505e3459d3b57a989a5cd356eb96ff84f89799741011
                                                      • Opcode Fuzzy Hash: 5b54a8b9123677f748fd2ee654e194cb8d97a930d90aeec746cf412f2530cc20
                                                      • Instruction Fuzzy Hash: 94116AD4E0854742FA6CBBB24BF72B9C2D58F95340F440471E64DE63D3EE1EA845A226
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                      • String ID:
                                                      • API String ID: 1173176844-0
                                                      • Opcode ID: a62e57b613f6e6410e13ca755f8d4b74df9e9e7d5764e1737291f7a9854307f7
                                                      • Instruction ID: 464b70bc0d604e55b0a343fcfb4c0aa7ffdd4e9af34f8091b6ba38ba04982cee
                                                      • Opcode Fuzzy Hash: a62e57b613f6e6410e13ca755f8d4b74df9e9e7d5764e1737291f7a9854307f7
                                                      • Instruction Fuzzy Hash: F7F05E90E1920B41FD2D66A766F61B881C18F09B70F5C0630ED7CE67C2ED1FA49AB210
                                                      APIs
                                                      • std::_Fac_node::_Fac_node.LIBCPMTD ref: 000001984C10343A
                                                        • Part of subcall function 000001984BFFA170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFFA18D
                                                        • Part of subcall function 000001984C0D8720: type_info::_name_internal_method.LIBCMTD ref: 000001984C0D87C0
                                                        • Part of subcall function 000001984C0D8720: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C0D8826
                                                        • Part of subcall function 000001984C0D8720: CreateFileA.KERNEL32 ref: 000001984C0D8852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$CreateFac_nodeFac_node::_Filestd::_type_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 3000750846-0
                                                      • Opcode ID: 3f2ef6f74bf225def2dab778cd6fcba1428f71d8aef22a335888cc59ac8b6020
                                                      • Instruction ID: a31c62efa04f83082d72817c056597bbe6d8a9be55d2f34c9508042493c862fd
                                                      • Opcode Fuzzy Hash: 3f2ef6f74bf225def2dab778cd6fcba1428f71d8aef22a335888cc59ac8b6020
                                                      • Instruction Fuzzy Hash: 8E914F3165CB898FE765EB28C454BEAB7E1FF9A304F40095DE089C3292EE75D941CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                      • Instruction ID: e4e2cbe0b5604ae84b2bb3681076b6378d57f21bb5fd39d65c13d6ea3b2dedcb
                                                      • Opcode Fuzzy Hash: 0687a482410035a8978432453c5d728bbb6bc986c65ef01f96900fa291c08832
                                                      • Instruction Fuzzy Hash: 90A18536619B8486DB60CB5AE49032AB7E4F7C8B94F504126EBCE87B68DF3DD455CB00
                                                      APIs
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 000001984C119D8C
                                                        • Part of subcall function 000001984C11A810: std::bad_alloc::bad_alloc.LIBCMTD ref: 000001984C11A819
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                      • String ID:
                                                      • API String ID: 680105476-0
                                                      • Opcode ID: 64a47e28c3614743c32ebf0df84499a9aef0dcbac1c74a8302aad57f47b4e453
                                                      • Instruction ID: cbd1e1d8d512c729fd3c62e8dd8265094ad6081f0445c10638783be3a9126aa8
                                                      • Opcode Fuzzy Hash: 64a47e28c3614743c32ebf0df84499a9aef0dcbac1c74a8302aad57f47b4e453
                                                      • Instruction Fuzzy Hash: 8C018C30A3190B0EFEA8737548B53F825DDEF4F352F9405299836C71D6ED1C88929251
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_task
                                                      • String ID:
                                                      • API String ID: 118556049-0
                                                      • Opcode ID: b1371d319780f7c63a2b5d838895a119c58dee36737aa1d21d8aaa4a908d7d1e
                                                      • Instruction ID: 4dd960d2502c4e22f7988faeb1c8a1e2176cddf6b7f955fecd602edd093b0df5
                                                      • Opcode Fuzzy Hash: b1371d319780f7c63a2b5d838895a119c58dee36737aa1d21d8aaa4a908d7d1e
                                                      • Instruction Fuzzy Hash: 86015262618F4685D6709B59E59022AF7E0FF88798F400231FAADD6798DF3DD1509704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007$B222F020
                                                      • String ID: 0 && "stbtt_InitFont(): failed to parse FontData. It is correct and complete? Check FontDataSize."$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$atlas->ConfigData.Size > 0$cfg.DstFont && (!cfg.DstFont->IsLoaded() || cfg.DstFont->ContainerAtlas == atlas)$font->ConfigData == font_config$font_offset >= 0 && "FontData is incorrect, or FontNo cannot be found."$glyph_index_in_font != 0$i >= 0 && i < Size$n < (Storage.Size << 5)$src_range[0] <= src_range[1] && "Invalid range: is your glyph range array persistent? it is zero-terminated?"$src_tmp.DstIndex != -1$src_tmp.GlyphsList.Size == src_tmp.GlyphsCount
                                                      • API String ID: 2211405229-2192739418
                                                      • Opcode ID: f438b7f5490826f6287a76a7ec04228756cec118a08182ee0e1111dcaa512f5b
                                                      • Instruction ID: 0dcf56640772d32cbe9daf5bc06d6f332ee2651bc2cb6d6125f67a4702747c50
                                                      • Opcode Fuzzy Hash: f438b7f5490826f6287a76a7ec04228756cec118a08182ee0e1111dcaa512f5b
                                                      • Instruction Fuzzy Hash: 03F21376B04A8686E715CF29D4D42BDB7A0FB58B88F149236CA4ED3B90DF39E485D700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007$B222B224F020
                                                      • String ID: (Debug Log: Auto-disabled some ImGuiDebugLogFlags after 2 frames)$333?$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$Click %s Button to break in debugger! (remap w/ Ctrl+Shift)$Debug##Default$GImGui != 0$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$GetCurrentWindowRead()->Flags & ImGuiWindowFlags_Tooltip$HoveredId: 0x%08X$Left$Middle$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right$Size > 0$g.CurrentWindow->IsFallbackWindow == true$g.Font->IsLoaded()$g.MovingWindow && g.MovingWindow->RootWindow$g.Viewports.Size == 1$g.WindowsFocusOrder.Size <= g.Windows.Size$gfff$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                      • API String ID: 1964672387-8291574
                                                      • Opcode ID: d3b2595934c51ed1d8cb045eddf48157a67c1cc9c59cca699bf918a1817e944d
                                                      • Instruction ID: 9f75236c7e80d98d13585901a3a58be7eee2d8eec27daee3b27bc57cb0006f83
                                                      • Opcode Fuzzy Hash: d3b2595934c51ed1d8cb045eddf48157a67c1cc9c59cca699bf918a1817e944d
                                                      • Instruction Fuzzy Hash: 7BC29332A08AC689EB21CF35D8942F8BBA1FF55788F044235DA0DDB7A5DF39A585D700
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: __swprintf_l
                                                      • String ID: !((flags & ImGuiInputTextFlags_CallbackCompletion) && (flags & ImGuiInputTextFlags_AllowTabInput))$!((flags & ImGuiInputTextFlags_CallbackHistory) && (flags & ImGuiInputTextFlags_Multiline))$#SCROLLY$%*s%.*s$@$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$apply_new_text_length <= buf_size$apply_new_text_length >= 0$buf != 0 && buf_size >= 0$buf[0] != 0$callback != 0$callback_data.Buf == callback_buf$callback_data.BufSize == state->BufCapacity$callback_data.BufTextLen == (int)strlen(callback_data.Buf)$callback_data.Flags == flags$font->ContainerAtlas->TexID == _CmdHeader.TextureId$g.DragDropActive || g.ActiveId == id || g.ActiveId == 0 || g.ActiveIdPreviousFrame == id || (g.CurrentMultiSelect != 0 && g.BoxSel$i >= 0 && i < Size$idx <= obj->TextLen$password_font->Glyphs.empty() && password_font->IndexAdvanceX.empty() && password_font->IndexLookup.empty()$state != 0$state && state->ID == id
                                                      • API String ID: 1488884202-4266151527
                                                      • Opcode ID: 195f78c7db5a38b31e4e9b1d80104571116f3c666764a8de835408f227dede20
                                                      • Instruction ID: 1dde3a3543c738ab93868043dcb40e7c2b77c75ecd088ad345fb82ddf162a0fa
                                                      • Opcode Fuzzy Hash: 195f78c7db5a38b31e4e9b1d80104571116f3c666764a8de835408f227dede20
                                                      • Instruction Fuzzy Hash: 6393E332A19A868AE750CB26C0C46B9B7E1FF59788F048335DA5CD77A5CF39E446DB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: (g.IO.BackendPlatformUserData == 0) && "Forgot to shutdown Platform backend?"$(g.IO.BackendRendererUserData == 0) && "Forgot to shutdown Renderer backend?"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Forgot to shutdown Platform backend?$Forgot to shutdown Renderer backend?
                                                      • API String ID: 2168931217-2716422499
                                                      • Opcode ID: 26288e8c175f015e1836f85dd7fd1a69da7496cc3a127bc8ca54b656109c5204
                                                      • Instruction ID: 4d7e7c8f0d7f36c4dfd5143000c8b005073bd19702ad67a75b1ba05709030172
                                                      • Opcode Fuzzy Hash: 26288e8c175f015e1836f85dd7fd1a69da7496cc3a127bc8ca54b656109c5204
                                                      • Instruction Fuzzy Hash: 46426A33608E9292D709DF24D6941FCB3A5FB58B88F884136CA1EC7395DF39A5A6D340
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (inner_window->IDStack.back() == table_instance->TableInstanceID) && "Mismatching PushID/PopID!"$(outer_window->DC.ItemWidthStack.Size >= temp_data->HostBackupItemWidthStackSize) && "Too many PopItemWidth!"$(table->Flags & ImGuiTableFlags_ScrollX) == 0$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$Calling PopStyleColor() too many times!$Mismatching PushID/PopID!$Size > 0$Too many PopItemWidth!$g.CurrentWindow == outer_window && g.CurrentTable == table$g.TablesTempDataStacked > 0$i >= 0 && i < Size$inner_window == g.CurrentWindow$outer_window == inner_window || outer_window == inner_window->ParentWindow$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table != 0 && "Only call EndTable() if BeginTable() returns true!"$table->RowPosY2 == inner_window->DC.CursorPos.y
                                                      • API String ID: 0-2342475368
                                                      • Opcode ID: fb8c50e147d00a123830afff88922648a2ae1b96f566e52dfccd9055c5c3bd33
                                                      • Instruction ID: 9c4b268b0fb68a3e1d98ec02d588f2a1bf015d68f7862ef4578c72e10da99b85
                                                      • Opcode Fuzzy Hash: fb8c50e147d00a123830afff88922648a2ae1b96f566e52dfccd9055c5c3bd33
                                                      • Instruction Fuzzy Hash: 5D72CF36A08A8A96E725CB36C5C43B9B360FF19784F049631DA4DE36A1DF39B5D4E700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: !is_visible$#ContextMenu$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->IndexWithinEnabledSet <= column->DisplayOrder$i >= 0 && i < Size$p >= Data && p < DataEnd$table->IsLayoutLocked == false$table->LeftMostEnabledColumn >= 0 && table->RightMostEnabledColumn >= 0
                                                      • API String ID: 3568877910-1387518580
                                                      • Opcode ID: ec0702dd844992c5246f3174f8b9bbc99badffcfda43b03853648fa86f9c6ef8
                                                      • Instruction ID: 5daa07cef9885a8ab740784c321dad1a327f7e1c72dc2fa2286c4361f16a6489
                                                      • Opcode Fuzzy Hash: ec0702dd844992c5246f3174f8b9bbc99badffcfda43b03853648fa86f9c6ef8
                                                      • Instruction Fuzzy Hash: A7E2C036A08A8596E715CB36C1C03B8B7A0FF59744F089721DB58A3AA1DF79F4E4E740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: State
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$ImGui::IsNamedKey(key)
                                                      • API String ID: 1649606143-1336968070
                                                      • Opcode ID: 000c7aad7ae504db2632ddcdd900167e4b492e161e73d0c01b1bbe1108e36a38
                                                      • Instruction ID: a7009a6f7b57dc5a99beb97b8fc237574d39e9b6a766bb2f488b863aafebebc2
                                                      • Opcode Fuzzy Hash: 000c7aad7ae504db2632ddcdd900167e4b492e161e73d0c01b1bbe1108e36a38
                                                      • Instruction Fuzzy Hash: A1910410E5C65605FBB186346AA53B9E2C2CF61388F194635EC4AF67D5CF2FB882F250
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007$B222B22349F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$Calling PopStyleColor() too many times!$IsNamedKeyOrMod(key) && (owner_id != ((ImGuiID)0) || (flags & (ImGuiInputFlags_LockThisFrame | ImGuiInputFlags_LockUntilRelease)))$N/A$i >= 0 && i < Size$tab->LastFrameVisible >= tab_bar->PrevFrameVisible$tab->NameOffset < tab_bar->TabsNames.Buf.Size
                                                      • API String ID: 1829533921-961183113
                                                      • Opcode ID: e5856efc6648feed069a7f4fa4104e2495d66da8282e5a9a8bc57b6e285aa6dd
                                                      • Instruction ID: 24326ce47234f1757de085635650b85d7fad135e1f8d4ee4efce23db1d16683e
                                                      • Opcode Fuzzy Hash: e5856efc6648feed069a7f4fa4104e2495d66da8282e5a9a8bc57b6e285aa6dd
                                                      • Instruction Fuzzy Hash: 29B2C332A09A8586E751CF36C180179B7A0FF59788F158735DA4EE37A4EF39E486E700
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: AcquireExclusiveLock
                                                      • String ID: $ $#$#$'$)$*$*$-$-$.$2$2$SOFTWARE\VMware, Inc.\VMware Tools
                                                      • API String ID: 4021432409-1915594051
                                                      • Opcode ID: 4e38b839c97e853e088b89e59f31bd11186dc15767536bcab97c3b54645444db
                                                      • Instruction ID: 21e19d77e0a668229f28e892f0ab5d6b526a756a50029e04a4871816711c0be1
                                                      • Opcode Fuzzy Hash: 4e38b839c97e853e088b89e59f31bd11186dc15767536bcab97c3b54645444db
                                                      • Instruction Fuzzy Hash: F741102250C6C1C9E721C728F49835AFFA0E793358F540269E7D987B9ACBBEC148DB11
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: ClipboardGlobal$ByteCharMultiWide$AllocCloseDataEmptyFreeLockOpenUnlock
                                                      • String ID:
                                                      • API String ID: 1965520120-0
                                                      • Opcode ID: 157459983b14d43045f12caff330d5b23f9d56f10b12b28ab43e68da8f23084f
                                                      • Instruction ID: b6f28491e77c5afdd4c8cc3c7ced182583ee37489f8e58a0a5ebdcc388464e0b
                                                      • Opcode Fuzzy Hash: 157459983b14d43045f12caff330d5b23f9d56f10b12b28ab43e68da8f23084f
                                                      • Instruction Fuzzy Hash: F0118271B09A0247F7585B26B9A4235E2E1FF89BD1F084639DA4ED77A4DE3DD4809700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: !g.Initialized && !g.SettingsLoaded$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$FindSettingsHandler(handler->TypeName) == 0$Table$Window$n >= 0 && n < BITCOUNT
                                                      • API String ID: 2168931217-416841283
                                                      • Opcode ID: e75552faf6cb6818e37edf4e1281e6ae4e037dc8bb7990498778a7386c11f76a
                                                      • Instruction ID: 1145527338f5fe7696183ce84e1329e3cda21e2e73e7547ae7b4c3e068995063
                                                      • Opcode Fuzzy Hash: e75552faf6cb6818e37edf4e1281e6ae4e037dc8bb7990498778a7386c11f76a
                                                      • Instruction Fuzzy Hash: 16128C76A09F8686EB10CF24E9942B9B7A5FB54B84F444236CA9DC33A4DF3DE055D300
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0 && "Unknown event!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Processed$Remaining$button >= 0 && button < ImGuiMouseButton_COUNT$i >= 0 && i < Size$it >= Data && it < Data + Size && it_last >= it && it_last <= Data + Size$key != ImGuiKey_None$n >= 0 && n < BITCOUNT
                                                      • API String ID: 0-1923509833
                                                      • Opcode ID: 1ed67802044e51be6d7839670f05d2371b5f64d9626a24ad05dad900cbb79e92
                                                      • Instruction ID: ca8cad777d642e7e52d9c8206c35713026df6b297b1e874dc28d49a6470a11b7
                                                      • Opcode Fuzzy Hash: 1ed67802044e51be6d7839670f05d2371b5f64d9626a24ad05dad900cbb79e92
                                                      • Instruction Fuzzy Hash: 1A42D1A3F08AC246EB288B2599903B9FB90FB52744F045135DAA9C7795CF7DE854EB00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 3558122275-0
                                                      • Opcode ID: c688bddeaeefac873e56668a93d44276559217fb76c9b2df63bf723872700d1b
                                                      • Instruction ID: f6e4c1127d935251cd42a1712fb932369703b0c435d135f4a36f1da73a612c89
                                                      • Opcode Fuzzy Hash: c688bddeaeefac873e56668a93d44276559217fb76c9b2df63bf723872700d1b
                                                      • Instruction Fuzzy Hash: EE318172608B8186EB648F61E8A03EDB3A5FB84744F00443ADA4EE7B98DF3DD548C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$00007B222CloseDataF020Open
                                                      • String ID:
                                                      • API String ID: 1678172667-0
                                                      • Opcode ID: 4f80a7dd8e70029c47bd5bee4d5a62c6acc5d586712dd20aedd815bcf88934c7
                                                      • Instruction ID: 031c6b314514f7245aa0600a8e5f5eba5419be0728acaf7a75dd9612241f6d72
                                                      • Opcode Fuzzy Hash: 4f80a7dd8e70029c47bd5bee4d5a62c6acc5d586712dd20aedd815bcf88934c7
                                                      • Instruction Fuzzy Hash: AC31C272708B8187E7589F25B99416AA6E4FF89B90F180538DF8ED3794DF3CE4909600
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !scoring_rect.IsInverted()$<NULL>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: from move, window "%s", layer=%d$[nav] NavMoveRequest: clamp NavRectRel for gamepad move$[nav] NavMoveRequestForward %d$g.NavMoveDir != ImGuiDir_None && g.NavMoveClipDir != ImGuiDir_None$g.NavMoveFlags & ImGuiNavMoveFlags_Forwarded
                                                      • API String ID: 0-1751011103
                                                      • Opcode ID: 616e74a7204e9dce75e279fc66c1a8e3481e8fb7dc9d7603612969489961d151
                                                      • Instruction ID: 861ba0a078a79924572c056542274bd262578ecb58b6c2425687c25ab26b5c4c
                                                      • Opcode Fuzzy Hash: 616e74a7204e9dce75e279fc66c1a8e3481e8fb7dc9d7603612969489961d151
                                                      • Instruction Fuzzy Hash: E332F832D18FCA42E3629B3685812F9F350EF69794F188332DE58F63E5DF2979919600
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$dx >= 0$dy >= 0$e->ey >= y_top$e->sy <= y_bottom && e->ey >= y_top$fabsf(area) <= 1.01f$sy1 > y_final-0.01f$x >= 0 && x < len
                                                      • API String ID: 0-3568222241
                                                      • Opcode ID: a88b8822a652a6a58d3c13b7e93a3326d83c4615cbc288f37a7b030f3c75b75f
                                                      • Instruction ID: 58e704b019e2a55a33562be5cd400f7a2e60618d0ce7a3f83751c7487c219062
                                                      • Opcode Fuzzy Hash: a88b8822a652a6a58d3c13b7e93a3326d83c4615cbc288f37a7b030f3c75b75f
                                                      • Instruction Fuzzy Hash: 2412CA62D28F8D85E212973754C20B5F250AFBF3C4F199732F949F66B2DF297191AA00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                      • API String ID: 0-2705777111
                                                      • Opcode ID: 1ccc99fee43b973791133fe24f6ef74df9fec7d3652f4cac8b59883f21637887
                                                      • Instruction ID: 0c45726a9b37b6a0aab75541efdae66e6779e2ee2596e29c78892124aa4e4f0a
                                                      • Opcode Fuzzy Hash: 1ccc99fee43b973791133fe24f6ef74df9fec7d3652f4cac8b59883f21637887
                                                      • Instruction Fuzzy Hash: 2E727A63A28EE845D312CB3690822B9B7A1EF6F784F19C723ED45E2761EF38D5419700
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (0) && "Calling PopItemFlag() too many times!"$*Missing Text*$<Unknown>$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$Calling PopItemFlag() too many times!$p >= Data && p < DataEnd
                                                      • API String ID: 0-3275063505
                                                      • Opcode ID: e4eb3a359b1981c674d1e108ddc2ebf9e4a2e7cc717a12fab28e3b0eef34b5ea
                                                      • Instruction ID: 760d54c3ef75fcc3ef8708846c02b93eedeb06e466d642cf23f0185a236961b6
                                                      • Opcode Fuzzy Hash: e4eb3a359b1981c674d1e108ddc2ebf9e4a2e7cc717a12fab28e3b0eef34b5ea
                                                      • Instruction Fuzzy Hash: 32B1E676A08A4381EB608B14D5D02B9A7A1FB45B88F081136DE4DD3F95DF3EE8D5E300
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$[nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s"$g.NavActivateDownId == g.NavActivateId$g.NavLayer == ImGuiNavLayer_Main || g.NavLayer == ImGuiNavLayer_Menu$g.NavMoveDir == ImGuiDir_None$g.NavWindow != 0
                                                      • API String ID: 0-2167808928
                                                      • Opcode ID: 50a410fa7a85a90cac139f97951d64da551fdd238b8ea691b949dc80aa3e0e2c
                                                      • Instruction ID: be15526bb63346850228e669ffcfd5327e2757925a310f33fbd4637690ae571c
                                                      • Opcode Fuzzy Hash: 50a410fa7a85a90cac139f97951d64da551fdd238b8ea691b949dc80aa3e0e2c
                                                      • Instruction Fuzzy Hash: 55729E32E08AC289E7658B35C8843F9B791EF45B58F184235DA58D73E6CFB96881E701
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$button >= 0 && button < ((int)(sizeof(g.IO.MouseDown) / sizeof(*(g.IO.MouseDown))))$button >= 0 && button < ImGuiMouseButton_COUNT$id != 0
                                                      • API String ID: 0-2768765550
                                                      • Opcode ID: c83ec724d9ec7e2db4255f0bedf28826b5c2049c68488d60edb634a86f50e9d0
                                                      • Instruction ID: be48f9ca095078f3dca4178178b12866b1366bee1ea65fe8561a0a06d85b38c9
                                                      • Opcode Fuzzy Hash: c83ec724d9ec7e2db4255f0bedf28826b5c2049c68488d60edb634a86f50e9d0
                                                      • Instruction Fuzzy Hash: 43220F36E0CA8666FB688B2585C03BAEA91BF45784F045234CE5DD77D2CF3DB895A700
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #RESIZE$5$6$C:\Users\55yar\Desktop\imgui-master\imgui.h$idx == 0 || idx == 1
                                                      • API String ID: 0-650503096
                                                      • Opcode ID: 240daf669a9bafcbcedf6166f787f1416c004a1cd6fa2f3e4bb0a79944367b7c
                                                      • Instruction ID: 357c83c532bc04fc82fcb7b7fb288679141ec0231a7ee17106181bf9d2face3c
                                                      • Opcode Fuzzy Hash: 240daf669a9bafcbcedf6166f787f1416c004a1cd6fa2f3e4bb0a79944367b7c
                                                      • Instruction Fuzzy Hash: DEB20732D18B8985E766CB3694852B9B760EF59344F188731EA48F77A1DF39B484EB00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$p >= begin() && p < end()$settings->ColumnsCount == table->ColumnsCount && settings->ColumnsCountMax >= settings->ColumnsCount$settings->ID == table->ID
                                                      • API String ID: 0-2168725360
                                                      • Opcode ID: ee471b1d82bd3160a00610b93ddc27c37a03770945cf0a57a55015e5da5f3d14
                                                      • Instruction ID: 177621a5ada41ca8d10c911337c756cb80831fed63eede988ef3e836335b0022
                                                      • Opcode Fuzzy Hash: ee471b1d82bd3160a00610b93ddc27c37a03770945cf0a57a55015e5da5f3d14
                                                      • Instruction Fuzzy Hash: 6961EF37908A8286EB51CF25E5C42B9BBA0FB45748F049436DA89C77A1DF3CE589D700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                      • String ID:
                                                      • API String ID: 2933794660-0
                                                      • Opcode ID: ea28d440da4e979608dc7e616e30e56526e81ae9f67b9b208852c015bdb344e1
                                                      • Instruction ID: 55d22a35653f4c999097a03e14a5023aeafd22956d040d63e306757f2009bb2b
                                                      • Opcode Fuzzy Hash: ea28d440da4e979608dc7e616e30e56526e81ae9f67b9b208852c015bdb344e1
                                                      • Instruction Fuzzy Hash: 53113022B14F028AEB40CF60E9942B873A4F719758F440E31DA6DE6BA4DF7CD1949340
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ##NavUpdateWindowing$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0$shared_mods != 0
                                                      • API String ID: 0-1670481530
                                                      • Opcode ID: 360b769d1a2fdec6627b6b08fcd4e9414ce7f2e576724d62d04151109e8b5536
                                                      • Instruction ID: 372da24f035419151e54128d3db63c6ee4b86e0461a14aaa708d1658fc4d358a
                                                      • Opcode Fuzzy Hash: 360b769d1a2fdec6627b6b08fcd4e9414ce7f2e576724d62d04151109e8b5536
                                                      • Instruction Fuzzy Hash: 1E62C232E08B8696E7698B3585843B9A791FF46748F088235CA5CD33D6CF7DB894E701
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i*stride_in_bytes] == 0
                                                      • API String ID: 3568877910-15633718
                                                      • Opcode ID: fc9bdb31b49db41d9048269f0056432805a2286ecc5246c3cfab3adad49f64b9
                                                      • Instruction ID: a9484f1831237d1b57f26fbe036538a7a14381c112b4631f6c6839165cf92456
                                                      • Opcode Fuzzy Hash: fc9bdb31b49db41d9048269f0056432805a2286ecc5246c3cfab3adad49f64b9
                                                      • Instruction Fuzzy Hash: 9E71FAB360C6E297D3254B2CA98137EEED1BB8A344F1C4235EAC9C2B45DE3CD511EA40
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$pixels[i] == 0
                                                      • API String ID: 3568877910-2060079458
                                                      • Opcode ID: c264afed42174643e985218cfa408d0faf0002bce259567f4b919d414c4abda1
                                                      • Instruction ID: 6fb42682b9c647cd9749fd9baaeab5b142272dcac8742b2f5dacad8eb95372e1
                                                      • Opcode Fuzzy Hash: c264afed42174643e985218cfa408d0faf0002bce259567f4b919d414c4abda1
                                                      • Instruction Fuzzy Hash: A571D7A362CAE586D7158B79998467AFFD1EB86344F084239EA8DC3B45CE3DE114DB00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_widgets.cpp$ImMax(size_contents_v, size_visible_v) > 0.0f$idx == 0 || idx == 1
                                                      • API String ID: 0-3128625980
                                                      • Opcode ID: b79e59873a2d6d86e0f324a7f6a030a3696cd852f2a3f58e1130bf7054de911f
                                                      • Instruction ID: 42cb7af9ebe00cafaab3c4c5b4d003636c0b7871c895901d2ff8c109ceffb77f
                                                      • Opcode Fuzzy Hash: b79e59873a2d6d86e0f324a7f6a030a3696cd852f2a3f58e1130bf7054de911f
                                                      • Instruction Fuzzy Hash: BF12FB22D19BDD85E353C63794812B9E790AF6E384F1CCB32FD58B2662DF29B4C19600
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #CLOSE$#COLLAPSE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 0-766050946
                                                      • Opcode ID: 1126328c5b21c693ac038cd1df2188b2ff28e9b00e29aeb85db486171dcffa84
                                                      • Instruction ID: d767e97b55df3b2995223b24aa9da0a78614bf67d4961880ae3d653baf315fd7
                                                      • Opcode Fuzzy Hash: 1126328c5b21c693ac038cd1df2188b2ff28e9b00e29aeb85db486171dcffa84
                                                      • Instruction Fuzzy Hash: B2121E32E18B8985E311CB7694816F9F790EF6A388F159732EE4CE3791DF29A485D700
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ##v$#ComboPopup$C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 0-2429816084
                                                      • Opcode ID: 896d9a7eb4ff265f7d9a372d651be776c216d9fd4f77bbaffeda6aa337f1ec2a
                                                      • Instruction ID: ab6ddd27332e81caa982292c307ca9222fff869f850e7120bc612c39c9a05aa0
                                                      • Opcode Fuzzy Hash: 896d9a7eb4ff265f7d9a372d651be776c216d9fd4f77bbaffeda6aa337f1ec2a
                                                      • Instruction Fuzzy Hash: C8E1D732E15B8989E711CB3694812FDF3A0FF59348F149722EE08B76A5DF39A155E700
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (0) && "Calling PopItemFlag() too many times!"$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Calling PopItemFlag() too many times!
                                                      • API String ID: 0-102052167
                                                      • Opcode ID: d533dedf91d6cb1dc57bdba6c40da6b5cd47abdc815c8fb68137785444874cbe
                                                      • Instruction ID: d75ebdd03231c3d8fe0fc2ff63517ce649afb814540830e88503a8528e9994e2
                                                      • Opcode Fuzzy Hash: d533dedf91d6cb1dc57bdba6c40da6b5cd47abdc815c8fb68137785444874cbe
                                                      • Instruction Fuzzy Hash: F7E1C931918AC985E3268B3594813F9F3A0FF59744F049332EA49E76A5EF7DB095E700
                                                      APIs
                                                        • Part of subcall function 00007FF6341DCE80: 00007FFDA46F19C0.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000019847893340,00007FF6341B5C91), ref: 00007FF6341DCFE7
                                                        • Part of subcall function 00007FF6341DCE80: 00007FFDB224A0D0.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000019847893340,00007FF6341B5C91), ref: 00007FF6341DD044
                                                      • 00007FFDA46F19C0.VCRUNTIME140 ref: 00007FF6341B640C
                                                      • 00007FFDA46F19C0.VCRUNTIME140 ref: 00007FF6341B6BAF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007$B224
                                                      • String ID:
                                                      • API String ID: 2146329582-0
                                                      • Opcode ID: 9e4317997261937fea7a7ee8b6c161e0b27ad81cbb1ca3eaf5bda0d117835ba9
                                                      • Instruction ID: 0b3387b8be28e3fb563c86b466103d1fcdb93e0ab6ed68aebbc01149de2a93a5
                                                      • Opcode Fuzzy Hash: 9e4317997261937fea7a7ee8b6c161e0b27ad81cbb1ca3eaf5bda0d117835ba9
                                                      • Instruction Fuzzy Hash: E3829173815BC187D328CF30B9981DAB7A8FB55340F105219DBF663A61DB78E1A6E708
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID:
                                                      • API String ID: 2168931217-0
                                                      • Opcode ID: 05587f67d337416b8a16d78d83fffdb57dfa4c56496a1e3019a66dd91fbf2a84
                                                      • Instruction ID: 5f0cef5955d810e26fae1c2abd717732d62b43e208b6b1b50e84d5820da69d73
                                                      • Opcode Fuzzy Hash: 05587f67d337416b8a16d78d83fffdb57dfa4c56496a1e3019a66dd91fbf2a84
                                                      • Instruction Fuzzy Hash: 51B1B573A18E9585E721DF3590842BEF7A4FF59B84F148326EB8692754EF38E482D700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: InfoKeyboardLayoutLocale
                                                      • String ID:
                                                      • API String ID: 1218629382-0
                                                      • Opcode ID: f283ab7825a6475dc086a71a2a168ceadd91aec4ad0de022f7e24bf4c51d4291
                                                      • Instruction ID: db40811b56f0c181036e990881c52bc2398dfe4935738298bfc6691f3a329f8a
                                                      • Opcode Fuzzy Hash: f283ab7825a6475dc086a71a2a168ceadd91aec4ad0de022f7e24bf4c51d4291
                                                      • Instruction Fuzzy Hash: 7CF0A022B14A8586E7668B26A5402BAB3D5FB48754F184037CF8DE3750DE3FD883D700
                                                      Strings
                                                      • (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened, xrefs: 00007FF6341CC2E4
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF6341CC2DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (window->ChildFlags | g.NavWindow->ChildFlags) & ImGuiChildFlags_NavFlattened$C:\Users\55yar\Desktop\imgui-master\imgui.cpp
                                                      • API String ID: 0-3836044477
                                                      • Opcode ID: 59a3e0b9d0ed32fc26bab3bb040e05495808e826a9946ae6e3f556fdb2d6b851
                                                      • Instruction ID: 05b7a8bccbe60f37c6082dfef06dfd73b3fe8a98b03ebe79b40cc6e2b18737f7
                                                      • Opcode Fuzzy Hash: 59a3e0b9d0ed32fc26bab3bb040e05495808e826a9946ae6e3f556fdb2d6b851
                                                      • Instruction Fuzzy Hash: D2D1E823E08E9E81E222563785C20B9E3909F7EB85F1C9732ED48F27A1EF197D856540
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !(o > b->size || o < 0)$C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                      • API String ID: 0-2013812653
                                                      • Opcode ID: 0d476810ee24973e4687efe328c80034deff5b45b82e8c1e7edba5a50064980d
                                                      • Instruction ID: 2c74d1769865960e9769b8939202123a163d8d6c0896ee584cf8906a86c60146
                                                      • Opcode Fuzzy Hash: 0d476810ee24973e4687efe328c80034deff5b45b82e8c1e7edba5a50064980d
                                                      • Instruction Fuzzy Hash: 88B1DF73A18AC48AE701CF7A90801BDBBB0FF89385F145325EF8962675DF79A181DB00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$text_end != 0
                                                      • API String ID: 0-48455972
                                                      • Opcode ID: 08f38f8f42a20b6ae9d2cfd4b0838849bdb775e757d534d2916361f9775c9024
                                                      • Instruction ID: 06503e0ee678478347b1feb23b25b7a83a2736beaa9f17999328f82e724a8dcf
                                                      • Opcode Fuzzy Hash: 08f38f8f42a20b6ae9d2cfd4b0838849bdb775e757d534d2916361f9775c9024
                                                      • Instruction Fuzzy Hash: DD412825F0DA5986E9A1896390C0179E652AFA5B80F5C9732DD0CD7F98DF3CE4C1A704
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 0-1180621679
                                                      • Opcode ID: 1e37af945958fdbbf9efb019e9e7f485eed15aa847ee9e907e7b1330e220a63a
                                                      • Instruction ID: 9f9658ca055232a6a85a0052d63ec52a0e05f2238ff1312bb569c4bea323671f
                                                      • Opcode Fuzzy Hash: 1e37af945958fdbbf9efb019e9e7f485eed15aa847ee9e907e7b1330e220a63a
                                                      • Instruction Fuzzy Hash: A031E072B141E58FEB98CB62A860F797B60E3D6742B896121EF8057A48C73CD111CB50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 0-1180621679
                                                      • Opcode ID: 1692b8b0b4d5c362798770ae27053444f645312b350ac7f61c9bf755d23bb4d4
                                                      • Instruction ID: 3d5ff8c9a28fdc1a977d7c581c191f629b2ced3ebdf35f196bcc5ab7278c8eee
                                                      • Opcode Fuzzy Hash: 1692b8b0b4d5c362798770ae27053444f645312b350ac7f61c9bf755d23bb4d4
                                                      • Instruction Fuzzy Hash: D111DAB1A0869186E708CB61E4E0079B7A0F785B81F451037EBCE87749DE3CD181DB50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P
                                                      • API String ID: 0-3110715001
                                                      • Opcode ID: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                      • Instruction ID: 20bd9414bdb8758cfd3a1decba52db2eb6ac58e8329b89ffd1333bb946f42610
                                                      • Opcode Fuzzy Hash: 69ad6d8646a8d42a4d38cd2fe8030801224298b73a5447b55754f5dd44c8bdc4
                                                      • Instruction Fuzzy Hash: 9312D1306187458FD348DF28C4A1AAAB7E2FBCD308F514A6DF48AD7755DA34E941CB42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 571b037c833f41477eab1f803613ee28cd15a9307d76852dee75fe241bfed66e
                                                      • Instruction ID: 283f55ec5659f37ae010a3a3f09a5dc5b6527b8d51ddf14ebb4eefc4ec765366
                                                      • Opcode Fuzzy Hash: 571b037c833f41477eab1f803613ee28cd15a9307d76852dee75fe241bfed66e
                                                      • Instruction Fuzzy Hash: 2CE1FB7461CB888FE7A4DF18C4587AAB7E1FB99301F10591DE58EC32A1DB78D885CB06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h
                                                      • API String ID: 0-2705777111
                                                      • Opcode ID: 0e547a02c0faae0f31701a54dd046d557730ddebfdeab5f4b8c068a73400c959
                                                      • Instruction ID: 8ca6094f81621509f1fad8799133f9cbeb93e79a3ffc60b0ff8042539e50a75f
                                                      • Opcode Fuzzy Hash: 0e547a02c0faae0f31701a54dd046d557730ddebfdeab5f4b8c068a73400c959
                                                      • Instruction Fuzzy Hash: D85138A6A244B183DB608F2AC8C15BC77D1EB4A782FD48476D25CC2F91C92EC14AAF10
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: AcquireExclusiveLock
                                                      • String ID: \\.\VBoxMiniRdrDN
                                                      • API String ID: 4021432409-4073649278
                                                      • Opcode ID: 4d59e053f126c934bbe87067bd4d078bce445e7bd00d98d7c2fa9bd51dfe6ad4
                                                      • Instruction ID: 8007e7305513bd9b60ae4049f0082bdcfb3a532f91e0fca8b11c2933fbffe0e0
                                                      • Opcode Fuzzy Hash: 4d59e053f126c934bbe87067bd4d078bce445e7bd00d98d7c2fa9bd51dfe6ad4
                                                      • Instruction Fuzzy Hash: A531292251CBC289D721C728A89425AABA0EB97364F540374F6EEC67EADF2DD101DB11
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 01177c0944c594afe8d2519272f25f100af435ea639e3592be59496485798271
                                                      • Instruction ID: 008d344ef009e28a48490d3feac513b33f3d776f012eecbb7e1d6f7e750dfe62
                                                      • Opcode Fuzzy Hash: 01177c0944c594afe8d2519272f25f100af435ea639e3592be59496485798271
                                                      • Instruction Fuzzy Hash: 05925C33925B8886C716CF37D481169BB60FFAEB84B19D716DE0863761EB35E494EB00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7056ad41baa53b0861df8fc1b3d75c338a12c52f935646fbc65459307e15986b
                                                      • Instruction ID: 24c25d2040062c54789e25d22473d1edba45a672c7e3c1beb131e7d370517581
                                                      • Opcode Fuzzy Hash: 7056ad41baa53b0861df8fc1b3d75c338a12c52f935646fbc65459307e15986b
                                                      • Instruction Fuzzy Hash: 3E22A632E09A858AE711CA7690803FEF7A0FF59788F144335DE48E6695DF7CA455EB00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 27504f3df9fe3d2bcbeeb46f454de5265eb1ecadf1d403471eb2c49202ba0498
                                                      • Instruction ID: 2c3db493752bf3c2e0158defef83a9edf63824102a268d006fba67d2c54f800d
                                                      • Opcode Fuzzy Hash: 27504f3df9fe3d2bcbeeb46f454de5265eb1ecadf1d403471eb2c49202ba0498
                                                      • Instruction Fuzzy Hash: CF021872A18AC486D325CB36D081679F7A0FF5E784F148326EB89A3755EB3CE591DB00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c7a4d81e31cc1f335a30e7f1e06cc74edf758b19acc56c80cb797eaa226930cd
                                                      • Instruction ID: 40a14f684dbac40a0056cfbdf09320a4486e0f9a2dd7b6ded0785799111bf6ab
                                                      • Opcode Fuzzy Hash: c7a4d81e31cc1f335a30e7f1e06cc74edf758b19acc56c80cb797eaa226930cd
                                                      • Instruction Fuzzy Hash: 9602CD37E18F8986E211963695C21B9F350FFAF384F546721FE44E2AB1DF29F191A600
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: be17f392ea121d90e75c9b272ceadb28d56538019bb9e4878e4f70c653414feb
                                                      • Instruction ID: 1284e9cab688368c68a9a2e2c7ed0d76d11bcd7dc584300fc78e7665b3161328
                                                      • Opcode Fuzzy Hash: be17f392ea121d90e75c9b272ceadb28d56538019bb9e4878e4f70c653414feb
                                                      • Instruction Fuzzy Hash: 4AF1A33290AA828AE7718A2590803BBB7E0EF45758F084235DE99CB7D5DF3DE446E710
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1ce395c067b3fab69857288410e128d86538e75d917210ad2953944e45964f92
                                                      • Instruction ID: da5451ba6284b41bf6dd83936e2795bf82b11c16a9df04c2a66d070dcbe073d5
                                                      • Opcode Fuzzy Hash: 1ce395c067b3fab69857288410e128d86538e75d917210ad2953944e45964f92
                                                      • Instruction Fuzzy Hash: 1ED1B66292DAC245EFA58E3541803B9BBD1EF12748F1C4135ED8DDA7C6CF3D6842AB21
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4d84135fe5031b75b4d8ac2960b53fb71714476753b43893bff389ca86a997f9
                                                      • Instruction ID: dd5046db5ca2fe104c5514bca376ccf39346189a13401bc56c55a0c56fbd8c87
                                                      • Opcode Fuzzy Hash: 4d84135fe5031b75b4d8ac2960b53fb71714476753b43893bff389ca86a997f9
                                                      • Instruction Fuzzy Hash: 1EC13B36750B8982E7148F3BD454BAD67A1EB9EF88F09D231CE0A17B68DF3AD1458700
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 33a42b9f9b29d3832b029c47bcf8cdb7f01e3eef0a0307a1879daa4bfe730252
                                                      • Instruction ID: d55bc9be688ce588b7d369877e1015e75c8d1875f42546428ac538f7d19a6f17
                                                      • Opcode Fuzzy Hash: 33a42b9f9b29d3832b029c47bcf8cdb7f01e3eef0a0307a1879daa4bfe730252
                                                      • Instruction Fuzzy Hash: 83B15262E28FCC41E223963754821F6E250AFBF3C5F2DDB22FD84B56B6AF2561D16500
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15ba45cef193519d0e8a2cf2df657ba8e3e1ef1d8cacf801574288a9be6fea2f
                                                      • Instruction ID: 380ef53b987582cd14da41f9772e19c0276ce9d37531f05a62e93e2a6242cfad
                                                      • Opcode Fuzzy Hash: 15ba45cef193519d0e8a2cf2df657ba8e3e1ef1d8cacf801574288a9be6fea2f
                                                      • Instruction Fuzzy Hash: B1D1D532D0A7C285E3918F7548807F8BBD4FB66B48F0D827ACB889774ACF245450AB61
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6877bc407da904a33211ddbdad51888c4838a2b73c3e89749f5d9815c1d3e555
                                                      • Instruction ID: 6624c860575850befe521309f679d0f7cd805b22fefc0985c98670e0d35caa03
                                                      • Opcode Fuzzy Hash: 6877bc407da904a33211ddbdad51888c4838a2b73c3e89749f5d9815c1d3e555
                                                      • Instruction Fuzzy Hash: 3E91E532D18A8597E3568F3695803F9B7A0FF08758F188336DB59963D9DF38A981DB00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                      • Instruction ID: 8f60a195d6f7ff8a9d00f3ef039faeb7920a6cf85c5f7e98934ea5b2fa68ee25
                                                      • Opcode Fuzzy Hash: 1c3933692052abbb617f534a10efaa6307047042e1db0389fe2a76f298085f77
                                                      • Instruction Fuzzy Hash: 48410DDFC0DAC51BC7428664ACAA6827F709A2324EBCF58DBD498CA587F048D409D712
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 01a594b747edcffffaa1ebd3641977af083a727af88fb0c9dfb2b6d2f279d9fe
                                                      • Instruction ID: ffa33fdbc75b867247b33c5ae16f81d24d61c1ccf167887c5bdb256b823a42db
                                                      • Opcode Fuzzy Hash: 01a594b747edcffffaa1ebd3641977af083a727af88fb0c9dfb2b6d2f279d9fe
                                                      • Instruction Fuzzy Hash: EA01BF5BA0EAC246F2A24A240DBA06CAFD2FB66A1474D407AD784E7BC3DD4B18549702
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b6eb35e226d236aeea677bc6a2e138492e8ca463c7a595fb3af6a0231ab27ef
                                                      • Instruction ID: df62d28707b29f55b5e123308b4d992459d232b7d2c83030ba289834dd6744be
                                                      • Opcode Fuzzy Hash: 4b6eb35e226d236aeea677bc6a2e138492e8ca463c7a595fb3af6a0231ab27ef
                                                      • Instruction Fuzzy Hash: 50F0305B90E9C207F2A20A2409F609C6FD2EB62A1470D407AC744E37C3DD4F2C45A702
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ad52af0cbf140e38a339a8a008f0bd915f6df4a0b0c5a287284aee9b6a83c23b
                                                      • Instruction ID: 727a6973cd8d76af63747c43cd237031672f153aa427336040dd80f6458a2031
                                                      • Opcode Fuzzy Hash: ad52af0cbf140e38a339a8a008f0bd915f6df4a0b0c5a287284aee9b6a83c23b
                                                      • Instruction Fuzzy Hash: 7EE0C05B91E9C207F2A149144DBA05CAFD2FB62E1474D407AC785E37C3DD4B2C549706
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: df89906bcc78cad0a2aec5ecb7dd77a937296257eb7269d25f3e559f12854137
                                                      • Instruction ID: 7740c4d37b38f91b871920b00e6d3b07631b8fefcafa3b11a1753d5a7d185b3a
                                                      • Opcode Fuzzy Hash: df89906bcc78cad0a2aec5ecb7dd77a937296257eb7269d25f3e559f12854137
                                                      • Instruction Fuzzy Hash: 29E0DF4FE0D4C10EF2A1892846B56E41FC4EB73A10F084326D794EB3C3ED0F18069301
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 629e4b8bc268abd5ff6f1821ab861a0b50d73f20c8cb0795d9f958efeeda9d3b
                                                      • Instruction ID: bd6ac0c25673a86984c6805fd0d561f6f9a6d3985af6f25acaae1b9d0a9091c3
                                                      • Opcode Fuzzy Hash: 629e4b8bc268abd5ff6f1821ab861a0b50d73f20c8cb0795d9f958efeeda9d3b
                                                      • Instruction Fuzzy Hash: FBA0016194C80290E6198B01AAA0524A2E6AB50340F408471C40DE16609E2EA441A304
                                                      APIs
                                                        • Part of subcall function 000001984BFF5360: _WChar_traits.LIBCPMTD ref: 000001984BFF538D
                                                        • Part of subcall function 000001984BFF4AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF4AD0
                                                        • Part of subcall function 000001984BFF4AA0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984BFF4B2F
                                                        • Part of subcall function 000001984BFF4AA0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF4B41
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984BFF48B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::Concurrency::details::_CriticalEmptyLock::_Queue::ReentrantScoped_lockScoped_lock::~_StructuredWork$Char_traits
                                                      • String ID: $ $ $B$D$K$KDBM$M$a$a$a$b$c$e$g$i$l$o$t$y
                                                      • API String ID: 1777712374-1292890139
                                                      • Opcode ID: b2d997a1cd0057e47c91f10b8e029a4fbb281733a314e99ff4f758cdf7aee981
                                                      • Instruction ID: 327af5954bb8871c2387286d45eca1d83602f5aa8aedae3a09304fc64dd754c2
                                                      • Opcode Fuzzy Hash: b2d997a1cd0057e47c91f10b8e029a4fbb281733a314e99ff4f758cdf7aee981
                                                      • Instruction Fuzzy Hash: 0561E83050CB848FE760EB68C448B9ABBE1FBA5304F04492DA4C9C7261DBB9D499CB57
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B2245630
                                                      • String ID: 1.91.6 WIP$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$strcmp(version, "1.91.6 WIP") == 0 && "Mismatched version string!"$sz_idx == sizeof(ImDrawIdx) && "Mismatched struct layout!"$sz_io == sizeof(ImGuiIO) && "Mismatched struct layout!"$sz_style == sizeof(ImGuiStyle) && "Mismatched struct layout!"$sz_vec2 == sizeof(ImVec2) && "Mismatched struct layout!"$sz_vec4 == sizeof(ImVec4) && "Mismatched struct layout!"$sz_vert == sizeof(ImDrawVert) && "Mismatched struct layout!"
                                                      • API String ID: 1780217008-1295771896
                                                      • Opcode ID: 73982e209b0fe399edd5979ae14340f42387c4a8ef84f5c8a3e1b2a1a2d52266
                                                      • Instruction ID: dfaf242db9e307ae7a4d9dcecaae3b17137c057b399db3a07212c1353949e94c
                                                      • Opcode Fuzzy Hash: 73982e209b0fe399edd5979ae14340f42387c4a8ef84f5c8a3e1b2a1a2d52266
                                                      • Instruction Fuzzy Hash: AB3156A2A08A4781FB209B05EA942B5B3A2FB55784F884831D90DD37A4CF6EE549E741
                                                      APIs
                                                      • 00007FFDA46F19C0.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6341E4ABE), ref: 00007FF6341E48FE
                                                      • 00007FFDA46F19C0.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6341E4ABE), ref: 00007FF6341E4911
                                                      • 00007FFDA46F19C0.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6341E4ABE), ref: 00007FF6341E4929
                                                      • 00007FFDA46F19C0.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6341E4ABE), ref: 00007FF6341E4971
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$i >= 0 && i < Size$index >= 0$pad_left + line_width + pad_right == r->Width && y < r->Height$r->IsPacked()
                                                      • API String ID: 3568877910-458361149
                                                      • Opcode ID: c8c261c216b1aebd6a1147a5566a9e7cdbbc1a367a531d2b4b0594f3f14ed8bd
                                                      • Instruction ID: b9ec38365e8d4ef0ac657543d4bf1e3b85304090a6c33c1307a3a25389e9d71e
                                                      • Opcode Fuzzy Hash: c8c261c216b1aebd6a1147a5566a9e7cdbbc1a367a531d2b4b0594f3f14ed8bd
                                                      • Instruction Fuzzy Hash: 1B712322B04A5682E710CF2AE5C0279B3A1FF55B80F599235DA5CE3B91EF39E485E740
                                                      APIs
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001984C07722D
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0772AA
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0772C3
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001984C077303
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C077362
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C07737B
                                                      • _Min_value.LIBCPMTD ref: 000001984C0773B2
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0773CE
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0773E7
                                                      • _Max_value.LIBCPMTD ref: 000001984C07741E
                                                      • _Min_value.LIBCPMTD ref: 000001984C07743B
                                                        • Part of subcall function 000001984C07F190: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001984C07F1B5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Affinity::operator!=Concurrency::details::HardwareMin_value$Max_valueSchedulerScheduler::_
                                                      • String ID:
                                                      • API String ID: 2048856540-0
                                                      • Opcode ID: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                      • Instruction ID: a92b658dc974302ad7911728d8fbec34eca5aece28030aa2298581cc850d1fcc
                                                      • Opcode Fuzzy Hash: 34194c3b2c4dfd965ddaab666ebbea208bd56193119cc555b2f518073ecbe67a
                                                      • Instruction Fuzzy Hash: A202E87051CB898FDBB5EB18C494BEAB7E5FFA9300F40091E958EC3291DE749985CB42
                                                      APIs
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001984C076BDD
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C076C5A
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C076C73
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001984C076CB3
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C076D12
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C076D2B
                                                      • _Min_value.LIBCPMTD ref: 000001984C076D62
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C076D7E
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C076D97
                                                      • _Max_value.LIBCPMTD ref: 000001984C076DCE
                                                      • _Min_value.LIBCPMTD ref: 000001984C076DEB
                                                        • Part of subcall function 000001984C07F140: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001984C07F165
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_$CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Affinity::operator!=Concurrency::details::HardwareMin_value$Max_valueSchedulerScheduler::_
                                                      • String ID:
                                                      • API String ID: 2048856540-0
                                                      • Opcode ID: e866146c94e960af1540157134187f2a0fce7dbc0c02fbcd93b84c3e2d61bdcf
                                                      • Instruction ID: 532f0739cc32051cfeab70636ec9396406b12bf01125bcb0094096773f10ebf3
                                                      • Opcode Fuzzy Hash: e866146c94e960af1540157134187f2a0fce7dbc0c02fbcd93b84c3e2d61bdcf
                                                      • Instruction Fuzzy Hash: 3002EB7051CB898FDBB5EB18C494BEAB7E5FFA9300F40091E958EC3291DE749985CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 2527301759-0
                                                      • Opcode ID: 71ef438b1bb58b4182dc28e9ffd7d5b29104a32867a1bdd3a258c92d20c36c8b
                                                      • Instruction ID: 5214d6ed5d54539e82d0f8e7c33b1463a45a708d80a3d2fddedea1854b8e42cc
                                                      • Opcode Fuzzy Hash: 71ef438b1bb58b4182dc28e9ffd7d5b29104a32867a1bdd3a258c92d20c36c8b
                                                      • Instruction Fuzzy Hash: 28611B30A186568BE254EB2AD461BFAB7E9BF86384F410469F189C71E2DE68DC41C642
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imstb_truetype.h$z != 0$z->direction$z->ey >= scan_y_top
                                                      • API String ID: 3568877910-479673919
                                                      • Opcode ID: e149610815c08ba00997f1d10d723a0916004b896f75be6b846dc15072a962fc
                                                      • Instruction ID: b1bb9f1f4c3031c919a54f862b2d7125f69ae7c243c95d4ad2a358360bd8e852
                                                      • Opcode Fuzzy Hash: e149610815c08ba00997f1d10d723a0916004b896f75be6b846dc15072a962fc
                                                      • Instruction Fuzzy Hash: 5512C572908BC586D752CF39D1812B9B360FF59784F188322DA49E3764EF39E195DB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007$B222B22349F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$i >= 0 && i < Size$pack_context != 0$pack_rects[i].w == user_rects[i].Width && pack_rects[i].h == user_rects[i].Height$user_rects.Size >= 1
                                                      • API String ID: 1829533921-766226355
                                                      • Opcode ID: 99720b481de47cd2e397ca5066b90b715f8ed480d5172829108f3d4bda360445
                                                      • Instruction ID: 87d2ab8a356bc5e80d63443a26db6073c0ef03c991d934be3486e786df6e2740
                                                      • Opcode Fuzzy Hash: 99720b481de47cd2e397ca5066b90b715f8ed480d5172829108f3d4bda360445
                                                      • Instruction Fuzzy Hash: F0A1CF76A08A5282EB14CF15E5D01B8B3A0FB50B88F409136CE4ED7B65DF3EE586E740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$i >= 0 && i < Size$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table->MemoryCompacted == false
                                                      • API String ID: 2168931217-1783795845
                                                      • Opcode ID: 62f75428c15231a191c8b2183383776eb55f8038cf437fe52e0662faf8159130
                                                      • Instruction ID: 8d9b55988f9740149798e5bb5dd617330fd2b0437888c394f76cd61a04d4769b
                                                      • Opcode Fuzzy Hash: 62f75428c15231a191c8b2183383776eb55f8038cf437fe52e0662faf8159130
                                                      • Instruction Fuzzy Hash: 6C517F72A08A8686DB20CF15E8D42F8B7A5FB59B84F440136CA4DC7B64DF7ED185D340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Decorator::getTableTypeshared_ptr
                                                      • String ID: d
                                                      • API String ID: 143873753-2564639436
                                                      • Opcode ID: c039b2a57ee3c25890e16ac37221422253289d1338e6c294ba37e84ef54042e4
                                                      • Instruction ID: 32a4033e26e1c98e8d7b1accc9c124d8f772435a82209d5b2ea64ef2380d3c46
                                                      • Opcode Fuzzy Hash: c039b2a57ee3c25890e16ac37221422253289d1338e6c294ba37e84ef54042e4
                                                      • Instruction Fuzzy Hash: 01910030518B898FD794EB29C054BDABBE5FFDA340F54496EB089C32A2DF349945CB42
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Decorator::getTableTypeshared_ptr
                                                      • String ID: d
                                                      • API String ID: 143873753-2564639436
                                                      • Opcode ID: 9472d0e4b889f094a3cab1acffd77fe61c7aaf73f92bde8c9ff228181d57b494
                                                      • Instruction ID: d5e41288376e7a72406335b3676f51f8a1a2d281fc17e066d9eaca5878e7129c
                                                      • Opcode Fuzzy Hash: 9472d0e4b889f094a3cab1acffd77fe61c7aaf73f92bde8c9ff228181d57b494
                                                      • Instruction Fuzzy Hash: BC911F30518B898FD794EB29C055BDABBE5FFDA300F44096EB089C32A2DF349945CB02
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Decorator::getTableTypeshared_ptr
                                                      • String ID: d
                                                      • API String ID: 143873753-2564639436
                                                      • Opcode ID: 9036c0c1e63749c3bc76dfb6a94ead1f4178844c3cfab8ee976c09acc3f1cf2d
                                                      • Instruction ID: ae46ff8152b67613c3fc3a0810ef39ec190a714630552d6f64bf97ad1bdbeb82
                                                      • Opcode Fuzzy Hash: 9036c0c1e63749c3bc76dfb6a94ead1f4178844c3cfab8ee976c09acc3f1cf2d
                                                      • Instruction Fuzzy Hash: B39112305187858FE795EB29C4547DABBE5FFDA300F44096EB489C72A2DF349945CB02
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$char_traits
                                                      • String ID: $'
                                                      • API String ID: 2432257368-2481900351
                                                      • Opcode ID: 80be3a970e3a749e1926a631d758321b903abe1dc6e94d3da15c608f29041d81
                                                      • Instruction ID: be3456d2f56b31f63125b70028bebec1b3c05e65a01f279f3515bf98e86a1c67
                                                      • Opcode Fuzzy Hash: 80be3a970e3a749e1926a631d758321b903abe1dc6e94d3da15c608f29041d81
                                                      • Instruction Fuzzy Hash: ED513F31518B898FD3A5FB14D495BEAB7E5FFA9300F40495EA08DC31A2EF709945CB42
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: EventMouseTrack$ClientExtraInfoMessageScreen
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 3561655495-3890275027
                                                      • Opcode ID: 56b5d8c4c4cd4702416651cf8138708fd5936cd832d97e54c425377689c9d51c
                                                      • Instruction ID: 04e29f4708ce241e3760f102171073d9b99c2a2c4fb6cf24a75d7090b910b99e
                                                      • Opcode Fuzzy Hash: 56b5d8c4c4cd4702416651cf8138708fd5936cd832d97e54c425377689c9d51c
                                                      • Instruction Fuzzy Hash: 0161BE72E086428AF725CB65D9902BDB7E1FB44744F184136DE4AE3BA4CF7AE485D700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: __swprintf_l
                                                      • String ID: #Child$%s/%08X$%s/%s_%08X$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$id != 0
                                                      • API String ID: 1488884202-1586801193
                                                      • Opcode ID: 46a1a0c6a0e47ec31a009c470b2dafd8de949c046316960332f141e314256c12
                                                      • Instruction ID: 8a11ad80e6b24613e5c4666e0e8bacafeead8eb378079c5e316bdf84eb77ccd7
                                                      • Opcode Fuzzy Hash: 46a1a0c6a0e47ec31a009c470b2dafd8de949c046316960332f141e314256c12
                                                      • Instruction Fuzzy Hash: 2051BF32A08B8A96E755DF26D5802F9F7A0FB98784F04813ADA4DD3791DF3CA095E740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID:
                                                      • API String ID: 2168931217-0
                                                      • Opcode ID: f94a614454fe2cb526baa10b2cce888be569503d75c325dc1dce0eb86242048f
                                                      • Instruction ID: 2dcaa204daa70c6713653922efd78f07272a4527ab6367c4e401dc928e795696
                                                      • Opcode Fuzzy Hash: f94a614454fe2cb526baa10b2cce888be569503d75c325dc1dce0eb86242048f
                                                      • Instruction Fuzzy Hash: 5002387261999292DB4DEF64C5D50FCA375FB54B84B904232D60EC33A2EF28E66AD340
                                                      APIs
                                                      • 00007FFDB222F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6341B8442
                                                      • 00007FFDB222F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6341B84FA
                                                      • 00007FFDB222F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6341B858A
                                                        • Part of subcall function 00007FF6341B81E0: 00007FFDB222F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6341B8269
                                                        • Part of subcall function 00007FF6341B81E0: 00007FFDB222F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6341B82E9
                                                        • Part of subcall function 00007FF6341B81E0: 00007FFDB222F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6341B836A
                                                      • 00007FFDB222F020.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6341B8624
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$DrawList == &DrawListInst
                                                      • API String ID: 2168931217-20161693
                                                      • Opcode ID: 2d8ea6574ee6b8056d063ee5808aa292970097db89a4d7c438daa540352c4861
                                                      • Instruction ID: c460f0ff34f8bfcd9c1a8376735a1f8b9f317906054853e142b1bace0ccc1a30
                                                      • Opcode Fuzzy Hash: 2d8ea6574ee6b8056d063ee5808aa292970097db89a4d7c438daa540352c4861
                                                      • Instruction Fuzzy Hash: C671AD72609A9286C749EF24D4951FCB3B5FB08F84B588236CA0EC7365DF39D19AC340
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$Decorator::getTableTypebool_shared_ptr
                                                      • String ID:
                                                      • API String ID: 2413108386-0
                                                      • Opcode ID: 09bb8693cdd345d70ffcf971e1c493b358d70803e10c2bb5853e910151989129
                                                      • Instruction ID: 55c3e1005b138bf2e5aeed5cfda2a9d9cffd0a8e9627a1df64a3dad5fa41c7fc
                                                      • Opcode Fuzzy Hash: 09bb8693cdd345d70ffcf971e1c493b358d70803e10c2bb5853e910151989129
                                                      • Instruction Fuzzy Hash: 01F1133151CA898FE7A5EB18C4A4BDBB7E4FF9A340F50495AA08EC71A2DF70D944C742
                                                      APIs
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001984C05E0A3
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001984C05E0B7
                                                      • std::make_error_code.LIBCPMTD ref: 000001984C05E0D0
                                                      • std::make_error_code.LIBCPMTD ref: 000001984C05E132
                                                      • std::make_error_code.LIBCPMTD ref: 000001984C05E300
                                                        • Part of subcall function 000001984C006020: Concurrency::details::_ReaderWriterLock::_ReaderWriterLock.LIBCMTD ref: 000001984C00602E
                                                      • std::make_error_code.LIBCPMTD ref: 000001984C05E1B7
                                                        • Part of subcall function 000001984C008FE0: std::error_condition::error_condition.LIBCPMTD ref: 000001984C008FFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupReaderScheduleSegmentUnrealizedWriter$Concurrency::details::_LockLock::_std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 3233732842-0
                                                      • Opcode ID: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                      • Instruction ID: 4404ca3fc39c301c9e46b5d764b6871d6ab8f5cef2b0f0623f5bcc72e8b7bcfe
                                                      • Opcode Fuzzy Hash: 4de1addda922bb358011cb094d11cd136575d8eaefb607a23010c85f2e40a63c
                                                      • Instruction Fuzzy Hash: FAF1DC306187898FE7A4EB29C465BEAB7E5FFDA340F40485DA18DC3292DE749845CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Base::ContextIdentityQueueWork$Affinity::operator!=HardwareList
                                                      • String ID:
                                                      • API String ID: 2242293343-0
                                                      • Opcode ID: 0f09c845dda9b562757045dec8ee4d3361f5b6171332ab6d94f79fbde5fb3f63
                                                      • Instruction ID: cf5e75fd8a22b1c7fa1ddd69e7dce156fe095a934218e7c2b612541a625f91f6
                                                      • Opcode Fuzzy Hash: 0f09c845dda9b562757045dec8ee4d3361f5b6171332ab6d94f79fbde5fb3f63
                                                      • Instruction Fuzzy Hash: 19413030518A498FDB94EB68D465BDAB7E4FF99310F80491EA08AD3292DF74DD44CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: aeb162027570cbcb45857eaeecfccc621a0a56d2e3941c5bc9fa514a50d9ad9c
                                                      • Instruction ID: fbfff5c8f85bae3a743250197b66c3d9eef4a74773c576baae3bbd13b4d6b559
                                                      • Opcode Fuzzy Hash: aeb162027570cbcb45857eaeecfccc621a0a56d2e3941c5bc9fa514a50d9ad9c
                                                      • Instruction Fuzzy Hash: D5317B30A18B898FDA94EF6CC4657DAB7E6FFDA340F50495DA48DC3252DE309841C746
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007
                                                      • String ID: #MOVE$C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0
                                                      • API String ID: 3568877910-319756798
                                                      • Opcode ID: 1a6d229fed04ae4d5dda714486ca1b30204d476d261d5c16fdb784a5624f0de9
                                                      • Instruction ID: 2eff481ff7036602789a1c26a720a77a9dac73675d23788870d094c0c049a847
                                                      • Opcode Fuzzy Hash: 1a6d229fed04ae4d5dda714486ca1b30204d476d261d5c16fdb784a5624f0de9
                                                      • Instruction Fuzzy Hash: B8D14E32606BC19AD354CF29E9887ADB7A8F705F54FA94238C7A887390DF35E062C704
                                                      APIs
                                                      Strings
                                                      • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF6341E13DA
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF6341E13D3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                      • API String ID: 2168931217-3599239301
                                                      • Opcode ID: 25f72e3c8c282048cd647ec2fff06e31e0aedba023ac7ffc24038e7a7775b1cc
                                                      • Instruction ID: dd35b66c5405715baaa38cd899006a569ff798d1683f3abdf8ff7658ffcb729e
                                                      • Opcode Fuzzy Hash: 25f72e3c8c282048cd647ec2fff06e31e0aedba023ac7ffc24038e7a7775b1cc
                                                      • Instruction Fuzzy Hash: DE61A072A09A4682DB85DF24D1952BCF3B1FB14B84F548226DB0EC3764DF38D5AAC340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$C:\Users\55yar\Desktop\imgui-master\imgui_tables.cpp$column->SortOrder < table->SortSpecsCount$p >= Data && p < DataEnd
                                                      • API String ID: 2168931217-2291414753
                                                      • Opcode ID: d1a58ff65e67fce8a15b774c6dd96d30571278a3c59e6d05705c6449fc4a45af
                                                      • Instruction ID: 5966bfba062910958488bce5fa2bead9899d14c8404e083d5636be2eb8462eea
                                                      • Opcode Fuzzy Hash: d1a58ff65e67fce8a15b774c6dd96d30571278a3c59e6d05705c6449fc4a45af
                                                      • Instruction Fuzzy Hash: 8261CA36608A9296DB18CF29D9C42BCB7A0FB48B80F445136DB5DC3794EF39E5A6D340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007$B2238950$B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$filename && mode
                                                      • API String ID: 3196635630-1878659873
                                                      • Opcode ID: dfd827a4de5531acd64816ff24ecc87e1052e56cf3c43d14e41e907871dee9f7
                                                      • Instruction ID: 517a01f5bb82f85a0088cf20dc13df5b25ab3fad8aa8bbf5caf5a9e52e6ecb1b
                                                      • Opcode Fuzzy Hash: dfd827a4de5531acd64816ff24ecc87e1052e56cf3c43d14e41e907871dee9f7
                                                      • Instruction Fuzzy Hash: 8C41B121B09E5282EB58DF15A9D8179E3A0FF49B94F180235DA0ED77D4DF3DE48A9340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Capture$ExtraInfoMessage
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 2172523684-3890275027
                                                      • Opcode ID: e5ed3c2d33467ee866650776db45dde0e5327c93dae5451d5cdba795c5f28f26
                                                      • Instruction ID: 5a7c1b9f866f8b79516db245bb2d4e6c393ed8f7bc517554df264b0a071e56f7
                                                      • Opcode Fuzzy Hash: e5ed3c2d33467ee866650776db45dde0e5327c93dae5451d5cdba795c5f28f26
                                                      • Instruction Fuzzy Hash: 56210A76605A4286E711CF25D5542B9B3E0FB44BA8F800131DE1DD77A4DF3AE586D740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: printf
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$Size > 0$[%05d] $[%s] [%05d]
                                                      • API String ID: 3524737521-3476604433
                                                      • Opcode ID: 1f05ae7bfb494f84aad7026fd753fc4d603e48b965f2e09f5000b0581db317b5
                                                      • Instruction ID: 0670a03fb5f259a9b3c09cbbc214c71bcaacc5504869c0514d2eb9c04701bddc
                                                      • Opcode Fuzzy Hash: 1f05ae7bfb494f84aad7026fd753fc4d603e48b965f2e09f5000b0581db317b5
                                                      • Instruction Fuzzy Hash: F521DA72B08A4685EA209F12F8845BAE7A0FF45B84F444031EE4DE3326DF3CE584D740
                                                      APIs
                                                      Strings
                                                      • C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp, xrefs: 00007FF6341FFA84
                                                      • bd != nullptr && "No platform backend to shutdown, or already shutdown?", xrefs: 00007FF6341FFA8B
                                                      • GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?", xrefs: 00007FF6341FFAB1
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui.cpp, xrefs: 00007FF6341FFAAA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\backends\imgui_impl_win32.cpp$C:\Users\55yar\Desktop\imgui-master\imgui.cpp$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$bd != nullptr && "No platform backend to shutdown, or already shutdown?"
                                                      • API String ID: 3664257935-1332676508
                                                      • Opcode ID: bb86a6f7c7364d40ceef79f0e52fd7b12f9ff1b9120e67842a6bdd4e3ffcc0a4
                                                      • Instruction ID: 0db1226d12db69bd1ae94b49537be1a0549bcc7f0dc1661328d1f6d3c9ab038b
                                                      • Opcode Fuzzy Hash: bb86a6f7c7364d40ceef79f0e52fd7b12f9ff1b9120e67842a6bdd4e3ffcc0a4
                                                      • Instruction Fuzzy Hash: 83317E72A1AA52C2EB148F14E9D0678B3A0FF58B89F488136DA0DD37A5DF3DE456D340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: Capture$ExtraInfoMessageRelease
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 1767768705-3890275027
                                                      • Opcode ID: 0527ba3645a25572ded4bfe279cd1dbea92f4c5092a315049e297b2bad3063cb
                                                      • Instruction ID: 5b8fe33cf252e6d6e3783038bf7758958d63b628ff54614fa97cce05cd369b76
                                                      • Opcode Fuzzy Hash: 0527ba3645a25572ded4bfe279cd1dbea92f4c5092a315049e297b2bad3063cb
                                                      • Instruction Fuzzy Hash: 40210462A15A4386F7518B65D5602BAA6E1FB44BD4F440031CE0EEB7A4DF3FE4869700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$Base::ChoresConcurrency::details::Func_classGroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 831135708-0
                                                      • Opcode ID: 2b019b4e3f526854cc6463bb2731e43c27d4326d5903197f3522d122ad0e4905
                                                      • Instruction ID: 9bef7b8cf12c6784d0de9215b31879abe34c4272a9c23d8c7935e73313d6de8c
                                                      • Opcode Fuzzy Hash: 2b019b4e3f526854cc6463bb2731e43c27d4326d5903197f3522d122ad0e4905
                                                      • Instruction Fuzzy Hash: CEF13530A18B498FE7A5FB28C465BDEB3E5FF99300F90496AA04DC3292DE38D945C741
                                                      APIs
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001984C0427C5
                                                      • std::make_error_code.LIBCPMTD ref: 000001984C042810
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C042904
                                                      • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001984C042BB3
                                                        • Part of subcall function 000001984C04F6A0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001984C04F6CB
                                                      • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001984C042C8E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$Scheduler$ProcessorProxyRoot::Virtual$Base::ChoresConcurrency::details::_EmptyGroupQueue::ScheduleScheduler::_SegmentStructuredUnrealizedWorkstd::make_error_code
                                                      • String ID:
                                                      • API String ID: 1866601945-0
                                                      • Opcode ID: 78ae9953cbedf62042fc3d33d4decda1cf0a4d0c091af80d0bda17040aa99622
                                                      • Instruction ID: 1cbbb244766c1bbbdc6c0e0d6c4dd35c744d50cd08a145f8c52368f581b2def9
                                                      • Opcode Fuzzy Hash: 78ae9953cbedf62042fc3d33d4decda1cf0a4d0c091af80d0bda17040aa99622
                                                      • Instruction Fuzzy Hash: 4DF1D031618B498FE7A5EB28C455BEAB3E5FF99300F40496EA0CDC3292DE749945CB42
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cc1c347d2910cc0400b9c5d360fd704ec17404c1c8a9becaaf1b808fa4f3174e
                                                      • Instruction ID: 555c7ed7da5a11975144e3db38797d0b8f1d96c8da2bd24b6a816d2c314d9dbd
                                                      • Opcode Fuzzy Hash: cc1c347d2910cc0400b9c5d360fd704ec17404c1c8a9becaaf1b808fa4f3174e
                                                      • Instruction Fuzzy Hash: B8B1DE3451CA898FDBA4EB18C095FAAB7E5FF9D344F50495EA08EC7261DB70D881CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: fpos
                                                      • String ID:
                                                      • API String ID: 1083263101-0
                                                      • Opcode ID: 6a66e7cf8dba913559191b32390491cef5c931f42b95be3e289b6306e1102091
                                                      • Instruction ID: ed6ad82e1ab693808ed57584257f3fef5d180eda13a417afa1d9fc659addde0b
                                                      • Opcode Fuzzy Hash: 6a66e7cf8dba913559191b32390491cef5c931f42b95be3e289b6306e1102091
                                                      • Instruction Fuzzy Hash: 85B1FD3061CB898FE7A4EB18C465BAAB7E5FF9A355F54091DE48AC3290DB34DC44CB06
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 1851498522-0
                                                      • Opcode ID: 5030b6f4d4358b935513f3764e1def77f0374254cb11d93097da90f9fbad4d41
                                                      • Instruction ID: eef9baf64a30feb775bd2c8bf0b7573ff351c801b2627757ea0edc50c55e36e2
                                                      • Opcode Fuzzy Hash: 5030b6f4d4358b935513f3764e1def77f0374254cb11d93097da90f9fbad4d41
                                                      • Instruction Fuzzy Hash: 3CA14531618B4A8BE765EF24C461BEFB7E5FF96350F400A19A08AC31E1DE74D945CB82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 2527301759-0
                                                      • Opcode ID: ebabad4b59d44e2f68d9d46900ea2437acbb56d7763c223535eb91f3e8692582
                                                      • Instruction ID: 0b7cfaf8c555fcecc96c6441f40706e3bb74be0f17e58da9bd585cd57602bee4
                                                      • Opcode Fuzzy Hash: ebabad4b59d44e2f68d9d46900ea2437acbb56d7763c223535eb91f3e8692582
                                                      • Instruction Fuzzy Hash: D4914E31518B898BE365EF24D4A1BEFB7E5FFD5300F80491EA08AC31A2DE749945CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mailbox
                                                      • String ID:
                                                      • API String ID: 1763892119-0
                                                      • Opcode ID: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                      • Instruction ID: 11b1588ccc4e14c8145019b4d1b981bc296bd3ed256d6f2006cdbab47f0ad441
                                                      • Opcode Fuzzy Hash: 06a3ff207c22bb6f37366860b149ab3668e7e4d9713726df24d0a8770affc0a8
                                                      • Instruction Fuzzy Hash: A361543151CB8C8FD765EA28C064BEBB7E1FBA9341F440A1EA48AD3291DE71D945C742
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_SchedulerScheduler::_$std::error_condition::error_condition$std::bad_exception::bad_exception
                                                      • String ID:
                                                      • API String ID: 3801495819-0
                                                      • Opcode ID: f3d1858459e0af94582484c269b498f47c4f8567e9ef1adb0021aa434c7c7154
                                                      • Instruction ID: 2de07bf28c473f050dce921444e62d836e21e217a2f718ffd509411fc2f2846c
                                                      • Opcode Fuzzy Hash: f3d1858459e0af94582484c269b498f47c4f8567e9ef1adb0021aa434c7c7154
                                                      • Instruction Fuzzy Hash: 2D611534A18B498FD7A4EB68C494BDAB7E1FF99310F408959E089C32A2DF74D845CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork__crt_scoped_stack_ptr$Decorator::getTableTypeshared_ptr
                                                      • String ID:
                                                      • API String ID: 2480882750-0
                                                      • Opcode ID: 91d403a99b0aa0b9c84ca8b623b580e6659b45cf93c11dcecb02eb8a3e2d9174
                                                      • Instruction ID: 0867081f81cf0a6a95739e4b4a7844fc75fcf6a897d47278547cd7a829e4e963
                                                      • Opcode Fuzzy Hash: 91d403a99b0aa0b9c84ca8b623b580e6659b45cf93c11dcecb02eb8a3e2d9174
                                                      • Instruction Fuzzy Hash: 7561D870918B898FE7A4EB68C495B9AB7E1FF99340F50491EA48DC3261DF34D885CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork__crt_scoped_stack_ptr$Decorator::getTableTypeshared_ptr
                                                      • String ID:
                                                      • API String ID: 2480882750-0
                                                      • Opcode ID: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                      • Instruction ID: 049c0331deebb0291ec0b9b9cce1ec8bfb67d446d5ea23b0e0382749445b5022
                                                      • Opcode Fuzzy Hash: f2ef7a86016f0f96fb29ac205b938adafa905e91da66757f72e9247496227554
                                                      • Instruction Fuzzy Hash: 4261D870918B498FEBA4EB68C495B9AB7E1FF99340F50491EA48DC3261DF34D885CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$00007B222F020
                                                      • String ID:
                                                      • API String ID: 4227552958-0
                                                      • Opcode ID: 21f894aa74984226e49f1d60ee564dfdb117387d38206500d62480f7b6c39a3b
                                                      • Instruction ID: 3113656ba8d66083d8f9308a11db0e8cdba6106a0287cd2f4376eeaff4c75fe9
                                                      • Opcode Fuzzy Hash: 21f894aa74984226e49f1d60ee564dfdb117387d38206500d62480f7b6c39a3b
                                                      • Instruction Fuzzy Hash: D541D172608E4183D324EF16F9941A9B7A1FB48BD4F088236DE4D93B94DF3CC59A8700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                      • Instruction ID: d790f6146ab03b7273567d45faba4ea3f1103a9e3aa66867bccccbddc3f29559
                                                      • Opcode Fuzzy Hash: 1289f65bedd4f753d9bc64e073d9728bff9e2b420633cab40bd45a22262cb7c2
                                                      • Instruction Fuzzy Hash: 4F217830A18B898FDAA4FB6CC46579AB7E5FF99340F90495DA08DC3252DE309845C746
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::make_error_code$std::error_condition::error_conditiontype_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 2306575402-0
                                                      • Opcode ID: a32136fa3a3c95708d011456afc3b85815d78c4fd3309404f318db35ddc1acc6
                                                      • Instruction ID: 2ff5854ae16048919e47eb845cfde06469bf0e4888906fec4a445b727eef66cf
                                                      • Opcode Fuzzy Hash: a32136fa3a3c95708d011456afc3b85815d78c4fd3309404f318db35ddc1acc6
                                                      • Instruction Fuzzy Hash: CE215330A18B4A8BE745EB64D461BEEB7E6FFC5340F404919A085C72E2DE34D941DB91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: shared_ptr$allocator$Affinity::operator!=Concurrency::details::Hardware
                                                      • String ID:
                                                      • API String ID: 1053258265-0
                                                      • Opcode ID: d0542d8c5f8c00544737d49b6b181d538de8c3696277a9840e8cef3017e38d50
                                                      • Instruction ID: ebc2cf9b6939c0fb775886a5629b28606a78aa0da6b73157dc1f7e376ee3aef4
                                                      • Opcode Fuzzy Hash: d0542d8c5f8c00544737d49b6b181d538de8c3696277a9840e8cef3017e38d50
                                                      • Instruction Fuzzy Hash: EF110A30918B498FD6A0EF28C4557EBB7E5FFD9350F404A5EA48DD32A2DF3099458B82
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$char_traits
                                                      • String ID:
                                                      • API String ID: 2432257368-3916222277
                                                      • Opcode ID: 484fa9ed5a09ce3c1aba4d5e140585cca91a770afe66fd64d1cb6647b4050987
                                                      • Instruction ID: 0f71b1744625ff782c502abc0a66591197428f6b8cb0a0223ac81e62544441f0
                                                      • Opcode Fuzzy Hash: 484fa9ed5a09ce3c1aba4d5e140585cca91a770afe66fd64d1cb6647b4050987
                                                      • Instruction Fuzzy Hash: 96C1BD32518B498BE765EB28C465BDFB7E1FF99304F404A1AA08EC3191EE34D545CB46
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C04374F
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C0437BB
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C043815
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID: e
                                                      • API String ID: 1865873047-4024072794
                                                      • Opcode ID: 6d00e0167f8e6f836205d1563a8a38a28a10db6f67d0a951b36e1e151ae0e7ba
                                                      • Instruction ID: 456138ff2a6eff4bfeca84ceb0d2911dc1a1bd8aac5d2676dc4c539b6ddf0a69
                                                      • Opcode Fuzzy Hash: 6d00e0167f8e6f836205d1563a8a38a28a10db6f67d0a951b36e1e151ae0e7ba
                                                      • Instruction Fuzzy Hash: 3161EC30A1CA898FE794EB68C495BDAB7E4FF99301F50191DE18AC72A1DB74D841CB06
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_internal.h$p < end()$p >= begin() && p < end()
                                                      • API String ID: 2168931217-1901453082
                                                      • Opcode ID: 2e13f9060a8b3c594e93300032d554e25245ec9294c29f8af1e03daf2fe537dc
                                                      • Instruction ID: bfb0f6b6084299cf0f9ae96753387d1045abd09cbf499d399bac2c52582464ba
                                                      • Opcode Fuzzy Hash: 2e13f9060a8b3c594e93300032d554e25245ec9294c29f8af1e03daf2fe537dc
                                                      • Instruction Fuzzy Hash: 2C81ADB2B09A4296EB288F14EAD82B8F7A1FB04B85F485135CA0DC7754EF3CE595D304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiUnicodeWideWindow
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$Ctx != 0
                                                      • API String ID: 3417139564-3890275027
                                                      • Opcode ID: 209bfdbab78ec921e6c6e0e02f910ef59687700a5ea740a5dff3d48987ec466a
                                                      • Instruction ID: a5b091bc5ed9db7d963948005e56819d12e1f3d0def81301a53c6c7670c4dbdd
                                                      • Opcode Fuzzy Hash: 209bfdbab78ec921e6c6e0e02f910ef59687700a5ea740a5dff3d48987ec466a
                                                      • Instruction Fuzzy Hash: E051D522F0865286E765CF24C9A02B9A3E1FF44B48F484136CE4DD7B99DF3ED8429310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                      • API String ID: 2168931217-3599239301
                                                      • Opcode ID: 6fb84a0008613fc9e451bc84090f232af98be13056d41ae15d4a5a2dbfb217a0
                                                      • Instruction ID: c44f676e29d3bf6d752707a677217b05bcfcfa9bbe463d33c6ae9cc13344c71a
                                                      • Opcode Fuzzy Hash: 6fb84a0008613fc9e451bc84090f232af98be13056d41ae15d4a5a2dbfb217a0
                                                      • Instruction Fuzzy Hash: BA51BBB2A08A9282EB04EF14E4940BCF3B4FB59B84B554232CA4EC3751DF39D59AD740
                                                      APIs
                                                      Strings
                                                      • !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!", xrefs: 00007FF6341E1640
                                                      • C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp, xrefs: 00007FF6341E1639
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp
                                                      • API String ID: 2168931217-3599239301
                                                      • Opcode ID: 949da079233bebc451fdb1efe9aea4bc1086646359ae301130959504423949a1
                                                      • Instruction ID: f15a091551e1ea91ce651a21fa223a5c3cd3d125da585176cf1a9c19a58bf47c
                                                      • Opcode Fuzzy Hash: 949da079233bebc451fdb1efe9aea4bc1086646359ae301130959504423949a1
                                                      • Instruction Fuzzy Hash: 94319F73A09A5286D785DF28D5D51B8B3B5FB18B84B545222CA0EC3364DF39D59AC340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$std::error_condition::error_condition
                                                      • String ID: }
                                                      • API String ID: 2527301759-4239843852
                                                      • Opcode ID: be98c45c2635ea1b7c099d9ee1afc8aab728c4e80a3655f5ac3be0dc2360b2bb
                                                      • Instruction ID: c5342a2e4e4cec0358a6fd439c94d54b5fb0e47da7f7208c8e3d75b2b1639035
                                                      • Opcode Fuzzy Hash: be98c45c2635ea1b7c099d9ee1afc8aab728c4e80a3655f5ac3be0dc2360b2bb
                                                      • Instruction Fuzzy Hash: 0C211F30918A868FE354DF69D4607EABBE5FFCA384F50492DF189C31A1DA74C981C742
                                                      APIs
                                                        • Part of subcall function 000001984BFFA170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFFA18D
                                                        • Part of subcall function 000001984BFFA110: char_traits.LIBCPMTD ref: 000001984BFFA13D
                                                      • type_info::_name_internal_method.LIBCMTD ref: 000001984C0B7A04
                                                        • Part of subcall function 000001984C0D8720: type_info::_name_internal_method.LIBCMTD ref: 000001984C0D87C0
                                                        • Part of subcall function 000001984C0D8720: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C0D8826
                                                        • Part of subcall function 000001984C0D8720: CreateFileA.KERNEL32 ref: 000001984C0D8852
                                                      • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 000001984C0B7AD4
                                                        • Part of subcall function 000001984BFF5180: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF5217
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::$EmptyQueue::StructuredWork$type_info::_name_internal_method$Affinity::operator!=CreateFileHardwarechar_traits
                                                      • String ID:
                                                      • API String ID: 2370075206-0
                                                      • Opcode ID: 1f487b4aeb608b8a4dfac91ae8869fd11e70220961075daf7be05e6e981b2d01
                                                      • Instruction ID: 139949b1fdaf2612eaffb844ed858380f0e5d79961cc4ce5ca739167983c22b6
                                                      • Opcode Fuzzy Hash: 1f487b4aeb608b8a4dfac91ae8869fd11e70220961075daf7be05e6e981b2d01
                                                      • Instruction Fuzzy Hash: EF023631518A498BE365FB64C465BEFB7E1FF95300F50496FA08EC31A2EE30A945CB46
                                                      APIs
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001984C053951
                                                        • Part of subcall function 000001984C022880: _Ptr_base.LIBCMTD ref: 000001984C022893
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Base::ChoresConcurrency::details::GroupPtr_baseScheduleSegmentUnrealized
                                                      • String ID:
                                                      • API String ID: 3333744592-0
                                                      • Opcode ID: 43246c57ab7ed1ba35076143cb962eb288d03bf794c1c98135cbade81599b407
                                                      • Instruction ID: 4bdbb0fa466e3f7a3ff13d4a325869fa24e586c3c5fda70675ae5506ef5816da
                                                      • Opcode Fuzzy Hash: 43246c57ab7ed1ba35076143cb962eb288d03bf794c1c98135cbade81599b407
                                                      • Instruction Fuzzy Hash: 52F11E31518B8D8FE7B5EB18C495BDBB3E5FF99300F40492AA48EC3291DE749985CB42
                                                      APIs
                                                      • Concurrency::details::ScheduleGroupSegmentBase::HasUnrealizedChores.LIBCMTD ref: 000001984C045917
                                                      • std::make_error_code.LIBCPMTD ref: 000001984C045992
                                                      • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001984C045B1C
                                                        • Part of subcall function 000001984C04F870: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001984C04F8CD
                                                        • Part of subcall function 000001984C04F870: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001984C04F8E4
                                                      • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001984C045CAB
                                                        • Part of subcall function 000001984C026BC0: char_traits.LIBCPMTD ref: 000001984C026BE0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Scheduler$Concurrency::details::$Concurrency::details::_ProcessorProxyRoot::Scheduler::_Virtual$Base::ChoresGroupScheduleSegmentUnrealizedchar_traitsstd::make_error_code
                                                      • String ID:
                                                      • API String ID: 3113402709-0
                                                      • Opcode ID: e2d3ee74bc8f1c16197933b13d06f8bb0aa28bf4c35c2e9712a17edbc610efea
                                                      • Instruction ID: 0a095e8f44cb85885369f20e3e73fdb53a744c7b3e39f663a3b2f34a03909b95
                                                      • Opcode Fuzzy Hash: e2d3ee74bc8f1c16197933b13d06f8bb0aa28bf4c35c2e9712a17edbc610efea
                                                      • Instruction Fuzzy Hash: CDC1E031518B4D8FE7A5EB28C465BEBB7E5FFA9300F40092E948DC3291DE749945CB42
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C002CA2
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C002E63
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C002E78
                                                        • Part of subcall function 000001984BFFB170: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFFB17E
                                                        • Part of subcall function 000001984BFFB170: _Max_value.LIBCPMTD ref: 000001984BFFB1A3
                                                        • Part of subcall function 000001984BFFB170: _Min_value.LIBCPMTD ref: 000001984BFFB1D1
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C002FB7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_value
                                                      • String ID:
                                                      • API String ID: 348937374-0
                                                      • Opcode ID: 46c4db4a0ba23410846ec0059871a6f14c2db6919ad8fb743b4dd0f0e277dc33
                                                      • Instruction ID: 091b1747890d43d62c796363eb4094ac1ffd4ab1ea553357ea2010cd55fc79fc
                                                      • Opcode Fuzzy Hash: 46c4db4a0ba23410846ec0059871a6f14c2db6919ad8fb743b4dd0f0e277dc33
                                                      • Instruction Fuzzy Hash: CAD1AD3161CB898FD7A4EB18C455BAEB7E1FFA9341F40495EA08DC3261DA70D981CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 246976077-0
                                                      • Opcode ID: a6d0406ee275fc0a278201952968efdbde7828aa1727d589354d824e6bc233d3
                                                      • Instruction ID: 5095b2ea1de49196e071aa2dc53d6b929be8f34df5075b2a565a0f1bd5372c08
                                                      • Opcode Fuzzy Hash: a6d0406ee275fc0a278201952968efdbde7828aa1727d589354d824e6bc233d3
                                                      • Instruction Fuzzy Hash: F8C14830618B498FE7A5EB28C465BDBB7E4FF99350F50092DA08AC32A1DF75D941CB42
                                                      APIs
                                                      • UnDecorator::getVbTableType.LIBCMTD ref: 000001984C061564
                                                        • Part of subcall function 000001984C0350A0: char_traits.LIBCPMTD ref: 000001984C0350C1
                                                      • Concurrency::details::VirtualProcessorRoot::GetSchedulerProxy.LIBCMTD ref: 000001984C0615C1
                                                        • Part of subcall function 000001984C06A0F0: Concurrency::details::_Scheduler::_Scheduler.LIBCMTD ref: 000001984C06A112
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Scheduler$Concurrency::details::Concurrency::details::_Decorator::getProcessorProxyRoot::Scheduler::_TableTypeVirtualchar_traits
                                                      • String ID:
                                                      • API String ID: 1673230147-0
                                                      • Opcode ID: cfb114ce81b8242a8138127994242184d9f7b02dc7cc79d7158feec11a0593a8
                                                      • Instruction ID: 92bbc02947d03c96a82a9b1dd6b76e72e7257394ddfa9aab76a12f05e8440fea
                                                      • Opcode Fuzzy Hash: cfb114ce81b8242a8138127994242184d9f7b02dc7cc79d7158feec11a0593a8
                                                      • Instruction Fuzzy Hash: D9C1AA70518B898FE7A4EF18C495BDAB7E5FFA9304F50492E908DC3261DF749984CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$Base::ChoresConcurrency::details::GroupScheduleSegmentUnrealizedstd::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 1046759889-0
                                                      • Opcode ID: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                      • Instruction ID: 5826bdb4fa739f6046765235d03fba5648eb95ecc448d95e0fe7aeb4b202fae6
                                                      • Opcode Fuzzy Hash: 28292fa4d794b396cedd1ba8fdc4833dcd5acff12edfc6de44ad94c6088fe729
                                                      • Instruction Fuzzy Hash: A3B1AA30618B898FD7A4EB28C465BEEB7E5FFD9301F50495EA08DC3292DE709845CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::make_error_code$std::error_condition::error_condition
                                                      • String ID:
                                                      • API String ID: 2527301759-0
                                                      • Opcode ID: 914871444acda03db8c397575b484ba356f5dbd6d30ab43649a56d47f3854115
                                                      • Instruction ID: 20cd6539003387f6a77f26d82cbb963bb27623a1f64a5dbac98b480f455817d6
                                                      • Opcode Fuzzy Hash: 914871444acda03db8c397575b484ba356f5dbd6d30ab43649a56d47f3854115
                                                      • Instruction Fuzzy Hash: 26810430518B998FE3A5EB18C461BEEB7E5FF95300F50496EE08DC32A2DE709845CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: fpos
                                                      • String ID:
                                                      • API String ID: 1083263101-0
                                                      • Opcode ID: 6482d30fa890008c781780ebb765b1d214955e0675561b79e15b2cde454a484b
                                                      • Instruction ID: fa19cce217b2adae3f4127e00b0646b8003e7900c3b32d41d9e4b45f053013c4
                                                      • Opcode Fuzzy Hash: 6482d30fa890008c781780ebb765b1d214955e0675561b79e15b2cde454a484b
                                                      • Instruction Fuzzy Hash: 64810A3091CB858FE7A4EB28C465BAABBE4FF99341F54091DB499C32A1DB74DC40CB06
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 1927102706-0
                                                      • Opcode ID: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                      • Instruction ID: 78f7bbb05191b0fe5e53d9cbd8c058f1cccd7a19d833e7a6706d94c716150b1b
                                                      • Opcode Fuzzy Hash: 31633297509520c3cf38a8ab650ddf2738620efd7f833d6bc15245c323a4a252
                                                      • Instruction Fuzzy Hash: 9971D37065CB898FE7A5EF28C495BEAB3E5FF99300F804919A08DC3291DE74D842D742
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Affinity::operator!=Concurrency::details::Hardwaretype_info::_name_internal_method
                                                      • String ID:
                                                      • API String ID: 1927102706-0
                                                      • Opcode ID: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                      • Instruction ID: 7413336a46f02000fb071982588750dfe98b86b3940b4f975d2f29dddd126de6
                                                      • Opcode Fuzzy Hash: 99a6b33ae6862e60c4063bc95135201a3c42c6b25746548689089e28a85fb9b4
                                                      • Instruction Fuzzy Hash: A771FF7061CA899FE7A5EF18C4A5BEAB3E5FF99300F404819E08DC3292DE74D945CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID:
                                                      • API String ID: 2168931217-0
                                                      • Opcode ID: e68efa2831d778e4f34f330c17ca88291312f669d56948be7ecc4bde90aff0f3
                                                      • Instruction ID: 89bb70f02d8b4f4c3f056d712eef1e6c234400ff5a5e1a7a6b4d584d4c9a1115
                                                      • Opcode Fuzzy Hash: e68efa2831d778e4f34f330c17ca88291312f669d56948be7ecc4bde90aff0f3
                                                      • Instruction Fuzzy Hash: D0517E7361AA5686CB89DF28D1950BCB3B5FB58B84B548223CA0EC3355DF39D59BC340
                                                      APIs
                                                        • Part of subcall function 000001984C0CE760: _Byte_length.LIBCPMTD ref: 000001984C0CE7CE
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0CE5E5
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0CE60E
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0CE645
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984C0CE66E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Byte_length
                                                      • String ID:
                                                      • API String ID: 1141060839-0
                                                      • Opcode ID: 73401877cca2df4d9d6e09be458f0decb97a0093fc0ac4ecf507f84a65ce1821
                                                      • Instruction ID: 32c6bfa1d8ac9005699b1bdc106ea2a4f5805bd0d26937ad948ad84234ede8c9
                                                      • Opcode Fuzzy Hash: 73401877cca2df4d9d6e09be458f0decb97a0093fc0ac4ecf507f84a65ce1821
                                                      • Instruction Fuzzy Hash: A341D031518B498FE754EB18C465BEEB7E1FF99341F50492EA08DC3261DF30A985CB42
                                                      APIs
                                                      • type_info::_name_internal_method.LIBCMTD ref: 000001984C07D48B
                                                        • Part of subcall function 000001984C0476A0: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 000001984C0476B8
                                                      • type_info::_name_internal_method.LIBCMTD ref: 000001984C07D4AA
                                                        • Part of subcall function 000001984C070D30: Concurrency::details::FreeThreadProxyFactory::Retire.LIBCMTD ref: 000001984C070D48
                                                      • type_info::_name_internal_method.LIBCMTD ref: 000001984C07D4C9
                                                      • type_info::_name_internal_method.LIBCMTD ref: 000001984C07D4E8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: 6ae970fd7b6ecd4af07a3924a38ebf6e4c6a300736612a1d38c72f7b099ca0b1
                                                      • Instruction ID: 0063488a296dbececf094b5a4f3589d55b726dc82cf04368160075d37c1ef2e4
                                                      • Opcode Fuzzy Hash: 6ae970fd7b6ecd4af07a3924a38ebf6e4c6a300736612a1d38c72f7b099ca0b1
                                                      • Instruction Fuzzy Hash: FC119E30A18B498FDA94EB6CC4557DEBBE5FFD9340F50495DA089C3262DE30D845CB46
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                      • Instruction ID: f26834052f999b02198f4e47abfdd1a8d79e9c0ca5decce1fc80a57a5225686f
                                                      • Opcode Fuzzy Hash: cb956ee21f3a3aaa3678e7144402df0106a8d44125415de00697684bfe6ddcac
                                                      • Instruction Fuzzy Hash: 5F11BD30A18B498FD694EB2CC4557DABBE5FFD9340F904D5DA089C3262DE30D841CB42
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: type_info::_name_internal_method$Concurrency::details::Factory::FreeProxyRetireThread
                                                      • String ID:
                                                      • API String ID: 1588182640-0
                                                      • Opcode ID: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                      • Instruction ID: 069d2eb9453b70d268a1fae36c91bd48e28963d67c4cec312a920cd58515e41d
                                                      • Opcode Fuzzy Hash: 5ebaa40a4f578ec32dc140cd4265ac4d15574f18a09faa97c36fcb5168890ab8
                                                      • Instruction Fuzzy Hash: 3F118830A18B898FE694EB2CC45579ABBE6FFD9340F904D5DA489C3262DE309845CB46
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Func_class
                                                      • String ID:
                                                      • API String ID: 1670654298-0
                                                      • Opcode ID: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                      • Instruction ID: cea6e479e913cb8aae0a9edad21045bdb3158b78f44ae5bfddf91e4b13d53a7f
                                                      • Opcode Fuzzy Hash: 38473aa2b5a61d29b27f22a10d69b211cbe67f00fd19cdafc6ac81fe98dbe0f4
                                                      • Instruction Fuzzy Hash: BE11CE30A18A094FE684EB1CC4957AAB7E5FF9A341F804969B589C32B1DF21EC41C741
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C04EF0A
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C04EF1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID:
                                                      • API String ID: 1865873047-0
                                                      • Opcode ID: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                      • Instruction ID: 8bb7868c182b40b9de5dcc723ca2f0293a106db2f72550d9308830db44b0b8ac
                                                      • Opcode Fuzzy Hash: 71fea77b140ac0a4f1f8b75e0cd4dc0f508e3249f89da8f2dac7ae33cd6ace0c
                                                      • Instruction Fuzzy Hash: 26012930935F9A5BE3D4DB29C4A43DAB5DAFF89300F80092DA099C32E1CEB5D8408706
                                                      APIs
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C04EFAA
                                                      • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984C04EFBE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork
                                                      • String ID:
                                                      • API String ID: 1865873047-0
                                                      • Opcode ID: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                      • Instruction ID: 56a3be7318a5fcf0468899aa71b4668a782af12899cbd7b366786b8a0eefeb67
                                                      • Opcode Fuzzy Hash: 569c5ed67f06eeb5af1f4773db352e515aab386c18c1098d96fcece9d538aa53
                                                      • Instruction Fuzzy Hash: 3F012930534E6E4BE3D4DB29C4647EAB5D6FF8A340FD0092EB155C32A1CAB5D4408706
                                                      APIs
                                                        • Part of subcall function 000001984BFF5360: _WChar_traits.LIBCPMTD ref: 000001984BFF538D
                                                        • Part of subcall function 000001984BFF4740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF476C
                                                        • Part of subcall function 000001984BFF4740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF477E
                                                        • Part of subcall function 000001984BFF4740: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 000001984BFF47BB
                                                        • Part of subcall function 000001984BFF4850: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984BFF48B8
                                                      • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 000001984BFF412A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::EmptyQueue::StructuredWork$Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Char_traits
                                                      • String ID: $X
                                                      • API String ID: 1626164810-1398056850
                                                      • Opcode ID: da34108681e6cb996675731457550fc137bc86ebf3564906fc77d927d8b33079
                                                      • Instruction ID: 062a221e907c59478762e48d768a4e1f4eaac82114901417db2ccb96cb1eb27a
                                                      • Opcode Fuzzy Hash: da34108681e6cb996675731457550fc137bc86ebf3564906fc77d927d8b33079
                                                      • Instruction Fuzzy Hash: D6D19871618B888FD7A4EF28C4997DEB7E1FB99301F50492EA48DC3261DF749885CB42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$"
                                                      • API String ID: 0-3758156766
                                                      • Opcode ID: 8fdaf1600544622fd33f728529cb6508d7889566d47cbe218040ba2ee86dacff
                                                      • Instruction ID: 5b1359b92a389f35e02af4649827b1b1800fa96b40a0a5274c927e03e70ff977
                                                      • Opcode Fuzzy Hash: 8fdaf1600544622fd33f728529cb6508d7889566d47cbe218040ba2ee86dacff
                                                      • Instruction Fuzzy Hash: 4271DA3151CB899BD795EB18C4A1FDBB7E5FFA9344F404A19B08AC31A1DE30DA45CB82
                                                      APIs
                                                      • std::error_condition::error_condition.LIBCPMTD ref: 000001984C014CEA
                                                        • Part of subcall function 000001984C0101A0: Concurrency::details::VirtualProcessor::ClaimTicket::InitializeTicket.LIBCMTD ref: 000001984C0101BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4005142779.000001984BFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001984BFF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1984bff0000_solara-executor.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClaimConcurrency::details::InitializeProcessor::TicketTicket::Virtualstd::error_condition::error_condition
                                                      • String ID: @$@
                                                      • API String ID: 2004282921-149943524
                                                      • Opcode ID: 9950cd689140dd32029c8ba334a83ce130f8fc6c6ba909f7c99662a502cc7da8
                                                      • Instruction ID: bda4c35b91ce28ed4ccb8f46aa67a948448100f8fd5883e73b1663a417552c2b
                                                      • Opcode Fuzzy Hash: 9950cd689140dd32029c8ba334a83ce130f8fc6c6ba909f7c99662a502cc7da8
                                                      • Instruction Fuzzy Hash: 3851C270909785CFEBA4EF58C494BDAF7E4FB96305F10092DE18AC3290DF7299448B06
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B224
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui_draw.cpp$max_error > 0.0f
                                                      • API String ID: 685457636-3636960062
                                                      • Opcode ID: a1e7d619fba98255bbb59b74f2aa783b82d974d6421d94029452daf7382b12b9
                                                      • Instruction ID: 1ba16554de38f0355cae1cfafdd8b7a20618a59cb2b171bb85f8a49c18a0a454
                                                      • Opcode Fuzzy Hash: a1e7d619fba98255bbb59b74f2aa783b82d974d6421d94029452daf7382b12b9
                                                      • Instruction Fuzzy Hash: 1C61A872D18BC985E3128F3680812B9F790EF59744F1CC736EA49B6365DF69B4C29B10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.cpp$g.SettingsWindows.empty()
                                                      • API String ID: 2168931217-1747592857
                                                      • Opcode ID: 5fcca6ab54b0025e594ec8bc263e215ec36465dfda948e98fee39a4306cf2aa2
                                                      • Instruction ID: 670d508f9a3ed9e06fa1b5a162fa693ddbf2ede5f49e415fd727e95cf241c3e3
                                                      • Opcode Fuzzy Hash: 5fcca6ab54b0025e594ec8bc263e215ec36465dfda948e98fee39a4306cf2aa2
                                                      • Instruction Fuzzy Hash: B541CE72A09A8282EB44DF21A1981B8B7A1FF49B88F588136EA4DC3749DF3DE045D740
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 2168931217-1817040388
                                                      • Opcode ID: 62ab15f237ae12dd1f2f720af39e278684e74126654c7f3b00041a021f926d09
                                                      • Instruction ID: 83920694f8d5d17f25c7b2db4867b708c12dd0a202edc72a4e28b12303e92fae
                                                      • Opcode Fuzzy Hash: 62ab15f237ae12dd1f2f720af39e278684e74126654c7f3b00041a021f926d09
                                                      • Instruction Fuzzy Hash: 8A41DD72A08A8282EB14DF24E5D01B9F3B4FF54B84B544232DA5DC37A0DF39E4A6D340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 2168931217-1817040388
                                                      • Opcode ID: 9589bf8728c09f5c901920cbf28053feb88018c1b016dbdcb7ec8812433a96cc
                                                      • Instruction ID: 33b91f6d78e05f078d7bd981b4aad204d5d5fe5d9068f8d64ec8924d05007786
                                                      • Opcode Fuzzy Hash: 9589bf8728c09f5c901920cbf28053feb88018c1b016dbdcb7ec8812433a96cc
                                                      • Instruction Fuzzy Hash: 5141CC72A08E9282D7049F24E4901B8F3B4FB55B88B544232DA5EC33A4DF3DE996D340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B222F020
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 2168931217-1817040388
                                                      • Opcode ID: ab78d67b3827ca981ba7196448e1a9a9ce10ad8f11ce5b15fb4adaa829971505
                                                      • Instruction ID: 153002aafe84f868bdefe791fcf80e3faf1ff85ab3970648214ef1827968c4ee
                                                      • Opcode Fuzzy Hash: ab78d67b3827ca981ba7196448e1a9a9ce10ad8f11ce5b15fb4adaa829971505
                                                      • Instruction Fuzzy Hash: EA31ACB2A08A5682DB08CF24E4D01B8F3A1FF45B88B504136DA4DC37A8DF39E596C700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B22349
                                                      • String ID: C:\Users\55yar\Desktop\imgui-master\imgui.h$i >= 0 && i < Size
                                                      • API String ID: 3967229990-1817040388
                                                      • Opcode ID: fae55c63b829811270316bffbfd4df00558370b4b6ef951384af4ae9f73947b3
                                                      • Instruction ID: 227fa1bf3b9b5515bf8b9b6a1905e08663a64a0cab0efd4d0e916ffa95f1df6c
                                                      • Opcode Fuzzy Hash: fae55c63b829811270316bffbfd4df00558370b4b6ef951384af4ae9f73947b3
                                                      • Instruction Fuzzy Hash: 14217131B18A9689EB648B55E4806BEA760FB85B84F485135DA8EC7F58CF3DF481D700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: 00007B4322
                                                      • String ID: $@
                                                      • API String ID: 3479818561-1077428164
                                                      • Opcode ID: 53b76e4c7360ced8355a90c1ba8cca2d8cf467df60d04d43bb1f796f4f86dbcd
                                                      • Instruction ID: 35e20cdfc0a0192d6f56a3f4d43eb54f67b85c2da424a8e7f6f0f86ebfc9e9a1
                                                      • Opcode Fuzzy Hash: 53b76e4c7360ced8355a90c1ba8cca2d8cf467df60d04d43bb1f796f4f86dbcd
                                                      • Instruction Fuzzy Hash: 39111CB291878187D725CF21F19416AF3A2FB89B94F144225EB8997B18DF7CE984CF00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4009987562.00007FF6341B1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6341B0000, based on PE: true
                                                      • Associated: 00000000.00000002.4009951023.00007FF6341B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6344DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF634641000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4009987562.00007FF6347E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010475709.00007FF6347E1000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4010509461.00007FF6347E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6341b0000_solara-executor.jbxd
                                                      Similarity
                                                      • API ID: AcquireExclusiveLock
                                                      • String ID: 0
                                                      • API String ID: 4021432409-4108050209
                                                      • Opcode ID: cf7cbb83cca8a80d1d98c2b66fbe41bdafea271a0637fe929e97ce8d2696cf3d
                                                      • Instruction ID: 88c7e34cd653f4f4c7aa0bc59f654625399176c122b190f9cbeb6b1729db1d25
                                                      • Opcode Fuzzy Hash: cf7cbb83cca8a80d1d98c2b66fbe41bdafea271a0637fe929e97ce8d2696cf3d
                                                      • Instruction Fuzzy Hash: 70014B71A18942C2FB208F65E9E4638B7A0EF19725F401231CA2ED23E6DF3DA585E700