Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
awg.exe

Overview

General Information

Sample name:awg.exe
Analysis ID:1532545
MD5:6f6e6d9de9a73f3d631647fc7d11896a
SHA1:cb3d2905dab453fabfbdc45b8ad29ae949976bbc
SHA256:83e87f0785fcff3c76b18178cb0dad18693e5de192eec095c3eeb15c97f9c0b4
Tags:exeuser-Bacn
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to communicate with device drivers
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • awg.exe (PID: 6840 cmdline: "C:\Users\user\Desktop\awg.exe" MD5: 6F6E6D9DE9A73F3D631647FC7D11896A)
    • conhost.exe (PID: 4040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: awg.exeVirustotal: Detection: 12%Perma Link
Source: awg.exeStatic PE information: certificate valid
Source: awg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D404C30 SetupDiGetClassDevsExW,SetupDiEnumDeviceInfo,GetLastError,GetLastError,SetupDiEnumDeviceInfo,WideCharToMultiByte,malloc,WideCharToMultiByte,strlen,free,realloc,memcpy,_errno,free,SetupDiEnumDeviceInfo,GetLastError,calloc,free,SetupDiDestroyDeviceInfoList,FindFirstFileA,memcpy,FindNextFileA,memcmp,strlen,realloc,_errno,_errno,_errno,_errno,_errno,FindClose,_errno,_errno,_errno,free,0_2_00007FF73D404C30
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D406500 FindFirstFileA,FindNextFileA,strcmp,FindNextFileA,FindClose,strcmp,0_2_00007FF73D406500
Source: awg.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: awg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: awg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: awg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
Source: awg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
Source: awg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: awg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: awg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
Source: awg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
Source: awg.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: awg.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: awg.exeString found in binary or memory: https://git.zx2c4.com/wireguard-tools/
Source: awg.exeString found in binary or memory: https://sectigo.com/CPS0
Source: awg.exeString found in binary or memory: https://www.wireguard.com/D
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D406C50: fwrite,fwrite,strchr,fwrite,fputc,fflush,strlen,strchr,strcmp,strtoll,_errno,_errno,_errno,_errno,_errno,calloc,free,fclose,_errno,fwrite,DeviceIoControl,_errno,_errno,free,CloseHandle,0_2_00007FF73D406C50
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D404C300_2_00007FF73D404C30
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D406C500_2_00007FF73D406C50
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D4027100_2_00007FF73D402710
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D4052A00_2_00007FF73D4052A0
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D3F511B0_2_00007FF73D3F511B
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D4067500_2_00007FF73D406750
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D4047B00_2_00007FF73D4047B0
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D4029D00_2_00007FF73D4029D0
Source: C:\Users\user\Desktop\awg.exeCode function: String function: 00007FF73D40C760 appears 47 times
Source: awg.exe, 00000000.00000000.1747520957.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewg.exe4 vs awg.exe
Source: awg.exeBinary or memory string: OriginalFilenamewg.exe4 vs awg.exe
Source: classification engineClassification label: mal48.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4040:120:WilError_03
Source: awg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\awg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: awg.exeVirustotal: Detection: 12%
Source: awg.exeString found in binary or memory: You may pass `--help' to any of these subcommands to view usage.
Source: awg.exeString found in binary or memory: You may pass `--help' to any of these subcommands to view usage.
Source: awg.exeString found in binary or memory: --help
Source: awg.exeString found in binary or memory: --help
Source: awg.exeString found in binary or memory: You may pass `--help' to any of these subcommands to view usage.
Source: awg.exeString found in binary or memory: You may pass `--help' to any of these subcommands to view usage.
Source: awg.exeString found in binary or memory: You may pass `--help' to any of these subcommands to view usage.
Source: awg.exeString found in binary or memory: You may pass `--help' to any of these subcommands to view usage.
Source: awg.exeString found in binary or memory: --help
Source: awg.exeString found in binary or memory: --help
Source: awg.exeString found in binary or memory: interfaces%s%c-h--helphelpUsage: %s %s { <interface> | all | interfaces } [public-key | private-key | listen-port | fwmark | peers | preshared-keys | endpoints | allowed-ips | latest-handshakes | transfer | persistent-keepalive | dump]
Source: awg.exeString found in binary or memory: interfaces%s%c-h--helphelpUsage: %s %s { <interface> | all | interfaces } [public-key | private-key | listen-port | fwmark | peers | preshared-keys | endpoints | allowed-ips | latest-handshakes | transfer | persistent-keepalive | dump]
Source: unknownProcess created: C:\Users\user\Desktop\awg.exe "C:\Users\user\Desktop\awg.exe"
Source: C:\Users\user\Desktop\awg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\awg.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\awg.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\awg.exeSection loaded: kernel.appcore.dllJump to behavior
Source: awg.exeStatic PE information: certificate valid
Source: awg.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: awg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: awg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: awg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: awg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: awg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: awg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: awg.exeStatic PE information: section name: .00cfg
Source: C:\Users\user\Desktop\awg.exeAPI coverage: 5.2 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D404C30 SetupDiGetClassDevsExW,SetupDiEnumDeviceInfo,GetLastError,GetLastError,SetupDiEnumDeviceInfo,WideCharToMultiByte,malloc,WideCharToMultiByte,strlen,free,realloc,memcpy,_errno,free,SetupDiEnumDeviceInfo,GetLastError,calloc,free,SetupDiDestroyDeviceInfoList,FindFirstFileA,memcpy,FindNextFileA,memcmp,strlen,realloc,_errno,_errno,_errno,_errno,_errno,FindClose,_errno,_errno,_errno,free,0_2_00007FF73D404C30
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D406500 FindFirstFileA,FindNextFileA,strcmp,FindNextFileA,FindClose,strcmp,0_2_00007FF73D406500
Source: awg.exe, 00000000.00000003.1748799407.000002B0ADB9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\awg.exeCode function: 0_2_00007FF73D3F1160 Sleep,Sleep,_initterm,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,malloc,strlen,malloc,memcpy,_cexit,0_2_00007FF73D3F1160
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532545 Sample: awg.exe Startdate: 13/10/2024 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 awg.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       
SourceDetectionScannerLabelLink
awg.exe8%ReversingLabsWin64.Trojan.Generic
awg.exe12%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl00%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#0%URL Reputationsafe
https://git.zx2c4.com/wireguard-tools/0%VirustotalBrowse
https://www.wireguard.com/D1%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#awg.exefalse
  • URL Reputation: safe
unknown
https://git.zx2c4.com/wireguard-tools/awg.exefalseunknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0awg.exefalse
  • URL Reputation: safe
unknown
https://sectigo.com/CPS0awg.exefalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#awg.exefalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#awg.exefalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yawg.exefalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0awg.exefalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0awg.exefalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zawg.exefalse
  • URL Reputation: safe
unknown
https://www.wireguard.com/Dawg.exefalseunknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#awg.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532545
Start date and time:2024-10-13 16:31:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:awg.exe
Detection:MAL
Classification:mal48.winEXE@2/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 7
  • Number of non-executed functions: 42
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):6.431183509532422
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:awg.exe
File size:150'680 bytes
MD5:6f6e6d9de9a73f3d631647fc7d11896a
SHA1:cb3d2905dab453fabfbdc45b8ad29ae949976bbc
SHA256:83e87f0785fcff3c76b18178cb0dad18693e5de192eec095c3eeb15c97f9c0b4
SHA512:a02120a8fb7b278fc4f69ab97e826fb4180d9974b6d1d6c00123e5829eaecb3b07c60bb981197e236b4bebf9c5ab87291fff4a8d3da72869077300e768676990
SSDEEP:3072:9i/PHaRDZTTCRqsTyLTzjaVqCtohz6y71BWIalU7N:AnYTeTyLTzjaVqCGhz9JalU7N
TLSH:FBE30B0BE9C262D4C5A7C5B42359F233B972F86D7B35B6DB576592302930FD0AE38A40
File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...q4.f.........."..........\......P..........@.....................................#....`........................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x140001350
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66C63471 [Wed Aug 21 18:39:45 2024 UTC]
TLS Callbacks:0x40001530, 0x1, 0x400015b0, 0x1
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:7def3fbd02e6f4f0081aae7641a547b5
Signature Valid:true
Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 31/08/2023 01:00:00 31/08/2026 00:59:59
Subject Chain
  • CN=Privacy Technologies OU, O=Privacy Technologies OU, S=Harjumaa, C=EE
Version:3
Thumbprint MD5:AD1BCBF19AE2F91BB114D33B85359E56
Thumbprint SHA-1:141D90A1BA8F61863FBEDDF7DD1D66C1D1E0B128
Thumbprint SHA-256:A08EA2A7A257AD690B988446951E9DEF2986A2F3F546B6F0902805330F3B6B48
Serial:00D0461B529F67189D43744E9CEFE172AE
Instruction
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [0001BCC5h]
mov dword ptr [eax], 00000000h
call 00007FB284F92E3Fh
nop
nop
nop
dec eax
add esp, 28h
ret
nop
dec eax
sub esp, 28h
call 00007FB284F93C6Ch
xor ecx, ecx
dec eax
cmp eax, 01h
sbb ecx, ecx
mov eax, ecx
dec eax
add esp, 28h
ret
nop dword ptr [eax+eax+00000000h]
ret
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push esi
dec eax
sub esp, 20h
call 00007FB284F93D7Bh
dec eax
lea esi, dword ptr [0002026Fh]
inc ecx
mov eax, 00000401h
dec eax
mov ecx, esi
dec eax
mov edx, eax
call 00007FB284FAE563h
dec eax
mov eax, esi
dec eax
add esp, 20h
pop esi
ret
int3
int3
int3
int3
int3
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [0001FC25h]
dec eax
mov eax, dword ptr [eax]
dec eax
test eax, eax
je 00007FB284F93070h
nop word ptr [eax+eax+00000000h]
call dword ptr [00028C12h]
dec eax
mov eax, dword ptr [0001FC03h]
dec eax
lea ecx, dword ptr [eax+08h]
dec eax
mov dword ptr [0001FBF8h], ecx
dec eax
mov eax, dword ptr [eax+08h]
dec eax
test eax, eax
jne 00007FB284F93021h
dec eax
add esp, 28h
ret
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1f4980x12c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x8a8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x290000x624.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x21e000x2e98.data
IMAGE_DIRECTORY_ENTRY_BASERELOC0x2d0000x100.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1d0a00x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1d7c80x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1f9d80x410.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x1f1780x80.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1bdbb0x1be00a2f8af44e5261edede4c11db7822d285False0.47768357623318386data6.270110420481931IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x1d0000x3de40x3e00eb2a314aeac41242d97743149ac491a1False0.36869959677419356PEX Binary Archive5.352877407751686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x210000x774d0x6005dde4bc96fe9eb6055bb627ecb1654b9False0.13671875data1.2805865374318068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x290000x6240x8006ddbf780ddd31e303f6d02d0d161dc25False0.43212890625data4.09793289405079IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.00cfg0x2a0000x100x2009f36838304c57bf8e644a22f2e9696e3False0.04296875data0.1458906856521067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x2b0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x2c0000x8a80xa00ca19f5e959e7ee14e8fe4f565105c50eFalse0.386328125data4.235704734464346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x2d0000x1000x200592a4e63dd7e08e0a1e5d8997aa84a71False0.40625data3.0614071490397508IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x2c4d00x3d4data0.4816326530612245
RT_MANIFEST0x2c0a00x42fXML 1.0 document, ASCII text0.43137254901960786
DLLImport
ntdll.dllRtlGetNtVersionNumbers
api-ms-win-crt-convert-l1-1-0.dllmbrtowc, strtoll, strtoul, strtoull, wcrtomb, wcstombs
api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, _putenv, getenv
api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _lock_file, _unlock_file
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _fdopen
api-ms-win-crt-private-l1-1-0.dll__C_specific_handler, memcmp, memcpy, strchr, strrchr
api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, __p___wargv, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, perror, signal, strerror
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, _fileno, _isatty, _open_osfhandle, fclose, feof, ferror, fflush, fgetc, fopen, fputc, fputs, fread, ftell, fwrite, getc, putchar, puts
api-ms-win-crt-string-l1-1-0.dll_strdup, _stricmp, _strnicmp, memset, strcmp, strcspn, strlen, strncmp, strncpy, wcslen
api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _time64, _tzset
api-ms-win-crt-utility-l1-1-0.dllqsort
KERNEL32.dllCloseHandle, CreateFileA, CreateFileW, DeleteCriticalSection, DeviceIoControl, EnterCriticalSection, FindClose, FindFirstFileA, FindNextFileA, FormatMessageW, FreeLibrary, GetConsoleMode, GetLastError, GetProcAddress, GetStdHandle, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LocalAlloc, LocalFree, RaiseException, SetConsoleMode, SetDefaultDllDirectories, SetDllDirectoryA, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WideCharToMultiByte
api-ms-win-crt-locale-l1-1-0.dlllocaleconv
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:10:32:04
Start date:13/10/2024
Path:C:\Users\user\Desktop\awg.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\awg.exe"
Imagebase:0x7ff73d3f0000
File size:150'680 bytes
MD5 hash:6F6E6D9DE9A73F3D631647FC7D11896A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:10:32:04
Start date:13/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:17.4%
    Total number of Nodes:1782
    Total number of Limit Nodes:11
    execution_graph 6712 7ff73d3f2264 6713 7ff73d3f2271 EnterCriticalSection 6712->6713 6714 7ff73d3f2378 6712->6714 6715 7ff73d3f236b LeaveCriticalSection 6713->6715 6720 7ff73d3f228e 6713->6720 6716 7ff73d3f23d2 6714->6716 6718 7ff73d3f23a1 DeleteCriticalSection 6714->6718 6719 7ff73d3f2390 free 6714->6719 6715->6714 6717 7ff73d3f22ad TlsGetValue GetLastError 6717->6720 6718->6716 6719->6718 6719->6719 6720->6715 6720->6717 6721 7ff73d3f2060 6722 7ff73d3f2074 __tzname __timezone __daylight 6721->6722 7481 7ff73d3f1be0 7482 7ff73d3f1bff 7481->7482 7483 7ff73d3f1c25 7482->7483 7484 7ff73d3f1c9c 7482->7484 7487 7ff73d3f1c85 7482->7487 7483->7487 7489 7ff73d3f1ce2 signal 7483->7489 7485 7ff73d3f1ca3 signal 7484->7485 7484->7487 7486 7ff73d3f1cb4 7485->7486 7485->7487 7486->7487 7488 7ff73d3f1cba signal 7486->7488 7488->7487 7489->7487 7490 7ff73d409ef0 memcmp 7491 7ff73d409f11 7490->7491 7492 7ff73d3f54dc 7493 7ff73d3f5534 7492->7493 7494 7ff73d3f4e70 6 API calls 7493->7494 7495 7ff73d3f5539 7494->7495 7496 7ff73d3f6660 6 API calls 7495->7496 7499 7ff73d3f56f5 7495->7499 7503 7ff73d3f593b 7495->7503 7529 7ff73d3f5708 7495->7529 7496->7503 7497 7ff73d3f5adb 7500 7ff73d3f6660 6 API calls 7497->7500 7498 7ff73d3f5ac0 7498->7497 7504 7ff73d3f6860 15 API calls 7498->7504 7501 7ff73d3f6480 5 API calls 7499->7501 7505 7ff73d3f5ae8 7500->7505 7506 7ff73d3f5faa 7501->7506 7502 7ff73d3f6480 5 API calls 7513 7ff73d3f5f62 7502->7513 7503->7497 7503->7498 7507 7ff73d3f6860 15 API calls 7503->7507 7504->7497 7509 7ff73d3f6860 15 API calls 7505->7509 7512 7ff73d3f5af9 7505->7512 7508 7ff73d3f5aa3 7507->7508 7511 7ff73d3f6720 7 API calls 7508->7511 7509->7512 7510 7ff73d3f5f79 7514 7ff73d3f6480 5 API calls 7510->7514 7515 7ff73d3f5ab1 7511->7515 7516 7ff73d3f5b63 7512->7516 7519 7ff73d3f6ab0 9 API calls 7512->7519 7513->7499 7513->7510 7517 7ff73d3f6480 5 API calls 7513->7517 7514->7499 7518 7ff73d3f6480 5 API calls 7515->7518 7520 7ff73d3f6ab0 9 API calls 7516->7520 7522 7ff73d3f5b76 7516->7522 7517->7510 7518->7498 7519->7516 7520->7522 7521 7ff73d3f5ba0 7523 7ff73d3f5c0b 7521->7523 7524 7ff73d3f5bb1 7521->7524 7522->7521 7528 7ff73d3f64e0 9 API calls 7522->7528 7525 7ff73d3f5c16 7523->7525 7539 7ff73d3f5eda 7523->7539 7526 7ff73d3f64e0 9 API calls 7524->7526 7524->7529 7527 7ff73d3f5c32 7525->7527 7530 7ff73d3f6ab0 9 API calls 7525->7530 7526->7529 7535 7ff73d3f62e0 6 API calls 7527->7535 7550 7ff73d3f5cef 7527->7550 7531 7ff73d3f5c65 7528->7531 7529->7499 7529->7502 7549 7ff73d3f5e49 7529->7549 7530->7527 7532 7ff73d3f5ec3 7531->7532 7533 7ff73d3f5c73 7531->7533 7532->7524 7532->7539 7534 7ff73d3f64e0 9 API calls 7533->7534 7537 7ff73d3f5c83 7534->7537 7538 7ff73d3f5cc0 memcpy 7535->7538 7536 7ff73d3f64e0 9 API calls 7536->7539 7537->7524 7537->7525 7540 7ff73d3f6ab0 9 API calls 7538->7540 7539->7536 7542 7ff73d3f5eb6 7539->7542 7540->7550 7541 7ff73d3f6ab0 9 API calls 7541->7542 7542->7541 7542->7549 7543 7ff73d3f6cd0 8 API calls 7543->7550 7544 7ff73d3f6480 5 API calls 7544->7550 7545 7ff73d3f5e1d 7546 7ff73d3f5edf 7545->7546 7552 7ff73d3f5e35 7545->7552 7547 7ff73d3f6ab0 9 API calls 7546->7547 7546->7549 7547->7549 7548 7ff73d3f64e0 9 API calls 7548->7550 7550->7529 7550->7542 7550->7543 7550->7544 7550->7545 7550->7548 7550->7549 7551 7ff73d3f64e0 9 API calls 7551->7552 7552->7549 7552->7551 7557 7ff73d3f2cda 7558 7ff73d3f2ce5 7557->7558 7562 7ff73d3f31ed 7558->7562 7563 7ff73d3f2d83 7558->7563 7559 7ff73d3f3520 3 API calls 7560 7ff73d3f32f9 7559->7560 7562->7560 7564 7ff73d3f48d0 7562->7564 7563->7559 7565 7ff73d3f48ee 7564->7565 7568 7ff73d3f4b30 7565->7568 7571 7ff73d3f4b24 fputc 7565->7571 7566 7ff73d3f4b6c 7569 7ff73d3f4bf3 7566->7569 7570 7ff73d3f4bfd fputc 7566->7570 7567 7ff73d3f4bcf fputc 7567->7566 7568->7566 7568->7567 7572 7ff73d3f4c39 fputc 7569->7572 7574 7ff73d3f4c31 7569->7574 7570->7569 7571->7565 7572->7574 7573 7ff73d3f4cfd 7575 7ff73d3f4d33 7573->7575 7579 7ff73d3f4cf0 fputc 7573->7579 7578 7ff73d3f4dea fputc 7574->7578 7580 7ff73d3f4c5a 7574->7580 7576 7ff73d3f4d54 7575->7576 7577 7ff73d3f4d60 fputc 7575->7577 7582 7ff73d3f3660 4 API calls 7576->7582 7577->7576 7578->7574 7579->7573 7580->7573 7581 7ff73d3f3380 5 API calls 7580->7581 7583 7ff73d3f4750 6 API calls 7580->7583 7584 7ff73d3f4ce0 fputc 7580->7584 7581->7580 7585 7ff73d3f4d9b 7582->7585 7583->7580 7584->7580 7585->7560 6044 7ff73d40ccd9 6045 7ff73d40cce5 6044->6045 6048 7ff73d3f7320 6045->6048 6049 7ff73d3f7385 RaiseException 6048->6049 6050 7ff73d3f73af 6048->6050 6056 7ff73d3f7415 6049->6056 6051 7ff73d3f7569 LoadLibraryA 6050->6051 6052 7ff73d3f742d 6050->6052 6050->6056 6066 7ff73d3f8060 6050->6066 6054 7ff73d3f757c 6051->6054 6055 7ff73d3f75ca GetLastError 6051->6055 6053 7ff73d3f7492 GetProcAddress 6052->6053 6052->6056 6053->6056 6058 7ff73d3f74a8 GetLastError 6053->6058 6059 7ff73d3f75bc FreeLibrary 6054->6059 6060 7ff73d3f7588 6054->6060 6061 7ff73d3f75fb RaiseException 6054->6061 6055->6054 6055->6061 6062 7ff73d3f74c1 6058->6062 6063 7ff73d3f74d9 RaiseException 6058->6063 6059->6055 6060->6052 6064 7ff73d3f7592 LocalAlloc 6060->6064 6061->6056 6062->6056 6062->6063 6063->6056 6064->6052 6067 7ff73d3f7561 6066->6067 6068 7ff73d3f8069 LoadLibraryExA 6066->6068 6067->6051 6067->6054 6068->6067 6069 7ff73d3f8080 abort 6068->6069 6069->6067 6727 7ff73d3f2974 6729 7ff73d3f28d0 6727->6729 6728 7ff73d3f3360 6729->6728 6730 7ff73d3f30ab fputc 6729->6730 6730->6729 6731 7ff73d3f2c6c 6732 7ff73d3f2c77 6731->6732 6733 7ff73d3f2c95 6732->6733 6734 7ff73d3f31bb fputc 6732->6734 6734->6733 7598 7ff73d3f2de9 7599 7ff73d3f2df4 7598->7599 7602 7ff73d3f3c70 7599->7602 7603 7ff73d3f3c85 7602->7603 7604 7ff73d3f3ce9 7603->7604 7607 7ff73d3f3ccf 7603->7607 7605 7ff73d3f4070 23 API calls 7604->7605 7606 7ff73d3f3cf4 7605->7606 7609 7ff73d3f4f30 5 API calls 7606->7609 7608 7ff73d3f3520 3 API calls 7607->7608 7608->7606 7610 7ff73d3f3033 7609->7610 6739 7ff73d3f2e67 strerror 6740 7ff73d3f31d1 strlen 6739->6740 6741 7ff73d3f2e8b 6739->6741 6740->6741 6744 7ff73d3f3520 6741->6744 6745 7ff73d3f35a9 6744->6745 6746 7ff73d3f3555 6744->6746 6749 7ff73d3f35af 6745->6749 6750 7ff73d3f3605 fputc 6745->6750 6746->6745 6747 7ff73d3f359d fputc 6746->6747 6747->6746 6748 7ff73d3f31e5 6749->6748 6751 7ff73d3f3645 fputc 6749->6751 6750->6745 6751->6749 7611 7ff73d3f2be8 7612 7ff73d3f2bf7 7611->7612 7613 7ff73d3f3660 4 API calls 7612->7613 7614 7ff73d3f3272 7613->7614 6752 7ff73d3f1883 6754 7ff73d3f176e 6752->6754 6753 7ff73d3f1923 6756 7ff73d3f1b10 __acrt_iob_func 6753->6756 6754->6752 6754->6753 6755 7ff73d3f1906 6754->6755 6757 7ff73d3f1944 6754->6757 6758 7ff73d3f17df 6754->6758 6762 7ff73d3f17b9 VirtualProtect 6754->6762 6759 7ff73d3f1970 5 API calls 6755->6759 6756->6757 6760 7ff73d3f1b10 __acrt_iob_func 6757->6760 6759->6753 6761 7ff73d3f1957 6760->6761 6763 7ff73d3f1b10 __acrt_iob_func 6761->6763 6762->6754 6764 7ff73d3f1967 6763->6764 7615 7ff73d404b00 7616 7ff73d404b14 _fstat64 7615->7616 7617 7ff73d404bc2 __acrt_iob_func 7615->7617 7620 7ff73d404b29 7616->7620 7621 7ff73d404b6c 7616->7621 7627 7ff73d404c00 7617->7627 7619 7ff73d404bdf 7620->7621 7622 7ff73d404b47 __acrt_iob_func fwrite 7620->7622 7623 7ff73d404b7f strcmp 7621->7623 7624 7ff73d404bed perror 7621->7624 7622->7621 7625 7ff73d404b92 7623->7625 7624->7619 7626 7ff73d404bb6 puts 7625->7626 7626->7619 7628 7ff73d3f1d90 fputc 7627->7628 7629 7ff73d404c24 7628->7629 7629->7619 7630 7ff73d3f7900 7631 7ff73d3f7927 7630->7631 7632 7ff73d3f7a44 7630->7632 7631->7632 7633 7ff73d3f7320 11 API calls 7631->7633 7633->7631 7638 7ff73d3f1000 7639 7ff73d3f108b _set_app_type __p__fmode __p__commode 7638->7639 7642 7ff73d3f1040 7638->7642 7640 7ff73d3f10cd 7639->7640 7641 7ff73d3f10e5 7640->7641 7644 7ff73d3f1bd0 7640->7644 7642->7639 7645 7ff73d40c910 __setusermatherr 7644->7645 7646 7ff73d3f22fe 7647 7ff73d3f23d2 7646->7647 7648 7ff73d3f230b EnterCriticalSection 7646->7648 7649 7ff73d3f23c5 LeaveCriticalSection 7648->7649 7651 7ff73d3f2328 7648->7651 7649->7647 7650 7ff73d3f2349 TlsGetValue GetLastError 7650->7651 7651->7649 7651->7650 6773 7ff73d3f547b 6833 7ff73d3f4e70 6773->6833 6777 7ff73d3f5adb 6781 7ff73d3f6660 6 API calls 6777->6781 6778 7ff73d3f5708 6783 7ff73d3f6480 5 API calls 6778->6783 6792 7ff73d3f56f5 6778->6792 6829 7ff73d3f5e49 6778->6829 6779 7ff73d3f593b 6779->6777 6780 7ff73d3f5ac0 6779->6780 6844 7ff73d3f6860 6779->6844 6780->6777 6784 7ff73d3f6860 15 API calls 6780->6784 6785 7ff73d3f5ae8 6781->6785 6782 7ff73d3f6480 5 API calls 6786 7ff73d3f5faa 6782->6786 6794 7ff73d3f5f62 6783->6794 6784->6777 6789 7ff73d3f6860 15 API calls 6785->6789 6793 7ff73d3f5af9 6785->6793 6789->6793 6790 7ff73d3f5f79 6795 7ff73d3f6480 5 API calls 6790->6795 6792->6782 6797 7ff73d3f5b63 6793->6797 6873 7ff73d3f6ab0 6793->6873 6794->6790 6794->6792 6798 7ff73d3f6480 5 API calls 6794->6798 6795->6792 6801 7ff73d3f6ab0 9 API calls 6797->6801 6803 7ff73d3f5b76 6797->6803 6798->6790 6801->6803 6802 7ff73d3f5ba0 6804 7ff73d3f5c0b 6802->6804 6805 7ff73d3f5bb1 6802->6805 6803->6802 6809 7ff73d3f64e0 9 API calls 6803->6809 6806 7ff73d3f5c16 6804->6806 6819 7ff73d3f5eda 6804->6819 6805->6778 6885 7ff73d3f64e0 6805->6885 6808 7ff73d3f5c32 6806->6808 6810 7ff73d3f6ab0 9 API calls 6806->6810 6827 7ff73d3f5cef 6808->6827 6896 7ff73d3f62e0 6808->6896 6811 7ff73d3f5c65 6809->6811 6810->6808 6812 7ff73d3f5ec3 6811->6812 6813 7ff73d3f5c73 6811->6813 6812->6805 6812->6819 6814 7ff73d3f64e0 9 API calls 6813->6814 6817 7ff73d3f5c83 6814->6817 6816 7ff73d3f64e0 9 API calls 6816->6819 6817->6805 6817->6806 6819->6816 6822 7ff73d3f5eb6 6819->6822 6820 7ff73d3f6ab0 9 API calls 6820->6827 6821 7ff73d3f6ab0 9 API calls 6821->6822 6822->6821 6822->6829 6824 7ff73d3f6480 5 API calls 6824->6827 6825 7ff73d3f5e1d 6826 7ff73d3f5edf 6825->6826 6832 7ff73d3f5e35 6825->6832 6828 7ff73d3f6ab0 9 API calls 6826->6828 6826->6829 6827->6778 6827->6822 6827->6824 6827->6825 6827->6829 6831 7ff73d3f64e0 9 API calls 6827->6831 6903 7ff73d3f6cd0 6827->6903 6828->6829 6830 7ff73d3f64e0 9 API calls 6830->6832 6831->6827 6832->6829 6832->6830 6834 7ff73d3f4e7c 6833->6834 6835 7ff73d3f62e0 6 API calls 6834->6835 6836 7ff73d3f4ea6 6835->6836 6836->6778 6836->6779 6836->6792 6837 7ff73d3f6660 6836->6837 6914 7ff73d3f63d0 6837->6914 6840 7ff73d3f668e LeaveCriticalSection 6841 7ff73d3f669b 6840->6841 6841->6779 6842 7ff73d3f667b 6842->6840 6842->6841 6843 7ff73d3f66e8 malloc 6843->6841 6843->6842 6845 7ff73d3f687b 6844->6845 6847 7ff73d3f6892 6844->6847 6846 7ff73d3f64e0 9 API calls 6845->6846 6846->6847 6848 7ff73d3f63d0 4 API calls 6847->6848 6849 7ff73d3f5aa3 6847->6849 6860 7ff73d3f6907 6847->6860 6850 7ff73d3f68c4 6848->6850 6862 7ff73d3f6720 6849->6862 6851 7ff73d3f63d0 4 API calls 6850->6851 6850->6860 6853 7ff73d3f68d7 6851->6853 6852 7ff73d3f6933 LeaveCriticalSection 6852->6860 6854 7ff73d3f68e7 6853->6854 6855 7ff73d3f6a4f malloc 6853->6855 6857 7ff73d3f68fa LeaveCriticalSection 6854->6857 6854->6860 6855->6849 6855->6854 6856 7ff73d3f69aa free 6856->6860 6857->6860 6858 7ff73d3f63d0 InitializeCriticalSection InitializeCriticalSection Sleep EnterCriticalSection 6858->6860 6859 7ff73d3f6720 7 API calls 6859->6860 6860->6849 6860->6852 6860->6856 6860->6858 6860->6859 6861 7ff73d3f69d3 LeaveCriticalSection 6860->6861 6861->6860 6863 7ff73d3f62e0 6 API calls 6862->6863 6864 7ff73d3f6760 6863->6864 6865 7ff73d3f6775 memset 6864->6865 6866 7ff73d3f5ab1 6864->6866 6865->6866 6867 7ff73d3f6480 6866->6867 6868 7ff73d3f64d9 6867->6868 6869 7ff73d3f648a 6867->6869 6868->6780 6870 7ff73d3f63d0 4 API calls 6869->6870 6871 7ff73d3f64a7 6870->6871 6871->6868 6872 7ff73d3f64c6 LeaveCriticalSection 6871->6872 6872->6868 6874 7ff73d3f6ad8 6873->6874 6875 7ff73d3f62e0 6 API calls 6874->6875 6876 7ff73d3f6aed 6875->6876 6877 7ff73d3f6c5d 6876->6877 6878 7ff73d3f6b02 memset 6876->6878 6879 7ff73d3f6b2d 6876->6879 6877->6797 6878->6879 6879->6877 6880 7ff73d3f6c20 free 6879->6880 6881 7ff73d3f6c2a 6879->6881 6880->6877 6882 7ff73d3f63d0 4 API calls 6881->6882 6883 7ff73d3f6c31 6882->6883 6883->6877 6884 7ff73d3f6c50 LeaveCriticalSection 6883->6884 6884->6877 6887 7ff73d3f650a 6885->6887 6886 7ff73d3f65bd 6886->6778 6887->6886 6888 7ff73d3f62e0 6 API calls 6887->6888 6889 7ff73d3f65cc 6888->6889 6889->6886 6890 7ff73d3f65d1 memcpy 6889->6890 6891 7ff73d3f65f6 free 6890->6891 6892 7ff73d3f6604 6890->6892 6891->6886 6893 7ff73d3f63d0 4 API calls 6892->6893 6894 7ff73d3f660b 6893->6894 6894->6886 6895 7ff73d3f662a LeaveCriticalSection 6894->6895 6895->6886 6897 7ff73d3f63d0 4 API calls 6896->6897 6898 7ff73d3f62f0 6897->6898 6899 7ff73d3f6335 malloc 6898->6899 6900 7ff73d3f6308 6898->6900 6899->6900 6902 7ff73d3f5cc0 memcpy 6899->6902 6901 7ff73d3f63ae LeaveCriticalSection 6900->6901 6900->6902 6901->6902 6902->6820 6904 7ff73d3f6d7a 6903->6904 6905 7ff73d3f6cef 6903->6905 6906 7ff73d3f62e0 6 API calls 6904->6906 6905->6904 6907 7ff73d3f6d29 6905->6907 6913 7ff73d3f6d6a 6906->6913 6908 7ff73d3f63d0 4 API calls 6907->6908 6909 7ff73d3f6d30 6908->6909 6910 7ff73d3f6d4a 6909->6910 6911 7ff73d3f6e92 malloc 6909->6911 6912 7ff73d3f6d5d LeaveCriticalSection 6910->6912 6910->6913 6911->6910 6911->6913 6912->6913 6913->6827 6913->6913 6915 7ff73d3f6459 EnterCriticalSection 6914->6915 6918 7ff73d3f63e3 6914->6918 6916 7ff73d3f6477 6915->6916 6916->6842 6916->6843 6917 7ff73d3f6420 6920 7ff73d3f6454 6917->6920 6921 7ff73d3f644b Sleep 6917->6921 6918->6917 6919 7ff73d3f63fb InitializeCriticalSection InitializeCriticalSection 6918->6919 6919->6917 6920->6915 6920->6916 6921->6917 6926 7ff73d3f1893 6928 7ff73d3f176e 6926->6928 6927 7ff73d3f1923 6930 7ff73d3f1b10 __acrt_iob_func 6927->6930 6928->6927 6929 7ff73d3f1906 6928->6929 6931 7ff73d3f1944 6928->6931 6932 7ff73d3f17df 6928->6932 6936 7ff73d3f17b9 VirtualProtect 6928->6936 6933 7ff73d3f1970 5 API calls 6929->6933 6930->6931 6934 7ff73d3f1b10 __acrt_iob_func 6931->6934 6933->6927 6935 7ff73d3f1957 6934->6935 6937 7ff73d3f1b10 __acrt_iob_func 6935->6937 6936->6928 6938 7ff73d3f1967 6937->6938 7652 7ff73d3f2e13 7653 7ff73d3f2e1e 7652->7653 7656 7ff73d3f3d70 7653->7656 7657 7ff73d3f3d85 7656->7657 7658 7ff73d3f3de9 7657->7658 7662 7ff73d3f3dcc 7657->7662 7659 7ff73d3f42b0 18 API calls 7658->7659 7660 7ff73d3f3df4 7659->7660 7663 7ff73d3f3ea3 7660->7663 7666 7ff73d3f3e00 fputc 7660->7666 7661 7ff73d3f3520 3 API calls 7661->7663 7662->7661 7664 7ff73d3f4f30 5 API calls 7663->7664 7665 7ff73d3f3056 7664->7665 7666->7660 7667 7ff73d3f2f14 7668 7ff73d3f3116 7667->7668 7670 7ff73d3f2f26 7667->7670 7669 7ff73d3f32b0 strlen 7668->7669 7671 7ff73d3f3132 7668->7671 7669->7671 7672 7ff73d3f3380 5 API calls 7670->7672 7673 7ff73d3f3520 3 API calls 7671->7673 7674 7ff73d3f30d6 7672->7674 7673->7674 7683 7ff73d3f5507 7684 7ff73d3f5534 7683->7684 7685 7ff73d3f4e70 6 API calls 7684->7685 7686 7ff73d3f5539 7685->7686 7687 7ff73d3f5708 7686->7687 7688 7ff73d3f6660 6 API calls 7686->7688 7690 7ff73d3f56f5 7686->7690 7694 7ff73d3f593b 7686->7694 7687->7690 7693 7ff73d3f6480 5 API calls 7687->7693 7740 7ff73d3f5e49 7687->7740 7688->7694 7689 7ff73d3f5adb 7691 7ff73d3f6660 6 API calls 7689->7691 7692 7ff73d3f6480 5 API calls 7690->7692 7696 7ff73d3f5ae8 7691->7696 7697 7ff73d3f5faa 7692->7697 7698 7ff73d3f5f62 7693->7698 7694->7689 7699 7ff73d3f6860 15 API calls 7694->7699 7711 7ff73d3f5ac0 7694->7711 7695 7ff73d3f6860 15 API calls 7695->7689 7701 7ff73d3f6860 15 API calls 7696->7701 7704 7ff73d3f5af9 7696->7704 7698->7690 7702 7ff73d3f5f79 7698->7702 7708 7ff73d3f6480 5 API calls 7698->7708 7700 7ff73d3f5aa3 7699->7700 7703 7ff73d3f6720 7 API calls 7700->7703 7701->7704 7705 7ff73d3f6480 5 API calls 7702->7705 7706 7ff73d3f5ab1 7703->7706 7707 7ff73d3f5b63 7704->7707 7710 7ff73d3f6ab0 9 API calls 7704->7710 7705->7690 7709 7ff73d3f6480 5 API calls 7706->7709 7712 7ff73d3f6ab0 9 API calls 7707->7712 7714 7ff73d3f5b76 7707->7714 7708->7702 7709->7711 7710->7707 7711->7689 7711->7695 7712->7714 7713 7ff73d3f5ba0 7715 7ff73d3f5c0b 7713->7715 7716 7ff73d3f5bb1 7713->7716 7714->7713 7720 7ff73d3f64e0 9 API calls 7714->7720 7717 7ff73d3f5c16 7715->7717 7730 7ff73d3f5eda 7715->7730 7716->7687 7718 7ff73d3f64e0 9 API calls 7716->7718 7719 7ff73d3f5c32 7717->7719 7721 7ff73d3f6ab0 9 API calls 7717->7721 7718->7687 7726 7ff73d3f62e0 6 API calls 7719->7726 7738 7ff73d3f5cef 7719->7738 7722 7ff73d3f5c65 7720->7722 7721->7719 7723 7ff73d3f5ec3 7722->7723 7724 7ff73d3f5c73 7722->7724 7723->7716 7723->7730 7725 7ff73d3f64e0 9 API calls 7724->7725 7728 7ff73d3f5c83 7725->7728 7729 7ff73d3f5cc0 memcpy 7726->7729 7727 7ff73d3f64e0 9 API calls 7727->7730 7728->7716 7728->7717 7731 7ff73d3f6ab0 9 API calls 7729->7731 7730->7727 7733 7ff73d3f5eb6 7730->7733 7731->7738 7732 7ff73d3f6ab0 9 API calls 7732->7733 7733->7732 7733->7740 7734 7ff73d3f6cd0 8 API calls 7734->7738 7735 7ff73d3f6480 5 API calls 7735->7738 7736 7ff73d3f5e1d 7737 7ff73d3f5edf 7736->7737 7743 7ff73d3f5e35 7736->7743 7739 7ff73d3f6ab0 9 API calls 7737->7739 7737->7740 7738->7687 7738->7733 7738->7734 7738->7735 7738->7736 7738->7740 7742 7ff73d3f64e0 9 API calls 7738->7742 7739->7740 7741 7ff73d3f64e0 9 API calls 7741->7743 7742->7738 7743->7740 7743->7741 7744 7ff73d3f2ca3 7745 7ff73d3f2ce5 7744->7745 7749 7ff73d3f2d83 7745->7749 7750 7ff73d3f31ed 7745->7750 7746 7ff73d3f3520 3 API calls 7747 7ff73d3f32f9 7746->7747 7748 7ff73d3f48d0 23 API calls 7748->7747 7749->7746 7750->7747 7750->7748 7768 7ff73d3f24a0 strlen 7769 7ff73d3f24b7 7768->7769 7770 7ff73d3f6fa0 7771 7ff73d3f63d0 4 API calls 7770->7771 7772 7ff73d3f6fbd 7771->7772 7773 7ff73d3f6fcd 7772->7773 7776 7ff73d3f70dd malloc 7772->7776 7774 7ff73d3f6fe0 LeaveCriticalSection 7773->7774 7775 7ff73d3f6fed 7773->7775 7774->7775 7776->7773 7776->7775 7777 7ff73d40bbb0 7778 7ff73d40bbc6 7777->7778 7779 7ff73d40bbde 7778->7779 7780 7ff73d40bf23 __acrt_iob_func 7778->7780 7782 7ff73d4052a0 115 API calls 7779->7782 7826 7ff73d40c0c0 7780->7826 7784 7ff73d40bbec 7782->7784 7783 7ff73d40bf40 7785 7ff73d40c09c perror 7784->7785 7786 7ff73d40bbf4 puts 7784->7786 7785->7783 7793 7ff73d40bebe 7785->7793 7787 7ff73d40bc1c 7786->7787 7788 7ff73d40bc10 7786->7788 7792 7ff73d40c0f0 2 API calls 7787->7792 7799 7ff73d40bc32 7787->7799 7823 7ff73d40c0f0 __acrt_iob_func 7788->7823 7790 7ff73d40bed3 7791 7ff73d40c07d free 7790->7791 7791->7783 7792->7799 7793->7783 7793->7790 7794 7ff73d40bee0 free 7793->7794 7796 7ff73d40bf10 free 7793->7796 7794->7791 7794->7793 7795 7ff73d40bc3d 7797 7ff73d40bc45 7795->7797 7800 7ff73d40c0f0 2 API calls 7795->7800 7796->7793 7796->7796 7798 7ff73d40bc4d 7797->7798 7801 7ff73d40c0f0 2 API calls 7797->7801 7802 7ff73d40bc55 7798->7802 7804 7ff73d40c0f0 2 API calls 7798->7804 7799->7795 7803 7ff73d40c0f0 2 API calls 7799->7803 7800->7797 7801->7798 7805 7ff73d40bc60 7802->7805 7806 7ff73d40c0f0 2 API calls 7802->7806 7803->7795 7804->7802 7807 7ff73d40bc6b 7805->7807 7809 7ff73d40c0f0 2 API calls 7805->7809 7806->7805 7808 7ff73d40bc76 7807->7808 7811 7ff73d40c0f0 2 API calls 7807->7811 7810 7ff73d40bc81 7808->7810 7812 7ff73d40c0f0 2 API calls 7808->7812 7809->7807 7813 7ff73d40bc8c 7810->7813 7814 7ff73d40c0f0 2 API calls 7810->7814 7811->7808 7812->7810 7815 7ff73d40bca5 putchar 7813->7815 7816 7ff73d40c0f0 2 API calls 7813->7816 7817 7ff73d40c075 7813->7817 7814->7813 7815->7790 7820 7ff73d40bcbf 7815->7820 7816->7815 7817->7815 7818 7ff73d40bea4 putchar 7818->7793 7818->7820 7819 7ff73d40be46 strchr 7819->7820 7820->7793 7820->7818 7820->7819 7821 7ff73d40bdca putchar 7820->7821 7822 7ff73d40c0f0 fputc __acrt_iob_func 7820->7822 7821->7820 7822->7820 7824 7ff73d3f1d90 fputc 7823->7824 7825 7ff73d40c12c 7824->7825 7825->7787 7827 7ff73d3f1d90 fputc 7826->7827 7828 7ff73d40c0e4 7827->7828 7828->7783 6947 7ff73d3f511b 6948 7ff73d3f5145 6947->6948 6949 7ff73d3f62e0 6 API calls 6948->6949 6950 7ff73d3f515e 6949->6950 6951 7ff73d3f538f 6950->6951 6954 7ff73d3f520e 6950->6954 6952 7ff73d3f6480 5 API calls 6951->6952 6953 7ff73d3f5397 6952->6953 6955 7ff73d3f4e70 6 API calls 6954->6955 6956 7ff73d3f5539 6955->6956 6957 7ff73d3f6660 6 API calls 6956->6957 6960 7ff73d3f56f5 6956->6960 6964 7ff73d3f593b 6956->6964 6990 7ff73d3f5708 6956->6990 6957->6964 6958 7ff73d3f5adb 6961 7ff73d3f6660 6 API calls 6958->6961 6959 7ff73d3f5ac0 6959->6958 6965 7ff73d3f6860 15 API calls 6959->6965 6962 7ff73d3f6480 5 API calls 6960->6962 6966 7ff73d3f5ae8 6961->6966 6967 7ff73d3f5faa 6962->6967 6963 7ff73d3f6480 5 API calls 6974 7ff73d3f5f62 6963->6974 6964->6958 6964->6959 6968 7ff73d3f6860 15 API calls 6964->6968 6965->6958 6970 7ff73d3f6860 15 API calls 6966->6970 6973 7ff73d3f5af9 6966->6973 6969 7ff73d3f5aa3 6968->6969 6972 7ff73d3f6720 7 API calls 6969->6972 6970->6973 6971 7ff73d3f5f79 6975 7ff73d3f6480 5 API calls 6971->6975 6976 7ff73d3f5ab1 6972->6976 6977 7ff73d3f5b63 6973->6977 6980 7ff73d3f6ab0 9 API calls 6973->6980 6974->6960 6974->6971 6978 7ff73d3f6480 5 API calls 6974->6978 6975->6960 6979 7ff73d3f6480 5 API calls 6976->6979 6981 7ff73d3f6ab0 9 API calls 6977->6981 6983 7ff73d3f5b76 6977->6983 6978->6971 6979->6959 6980->6977 6981->6983 6982 7ff73d3f5ba0 6984 7ff73d3f5c0b 6982->6984 6985 7ff73d3f5bb1 6982->6985 6983->6982 6989 7ff73d3f64e0 9 API calls 6983->6989 6986 7ff73d3f5c16 6984->6986 7000 7ff73d3f5eda 6984->7000 6987 7ff73d3f64e0 9 API calls 6985->6987 6985->6990 6988 7ff73d3f5c32 6986->6988 6991 7ff73d3f6ab0 9 API calls 6986->6991 6987->6990 6996 7ff73d3f62e0 6 API calls 6988->6996 7008 7ff73d3f5cef 6988->7008 6992 7ff73d3f5c65 6989->6992 6990->6960 6990->6963 7010 7ff73d3f5e49 6990->7010 6991->6988 6993 7ff73d3f5ec3 6992->6993 6994 7ff73d3f5c73 6992->6994 6993->6985 6993->7000 6995 7ff73d3f64e0 9 API calls 6994->6995 6998 7ff73d3f5c83 6995->6998 6999 7ff73d3f5cc0 memcpy 6996->6999 6997 7ff73d3f64e0 9 API calls 6997->7000 6998->6985 6998->6986 7001 7ff73d3f6ab0 9 API calls 6999->7001 7000->6997 7003 7ff73d3f5eb6 7000->7003 7001->7008 7002 7ff73d3f6ab0 9 API calls 7002->7003 7003->7002 7003->7010 7004 7ff73d3f6cd0 8 API calls 7004->7008 7005 7ff73d3f6480 5 API calls 7005->7008 7006 7ff73d3f5e1d 7007 7ff73d3f5edf 7006->7007 7013 7ff73d3f5e35 7006->7013 7009 7ff73d3f6ab0 9 API calls 7007->7009 7007->7010 7008->6990 7008->7003 7008->7004 7008->7005 7008->7006 7008->7010 7012 7ff73d3f64e0 9 API calls 7008->7012 7009->7010 7011 7ff73d3f64e0 9 API calls 7011->7013 7012->7008 7013->7010 7013->7011 7014 7ff73d3f1d17 7015 7ff73d3f1c69 7014->7015 7016 7ff73d3f1c37 signal 7014->7016 7016->7015 7017 7ff73d3f1c4c 7016->7017 7017->7015 7018 7ff73d3f1c52 signal 7017->7018 7018->7015 7023 7ff73d3f1c35 7024 7ff73d3f1c37 signal 7023->7024 7025 7ff73d3f1c69 7024->7025 7026 7ff73d3f1c4c 7024->7026 7026->7025 7027 7ff73d3f1c52 signal 7026->7027 7027->7025 7833 7ff73d3f2cb6 7834 7ff73d3f2df4 7833->7834 7835 7ff73d3f3c70 31 API calls 7834->7835 7836 7ff73d3f3033 7835->7836 7850 7ff73d3f2db1 7851 7ff73d3f30f5 7850->7851 7852 7ff73d3f2dc7 7850->7852 7854 7ff73d3f3520 3 API calls 7851->7854 7853 7ff73d3f3380 5 API calls 7852->7853 7855 7ff73d3f2de4 7853->7855 7854->7855 7032 7ff73d3f7630 7036 7ff73d3f7652 7032->7036 7037 7ff73d3f78d9 7032->7037 7033 7ff73d3f7891 FreeLibrary 7034 7ff73d3f78b0 LocalFree 7033->7034 7034->7037 7036->7033 7036->7036 7036->7037 7038 7ff73d3f2130 7039 7ff73d3f2144 calloc 7038->7039 7040 7ff73d3f2193 7038->7040 7039->7040 7041 7ff73d3f215d EnterCriticalSection LeaveCriticalSection 7039->7041 7041->7040 7042 7ff73d3f1f30 7043 7ff73d3f1f51 7042->7043 7044 7ff73d3f1f61 __p___argc 7043->7044 7045 7ff73d3f1f70 7044->7045 7046 7ff73d3f1f86 _set_new_mode 7045->7046 7047 7ff73d3f1f8e 7045->7047 7046->7047 7860 7ff73d3f21b0 7861 7ff73d3f222f 7860->7861 7862 7ff73d3f21be EnterCriticalSection 7860->7862 7863 7ff73d3f2222 LeaveCriticalSection 7862->7863 7864 7ff73d3f21d9 7862->7864 7863->7861 7864->7863 7865 7ff73d3f221d free 7864->7865 7865->7863 7866 7ff73d3f2ca9 7867 7ff73d3f2dc7 7866->7867 7868 7ff73d3f3380 5 API calls 7867->7868 7869 7ff73d3f2de4 7868->7869 7878 7ff73d3f2cbf 7879 7ff73d3f2e1e 7878->7879 7880 7ff73d3f3d70 27 API calls 7879->7880 7881 7ff73d3f3056 7880->7881 7052 7ff73d3f1840 7060 7ff73d3f176e 7052->7060 7053 7ff73d3f1944 7055 7ff73d3f1b10 __acrt_iob_func 7053->7055 7054 7ff73d3f17df 7056 7ff73d3f1957 7055->7056 7058 7ff73d3f1b10 __acrt_iob_func 7056->7058 7057 7ff73d3f17b9 VirtualProtect 7057->7052 7057->7060 7059 7ff73d3f1967 7058->7059 7060->7052 7060->7053 7060->7054 7060->7057 7061 7ff73d3f1923 7060->7061 7062 7ff73d3f1906 7060->7062 7063 7ff73d3f1b10 __acrt_iob_func 7061->7063 7064 7ff73d3f1970 5 API calls 7062->7064 7063->7053 7064->7061 7065 7ff73d3f1140 7066 7ff73d3f1160 274 API calls 7065->7066 7067 7ff73d3f1156 7066->7067 7882 7ff73d3f4ec0 7884 7ff73d3f4ed5 7882->7884 7883 7ff73d3f62e0 6 API calls 7885 7ff73d3f4ef7 7883->7885 7884->7883 7884->7884 7886 7ff73d3f1fc0 7887 7ff73d3f1fd0 7886->7887 7888 7ff73d40ca50 _crt_at_quick_exit 7886->7888 7068 7ff73d3f2e3d 7069 7ff73d3f2e48 7068->7069 7072 7ff73d3f3ec0 7069->7072 7073 7ff73d3f3ed6 7072->7073 7074 7ff73d3f3f3b 7073->7074 7079 7ff73d3f3f1e 7073->7079 7075 7ff73d3f3f47 7074->7075 7078 7ff73d3f3f8d 7074->7078 7076 7ff73d3f3f71 7075->7076 7077 7ff73d3f3f4d strlen 7075->7077 7090 7ff73d3f4070 7076->7090 7077->7076 7080 7ff73d3f3f93 strlen 7078->7080 7081 7ff73d3f3fa2 7078->7081 7082 7ff73d3f3520 3 API calls 7079->7082 7080->7081 7104 7ff73d3f42b0 7081->7104 7084 7ff73d3f3f8b 7082->7084 7098 7ff73d3f4f30 7084->7098 7088 7ff73d3f4019 7088->7084 7089 7ff73d3f4020 fputc 7088->7089 7089->7088 7091 7ff73d3f408d 7090->7091 7092 7ff73d3f42b0 18 API calls 7091->7092 7093 7ff73d3f40f7 7092->7093 7094 7ff73d3f4129 7093->7094 7095 7ff73d3f4135 fputc 7093->7095 7124 7ff73d3f3660 7094->7124 7095->7094 7100 7ff73d3f6480 7098->7100 7099 7ff73d3f3079 7100->7099 7101 7ff73d3f63d0 4 API calls 7100->7101 7102 7ff73d3f64a7 7101->7102 7102->7099 7103 7ff73d3f64c6 LeaveCriticalSection 7102->7103 7103->7099 7106 7ff73d3f42d4 7104->7106 7105 7ff73d3f4361 7108 7ff73d3f4510 fputc 7105->7108 7114 7ff73d3f4389 7105->7114 7106->7105 7110 7ff73d3f44f8 fputc 7106->7110 7107 7ff73d3f4580 7109 7ff73d3f4632 7107->7109 7115 7ff73d3f4588 7107->7115 7108->7114 7111 7ff73d3f462e 7109->7111 7112 7ff73d3f4658 fputc 7109->7112 7110->7106 7120 7ff73d3f467a 7111->7120 7143 7ff73d3f4750 7111->7143 7112->7111 7113 7ff73d3f4574 fputc 7113->7114 7114->7107 7114->7113 7115->7111 7116 7ff73d3f45e0 fputc 7115->7116 7134 7ff73d3f3380 wcrtomb 7115->7134 7116->7115 7118 7ff73d3f4734 7118->7088 7121 7ff73d3f46c7 7120->7121 7122 7ff73d3f46bb fputc 7120->7122 7121->7118 7123 7ff73d3f472a fputc 7121->7123 7122->7120 7123->7121 7126 7ff73d3f3687 7124->7126 7125 7ff73d3f36fe memset 7132 7ff73d3f3723 7125->7132 7126->7125 7126->7132 7127 7ff73d3f38d5 7129 7ff73d3f390b 7127->7129 7131 7ff73d3f38c0 fputc 7127->7131 7128 7ff73d3f3782 7128->7127 7130 7ff73d3f38a4 fputc 7128->7130 7129->7084 7130->7128 7131->7127 7132->7128 7133 7ff73d3f3958 fputc 7132->7133 7133->7132 7136 7ff73d3f33d0 7134->7136 7140 7ff73d3f3419 7134->7140 7135 7ff73d3f3449 wcrtomb 7139 7ff73d3f3420 7135->7139 7135->7140 7137 7ff73d3f340d fputc 7136->7137 7136->7140 7137->7136 7138 7ff73d3f3505 7138->7115 7139->7138 7141 7ff73d3f34f6 fputc 7139->7141 7140->7135 7140->7139 7142 7ff73d3f34b6 fputc 7140->7142 7141->7139 7142->7140 7144 7ff73d3f476a localeconv mbrtowc 7143->7144 7145 7ff73d3f47a1 7143->7145 7144->7145 7146 7ff73d3f484b 7145->7146 7147 7ff73d3f47b7 7145->7147 7148 7ff73d3f4897 fputc 7146->7148 7151 7ff73d3f4867 7146->7151 7149 7ff73d3f47c9 wcrtomb 7147->7149 7148->7151 7150 7ff73d3f4871 7149->7150 7153 7ff73d3f47f6 7149->7153 7150->7151 7152 7ff73d3f48ae fputc 7150->7152 7151->7120 7152->7151 7153->7151 7154 7ff73d3f4839 fputc 7153->7154 7154->7153 7889 7ff73d408ed0 7890 7ff73d408efe fopen 7889->7890 7891 7ff73d4097c3 __acrt_iob_func 7889->7891 7893 7ff73d408f17 strcmp calloc 7890->7893 7894 7ff73d4099d5 perror 7890->7894 8023 7ff73d409ec0 7891->8023 7896 7ff73d4099e6 perror fclose 7893->7896 7898 7ff73d408f5b 7893->7898 7895 7ff73d4097e0 7894->7895 7896->7895 7897 7ff73d3f7e90 3 API calls 7897->7898 7898->7897 7899 7ff73d408faf strchr 7898->7899 7902 7ff73d408fdb calloc 7898->7902 7906 7ff73d4097ea 7898->7906 7908 7ff73d408f90 free 7898->7908 7912 7ff73d409c7a free 7898->7912 7927 7ff73d409059 _stricmp 7898->7927 7936 7ff73d40908a strlen 7898->7936 7942 7ff73d409269 strlen 7898->7942 7943 7ff73d4099b3 __acrt_iob_func 7898->7943 7960 7ff73d3f83b0 30 API calls 7898->7960 7970 7ff73d409c31 __acrt_iob_func 7898->7970 7971 7ff73d4093d1 strlen 7898->7971 7972 7ff73d4029d0 strlen 7898->7972 7981 7ff73d4093f8 strtoul 7898->7981 7982 7ff73d4095a3 free 7898->7982 7983 7ff73d409a1a __acrt_iob_func fwrite 7898->7983 7984 7ff73d40947d strtoul 7898->7984 7985 7ff73d40954c strtoul 7898->7985 7989 7ff73d409c03 __acrt_iob_func 7898->7989 7990 7ff73d409e32 __acrt_iob_func 7898->7990 7991 7ff73d3f8af0 3 API calls 7898->7991 7994 7ff73d409e4d __acrt_iob_func 7898->7994 7996 7ff73d4095cc strtoul 7898->7996 7997 7ff73d409c51 __acrt_iob_func 7898->7997 7998 7ff73d409644 strtoul 7898->7998 8004 7ff73d409e68 __acrt_iob_func 7898->8004 8005 7ff73d409697 strtoul 7898->8005 8009 7ff73d409670 7898->8009 8010 7ff73d409e83 __acrt_iob_func 7898->8010 8013 7ff73d3f8310 6 API calls 7898->8013 8014 7ff73d3f8200 strlen strlen _strnicmp 7898->8014 8015 7ff73d3f8260 7898->8015 7899->7898 7900 7ff73d408fd0 strlen 7899->7900 7900->7902 7901 7ff73d40981e strncpy strcmp 7903 7ff73d409b8a 7901->7903 7914 7ff73d409850 7901->7914 7902->7898 7905 7ff73d4099ff perror 7902->7905 7904 7ff73d406c50 64 API calls 7903->7904 7949 7ff73d409b92 7904->7949 7905->7912 7906->7901 7907 7ff73d40990a __acrt_iob_func fwrite 7906->7907 7909 7ff73d409815 7906->7909 7910 7ff73d409948 __acrt_iob_func 7907->7910 7911 7ff73d409934 7907->7911 7908->7898 7909->7901 7909->7910 7913 7ff73d409cbb fwrite 7910->7913 7916 7ff73d409940 free 7911->7916 7918 7ff73d409970 free 7911->7918 7924 7ff73d4099bc 7911->7924 7925 7ff73d4099a4 free 7911->7925 7987 7ff73d409395 7912->7987 7915 7ff73d409cd0 fclose free 7913->7915 7914->7903 7917 7ff73d4052a0 115 API calls 7914->7917 7915->7895 7915->7987 7916->7910 7923 7ff73d40987c 7917->7923 7918->7911 7918->7916 7919 7ff73d409ba3 perror 7919->7915 7920 7ff73d409ca4 __acrt_iob_func 7920->7913 7921 7ff73d409cf3 free 7921->7895 7922 7ff73d409d10 free 7922->7921 7922->7987 7928 7ff73d409a12 free 7923->7928 7938 7ff73d4098af calloc 7923->7938 7923->7949 7932 7ff73d3f81d0 fputc 7924->7932 7925->7911 7926 7ff73d409c9c free 7926->7920 7927->7898 7930 7ff73d40906a _stricmp 7927->7930 7928->7903 7929 7ff73d409d60 free 7929->7926 7929->7987 7930->7898 7935 7ff73d4091fb calloc 7930->7935 7931 7ff73d409d44 free 7931->7987 7939 7ff73d4099d0 7932->7939 7933 7ff73d409d90 free 7933->7933 7933->7987 7935->7898 7937 7ff73d409c6e perror 7935->7937 7940 7ff73d4090ba strlen 7936->7940 7941 7ff73d40909f _strnicmp 7936->7941 7937->7912 7958 7ff73d4098c5 qsort 7938->7958 7967 7ff73d409da3 7938->7967 7939->7912 7945 7ff73d4090c8 _strnicmp 7940->7945 7946 7ff73d4090e3 strlen 7940->7946 7941->7940 7944 7ff73d409366 7941->7944 7947 7ff73d409277 _strnicmp 7942->7947 7948 7ff73d409292 strlen 7942->7948 7943->7924 7954 7ff73d3f8090 8 API calls 7944->7954 7945->7946 7951 7ff73d40939a _stricmp 7945->7951 7952 7ff73d40910c strlen 7946->7952 7953 7ff73d4090f1 _strnicmp 7946->7953 7947->7898 7947->7948 7955 7ff73d4092bb strlen 7948->7955 7956 7ff73d4092a0 _strnicmp 7948->7956 7949->7915 7949->7919 7950 7ff73d409dc0 free 7966 7ff73d409e03 free 7950->7966 7950->7967 7951->7898 7961 7ff73d40911a _strnicmp 7952->7961 7962 7ff73d409135 strlen 7952->7962 7953->7898 7953->7952 7963 7ff73d409382 free 7954->7963 7964 7ff73d4092c9 _strnicmp 7955->7964 7965 7ff73d4092e4 strlen 7955->7965 7956->7898 7956->7955 7957 7ff73d409df0 free 7957->7957 7957->7967 7992 7ff73d409a9e 7958->7992 8000 7ff73d409b69 7958->8000 7960->7898 7961->7898 7961->7962 7968 7ff73d40915e strlen 7962->7968 7969 7ff73d409143 _strnicmp 7962->7969 7963->7898 7963->7987 7964->7965 7973 7ff73d40958d 7964->7973 7974 7ff73d40930d strlen 7965->7974 7975 7ff73d4092f2 _strnicmp 7965->7975 7966->7919 7967->7949 7967->7950 7967->7957 7978 7ff73d409187 strlen 7968->7978 7979 7ff73d40916c _strnicmp 7968->7979 7969->7898 7969->7968 7970->7924 7971->7898 7971->7981 7972->7898 7980 7ff73d3f8770 21 API calls 7973->7980 7974->7943 7977 7ff73d40931f _strnicmp 7974->7977 7975->7974 7976 7ff73d40960d _stricmp 7975->7976 7976->7898 7977->7898 7977->7943 7978->7898 7986 7ff73d409195 _strnicmp 7978->7986 7979->7898 7979->7978 7980->7982 7981->7898 7981->7970 7982->7898 7982->7987 7983->7912 7984->7898 7984->7990 7985->7898 7985->7994 7986->7898 7987->7920 7987->7921 7987->7922 7987->7926 7987->7929 7987->7931 7987->7933 7988 7ff73d409b7a free 7988->7928 8001 7ff73d3f81d0 fputc 7989->8001 7995 7ff73d409e9c 7990->7995 7991->7898 7993 7ff73d409b05 calloc 7992->7993 7992->8000 7993->7992 8002 7ff73d409e13 7993->8002 7994->7995 8003 7ff73d3f81d0 fputc 7995->8003 7996->7898 7996->8004 7997->7924 7998->7898 7998->7997 7999 7ff73d409bc0 free 7999->7988 7999->8000 8000->7928 8000->7988 8000->7999 8006 7ff73d409bf0 free 8000->8006 8001->7939 8026 7ff73d409f30 8002->8026 8008 7ff73d409ea7 exit 8003->8008 8004->7995 8005->7898 8005->8010 8006->8000 8006->8006 8009->7997 8010->7995 8013->7898 8014->7898 8016 7ff73d3f82a3 __acrt_iob_func fwrite 8015->8016 8017 7ff73d3f8271 strtoul 8015->8017 8020 7ff73d3f829e 8016->8020 8018 7ff73d3f82d7 __acrt_iob_func 8017->8018 8019 7ff73d3f8297 8017->8019 8021 7ff73d3f81d0 fputc 8018->8021 8019->8018 8019->8020 8020->7898 8022 7ff73d3f82f7 exit 8021->8022 8024 7ff73d3f1d90 fputc 8023->8024 8025 7ff73d409ee4 8024->8025 8025->7895 8027 7ff73d409e1b free 8026->8027 8029 7ff73d409f3e 8026->8029 8027->7949 8028 7ff73d409f60 free 8028->8029 8029->8027 8029->8028 8030 7ff73d409f94 free 8029->8030 8030->8029 8031 7ff73d4083d0 8032 7ff73d40846f __acrt_iob_func 8031->8032 8033 7ff73d4083df __acrt_iob_func fread 8031->8033 8049 7ff73d408510 8032->8049 8035 7ff73d408498 _errno 8033->8035 8039 7ff73d408409 8033->8039 8036 7ff73d4084a4 __acrt_iob_func 8035->8036 8038 7ff73d4084bd 8036->8038 8037 7ff73d408420 __acrt_iob_func getc 8037->8037 8037->8039 8040 7ff73d408510 fputc 8038->8040 8039->8037 8042 7ff73d40844f 8039->8042 8041 7ff73d408496 8040->8041 8043 7ff73d4084d1 8042->8043 8044 7ff73d408454 __acrt_iob_func 8042->8044 8045 7ff73d4029d0 strlen 8043->8045 8044->8038 8046 7ff73d4084e0 8045->8046 8046->8036 8047 7ff73d4084e4 8046->8047 8048 7ff73d408504 puts 8047->8048 8048->8041 8050 7ff73d3f1d90 fputc 8049->8050 8051 7ff73d40852d 8050->8051 8051->8041 8052 7ff73d3f2ebc 8053 7ff73d3f2ec1 8052->8053 8058 7ff73d3f3970 8053->8058 8056 7ff73d3f3660 4 API calls 8057 7ff73d3f3272 8056->8057 8059 7ff73d3f39b1 8058->8059 8060 7ff73d3f3a77 memset 8059->8060 8061 7ff73d3f3aa1 8059->8061 8060->8061 8062 7ff73d3f3b12 memset 8061->8062 8067 7ff73d3f3b33 8061->8067 8062->8067 8063 7ff73d3f3ba4 8065 7ff73d3f3be4 fputc 8063->8065 8066 7ff73d3f3bf6 8063->8066 8064 7ff73d3f31b3 8064->8056 8065->8063 8066->8064 8069 7ff73d3f3c30 fputc 8066->8069 8067->8063 8068 7ff73d3f3b90 fputc 8067->8068 8068->8067 8069->8066 7163 7ff73d40cd38 7164 7ff73d40cd68 7163->7164 7165 7ff73d3f7320 11 API calls 7164->7165 7166 7ff73d40cd98 7165->7166 8078 7ff73d3f22cf 8079 7ff73d3f22e5 8078->8079 8080 7ff73d3f22d8 InitializeCriticalSection 8078->8080 8080->8079 8081 7ff73d3f2bcf 8082 7ff73d3f2bda 8081->8082 8083 7ff73d3f3970 5 API calls 8082->8083 8085 7ff73d3f3187 8082->8085 8083->8085 8084 7ff73d3f3660 4 API calls 8086 7ff73d3f3272 8084->8086 8085->8084 6074 7ff73d3f1350 6077 7ff73d3f1160 6074->6077 6076 7ff73d3f1366 6078 7ff73d3f118b 6077->6078 6079 7ff73d3f11b9 6077->6079 6078->6079 6080 7ff73d3f1190 6078->6080 6083 7ff73d3f11d1 6079->6083 6206 7ff73d3f1fe0 __acrt_iob_func 6079->6206 6080->6079 6081 7ff73d3f11a0 Sleep 6080->6081 6081->6079 6081->6080 6084 7ff73d3f1201 _initterm 6083->6084 6085 7ff73d3f121a 6083->6085 6084->6085 6100 7ff73d3f1650 6085->6100 6089 7ff73d3f126f malloc 6090 7ff73d3f12d2 6089->6090 6091 7ff73d3f128b 6089->6091 6118 7ff73d3f1490 6090->6118 6092 7ff73d3f12a0 strlen malloc memcpy 6091->6092 6092->6092 6093 7ff73d3f12d0 6092->6093 6093->6090 6097 7ff73d3f1315 6098 7ff73d3f1338 6097->6098 6099 7ff73d3f132d _cexit 6097->6099 6098->6076 6099->6098 6101 7ff73d3f1247 SetUnhandledExceptionFilter _set_invalid_parameter_handler 6100->6101 6102 7ff73d3f1672 6100->6102 6117 7ff73d3f1640 6101->6117 6102->6101 6103 7ff73d3f1726 6102->6103 6111 7ff73d3f176e 6102->6111 6103->6111 6209 7ff73d3f1970 6103->6209 6104 7ff73d3f1957 6105 7ff73d3f1b10 __acrt_iob_func 6104->6105 6107 7ff73d3f1967 6105->6107 6108 7ff73d3f17b9 VirtualProtect 6108->6111 6109 7ff73d3f1944 6110 7ff73d3f1b10 __acrt_iob_func 6109->6110 6110->6104 6111->6101 6111->6104 6111->6108 6111->6109 6112 7ff73d3f192c 6111->6112 6113 7ff73d3f1906 6111->6113 6224 7ff73d3f1b10 6112->6224 6115 7ff73d3f1970 5 API calls 6113->6115 6116 7ff73d3f1923 6115->6116 6116->6112 6117->6089 6119 7ff73d3f12e8 6118->6119 6120 7ff73d3f14a8 6118->6120 6123 7ff73d3f7a60 6119->6123 6121 7ff73d3f1505 6120->6121 6228 7ff73d3f7f70 SetDllDirectoryA 6120->6228 6124 7ff73d3f1490 10 API calls 6123->6124 6125 7ff73d3f7a77 6124->6125 6126 7ff73d3f7b46 6125->6126 6127 7ff73d3f7a93 strcmp 6125->6127 6136 7ff73d3f7b2d 6125->6136 6131 7ff73d3f7b4a strcmp 6126->6131 6128 7ff73d3f7c53 6127->6128 6129 7ff73d3f7aae strcmp 6127->6129 6477 7ff73d3f7cd0 __acrt_iob_func 6128->6477 6129->6128 6132 7ff73d3f7ac5 strcmp 6129->6132 6130 7ff73d409fd4 __acrt_iob_func 6480 7ff73d40a3f0 6130->6480 6135 7ff73d3f7b65 strcmp 6131->6135 6131->6136 6132->6128 6139 7ff73d3f7adc strcmp 6132->6139 6135->6136 6143 7ff73d3f7b7c strcmp 6135->6143 6136->6130 6137 7ff73d40a0dc 6136->6137 6138 7ff73d40a011 strcmp 6136->6138 6414 7ff73d404c30 SetupDiGetClassDevsExW 6137->6414 6138->6137 6144 7ff73d40a031 strcmp 6138->6144 6147 7ff73d3f7b15 __acrt_iob_func 6139->6147 6148 7ff73d3f7aef strcmp 6139->6148 6140 7ff73d3f7c5f 6140->6097 6141 7ff73d409ffc 6141->6097 6143->6136 6150 7ff73d3f7b93 strcmp 6143->6150 6145 7ff73d40a048 6144->6145 6146 7ff73d40a2b3 6144->6146 6152 7ff73d40a04d strcmp 6145->6152 6153 7ff73d40a092 6145->6153 6146->6130 6154 7ff73d40a2bc 6146->6154 6453 7ff73d3f7d20 6147->6453 6148->6147 6155 7ff73d3f7b02 strcmp 6148->6155 6149 7ff73d40a0e1 6157 7ff73d40a3cf perror 6149->6157 6176 7ff73d40a0ea 6149->6176 6150->6136 6151 7ff73d3f7baa strcmp 6150->6151 6151->6136 6158 7ff73d3f7bc1 strcmp 6151->6158 6159 7ff73d40a31b __acrt_iob_func 6152->6159 6160 7ff73d40a064 strcmp 6152->6160 6238 7ff73d4052a0 6153->6238 6163 7ff73d404c30 34 API calls 6154->6163 6155->6131 6155->6147 6157->6141 6158->6136 6167 7ff73d3f7bd8 strcmp 6158->6167 6166 7ff73d40a3f0 fputc 6159->6166 6160->6159 6168 7ff73d40a07b strcmp 6160->6168 6170 7ff73d40a2c1 6163->6170 6164 7ff73d3f7b28 6164->6140 6165 7ff73d40a146 strlen 6165->6176 6195 7ff73d40a233 free 6165->6195 6166->6141 6167->6136 6171 7ff73d3f7bef strcmp 6167->6171 6168->6153 6168->6159 6170->6157 6187 7ff73d40a2ca 6170->6187 6171->6136 6175 7ff73d3f7c06 strcmp 6171->6175 6172 7ff73d4052a0 115 API calls 6172->6176 6173 7ff73d40a0b0 6177 7ff73d40a347 6173->6177 6178 7ff73d40a0be 6173->6178 6175->6136 6181 7ff73d3f7c1d __acrt_iob_func 6175->6181 6176->6165 6176->6172 6182 7ff73d40a110 __acrt_iob_func _errno 6176->6182 6189 7ff73d40a420 37 API calls 6176->6189 6192 7ff73d40a3f0 fputc 6176->6192 6194 7ff73d40a1a0 6176->6194 6197 7ff73d40a1d8 free 6176->6197 6199 7ff73d40a1f0 free 6176->6199 6200 7ff73d40a194 6176->6200 6204 7ff73d40a220 free 6176->6204 6180 7ff73d40acb0 25 API calls 6177->6180 6327 7ff73d40a420 strcmp 6178->6327 6179 7ff73d40a2f5 strlen 6184 7ff73d40a3c3 free 6179->6184 6179->6187 6185 7ff73d40a34f 6180->6185 6474 7ff73d3f7e60 6181->6474 6182->6176 6184->6141 6202 7ff73d40a0d2 6185->6202 6187->6179 6535 7ff73d40b2a0 __acrt_iob_func 6187->6535 6189->6176 6192->6176 6193 7ff73d3f7d20 2 API calls 6193->6164 6194->6176 6483 7ff73d40acb0 6194->6483 6195->6141 6196 7ff73d40a380 free 6196->6195 6196->6202 6197->6176 6198 7ff73d40a3b0 free 6198->6198 6198->6202 6199->6176 6199->6197 6200->6195 6201 7ff73d40a252 free 6200->6201 6203 7ff73d40a270 free 6200->6203 6205 7ff73d40a2a0 free 6200->6205 6201->6195 6202->6141 6202->6195 6202->6196 6202->6198 6203->6200 6203->6201 6204->6176 6204->6204 6205->6200 6205->6205 6707 7ff73d3f23f0 __stdio_common_vfprintf 6206->6707 6208 7ff73d3f2003 6208->6083 6210 7ff73d3f1992 6209->6210 6211 7ff73d3f19d4 memcpy 6210->6211 6213 7ff73d3f1ac4 6210->6213 6214 7ff73d3f19ed 6210->6214 6211->6103 6215 7ff73d3f1b10 __acrt_iob_func 6213->6215 6217 7ff73d3f1a15 VirtualQuery 6214->6217 6216 7ff73d3f1ad3 6215->6216 6218 7ff73d3f1b10 __acrt_iob_func 6216->6218 6217->6216 6219 7ff73d3f1a42 6217->6219 6220 7ff73d3f1af3 GetLastError 6218->6220 6219->6211 6221 7ff73d3f1a74 VirtualProtect 6219->6221 6222 7ff73d3f1b10 __acrt_iob_func 6220->6222 6221->6211 6221->6220 6223 7ff73d3f1b07 6222->6223 6225 7ff73d3f1b3b 6224->6225 6226 7ff73d3f1b55 __acrt_iob_func 6225->6226 6227 7ff73d3f1b6f 6226->6227 6227->6109 6229 7ff73d3f803f abort WSACleanup 6228->6229 6230 7ff73d3f7f8d SetDefaultDllDirectories 6228->6230 6230->6229 6231 7ff73d3f7fa0 6230->6231 6232 7ff73d3f7fb2 WSAStartup GetStdHandle 6231->6232 6233 7ff73d3f7fef GetConsoleMode 6232->6233 6234 7ff73d3f8018 getenv 6232->6234 6233->6234 6235 7ff73d3f8004 SetConsoleMode 6233->6235 6236 7ff73d3f8035 6234->6236 6237 7ff73d3f8029 _putenv 6234->6237 6235->6234 6235->6236 6236->6120 6237->6236 6538 7ff73d406500 6238->6538 6241 7ff73d4052d1 calloc 6244 7ff73d405f24 _errno 6241->6244 6245 7ff73d405304 6241->6245 6242 7ff73d405e7f 6569 7ff73d406750 6242->6569 6248 7ff73d40648d 6244->6248 6550 7ff73d406620 6245->6550 6246 7ff73d405e8f 6249 7ff73d405f16 _errno 6246->6249 6251 7ff73d405ec0 DeviceIoControl 6246->6251 6248->6157 6248->6173 6254 7ff73d40648a 6249->6254 6255 7ff73d405eec free GetLastError 6251->6255 6256 7ff73d405f6a calloc 6251->6256 6252 7ff73d405f4a _errno free 6252->6248 6253 7ff73d405318 fwrite 6257 7ff73d40c690 6253->6257 6254->6248 6258 7ff73d405f02 malloc 6255->6258 6259 7ff73d406031 _errno _errno 6255->6259 6261 7ff73d406470 _errno free CloseHandle 6256->6261 6315 7ff73d405f87 6256->6315 6260 7ff73d405342 strncpy 6257->6260 6258->6249 6258->6251 6259->6254 6278 7ff73d405382 6260->6278 6261->6254 6263 7ff73d4053a6 strlen 6264 7ff73d4053c9 strchr 6263->6264 6263->6278 6264->6278 6326 7ff73d405850 free 6264->6326 6265 7ff73d4064ac free 6267 7ff73d4064c2 6265->6267 6281 7ff73d40605d 6265->6281 6269 7ff73d406079 fclose _errno 6267->6269 6268 7ff73d406069 free 6268->6269 6269->6248 6270 7ff73d405413 strcmp 6274 7ff73d4056a0 calloc 6270->6274 6275 7ff73d405427 strcmp 6270->6275 6271 7ff73d405550 strcmp 6273 7ff73d405564 strcmp 6271->6273 6271->6278 6272 7ff73d4060a0 free 6272->6268 6272->6281 6273->6278 6279 7ff73d40557b strcmp 6273->6279 6274->6278 6274->6326 6275->6278 6280 7ff73d40543e strcmp 6275->6280 6276 7ff73d4060d0 free 6276->6276 6276->6281 6277 7ff73d4047b0 strlen 6277->6278 6278->6263 6278->6264 6278->6265 6278->6270 6278->6271 6278->6277 6283 7ff73d405b04 strtoull 6278->6283 6285 7ff73d4057d1 strchr 6278->6285 6288 7ff73d405b57 strtoull 6278->6288 6293 7ff73d405baa strtoull 6278->6293 6294 7ff73d405bfd strtoull 6278->6294 6298 7ff73d405c50 strtoull 6278->6298 6300 7ff73d405940 strtoull 6278->6300 6302 7ff73d405ca3 strtoull 6278->6302 6304 7ff73d405989 strtoull 6278->6304 6306 7ff73d405a50 strtoull 6278->6306 6308 7ff73d4058ba calloc 6278->6308 6309 7ff73d405cf6 strtoull 6278->6309 6311 7ff73d405a90 strtoull 6278->6311 6313 7ff73d405d49 strtoull 6278->6313 6316 7ff73d40550c strtoull 6278->6316 6317 7ff73d405d9c strtoull 6278->6317 6319 7ff73d405def strtoull 6278->6319 6322 7ff73d405866 memcpy 6278->6322 6323 7ff73d405e42 strtoull 6278->6323 6324 7ff73d4059d8 strtoul 6278->6324 6278->6326 6562 7ff73d3f7e90 6278->6562 6279->6278 6282 7ff73d405592 strcmp 6279->6282 6280->6278 6284 7ff73d405455 strcmp 6280->6284 6281->6268 6281->6272 6281->6276 6282->6278 6286 7ff73d4055a9 strcmp 6282->6286 6283->6278 6283->6326 6284->6278 6287 7ff73d40546c strcmp 6284->6287 6285->6278 6285->6326 6286->6278 6291 7ff73d4055c0 strcmp 6286->6291 6287->6278 6289 7ff73d405483 strcmp 6287->6289 6288->6278 6288->6326 6289->6278 6295 7ff73d40549a strcmp 6289->6295 6290 7ff73d406457 _errno 6290->6261 6291->6278 6297 7ff73d4055d7 strcmp 6291->6297 6292 7ff73d40602c 6292->6290 6293->6278 6293->6326 6294->6278 6294->6326 6295->6278 6299 7ff73d4054b1 strcmp 6295->6299 6296 7ff73d406277 calloc 6296->6261 6296->6315 6297->6278 6301 7ff73d4055ee strcmp 6297->6301 6298->6278 6298->6326 6299->6278 6303 7ff73d4054c8 strcmp 6299->6303 6300->6278 6300->6326 6301->6278 6305 7ff73d405605 strcmp 6301->6305 6302->6278 6302->6326 6303->6278 6307 7ff73d4054df strcmp 6303->6307 6304->6278 6304->6326 6305->6278 6310 7ff73d40561c strcmp 6305->6310 6306->6278 6306->6326 6307->6278 6312 7ff73d4058d2 strchr 6308->6312 6308->6326 6309->6278 6309->6326 6310->6278 6314 7ff73d405633 strcmp 6310->6314 6311->6278 6311->6326 6312->6278 6313->6278 6313->6326 6314->6278 6318 7ff73d40564a strcmp 6314->6318 6315->6290 6315->6292 6315->6296 6325 7ff73d40640a calloc 6315->6325 6316->6278 6316->6326 6317->6278 6317->6326 6318->6278 6320 7ff73d405661 strcmp 6318->6320 6319->6278 6319->6326 6320->6307 6321 7ff73d405678 calloc 6320->6321 6321->6278 6321->6326 6322->6278 6323->6278 6323->6326 6324->6278 6324->6326 6325->6261 6325->6315 6326->6281 6328 7ff73d40a64a 6327->6328 6329 7ff73d40a455 strcmp 6327->6329 6334 7ff73d40b2a0 2 API calls 6328->6334 6346 7ff73d40a65d 6328->6346 6330 7ff73d40a669 6329->6330 6331 7ff73d40a46c strcmp 6329->6331 6335 7ff73d40b2a0 2 API calls 6330->6335 6330->6346 6332 7ff73d40a68b 6331->6332 6333 7ff73d40a483 strcmp 6331->6333 6341 7ff73d40b2a0 2 API calls 6332->6341 6345 7ff73d40a69e 6332->6345 6336 7ff73d40a49a strcmp 6333->6336 6337 7ff73d40a6cd 6333->6337 6334->6346 6335->6346 6339 7ff73d40a4b1 strcmp 6336->6339 6340 7ff73d40a6f6 6336->6340 6338 7ff73d40a6e0 6337->6338 6344 7ff73d40b2a0 2 API calls 6337->6344 6338->6345 6338->6346 6347 7ff73d40a4c8 strcmp 6339->6347 6348 7ff73d40a715 6339->6348 6340->6345 6349 7ff73d40b2a0 2 API calls 6340->6349 6341->6345 6342 7ff73d40a6c3 puts 6343 7ff73d40a643 6342->6343 6343->6202 6344->6338 6352 7ff73d40b2a0 2 API calls 6345->6352 6346->6342 6350 7ff73d40a73d 6347->6350 6351 7ff73d40a4df strcmp 6347->6351 6348->6345 6355 7ff73d40b2a0 2 API calls 6348->6355 6349->6345 6350->6345 6356 7ff73d40b2a0 2 API calls 6350->6356 6353 7ff73d40a75c 6351->6353 6354 7ff73d40a4f6 strcmp 6351->6354 6352->6343 6353->6345 6359 7ff73d40b2a0 2 API calls 6353->6359 6357 7ff73d40a77b 6354->6357 6358 7ff73d40a50d strcmp 6354->6358 6355->6345 6356->6345 6357->6345 6362 7ff73d40b2a0 2 API calls 6357->6362 6360 7ff73d40a797 6358->6360 6361 7ff73d40a524 strcmp 6358->6361 6359->6345 6360->6345 6365 7ff73d40b2a0 2 API calls 6360->6365 6363 7ff73d40a53b strcmp 6361->6363 6364 7ff73d40a7b2 6361->6364 6362->6345 6366 7ff73d40a7cd 6363->6366 6367 7ff73d40a552 strcmp 6363->6367 6364->6345 6370 7ff73d40b2a0 2 API calls 6364->6370 6365->6345 6366->6345 6372 7ff73d40b2a0 2 API calls 6366->6372 6368 7ff73d40a7e8 6367->6368 6369 7ff73d40a569 strcmp 6367->6369 6368->6345 6374 7ff73d40b2a0 2 API calls 6368->6374 6371 7ff73d40a580 strcmp 6369->6371 6401 7ff73d40a828 6369->6401 6370->6345 6373 7ff73d40a597 strcmp 6371->6373 6409 7ff73d40a8b0 6371->6409 6372->6345 6375 7ff73d40a9b7 6373->6375 6376 7ff73d40a5ae strcmp 6373->6376 6374->6345 6375->6343 6385 7ff73d40a9d2 6375->6385 6388 7ff73d40ab19 6375->6388 6377 7ff73d40aa21 6376->6377 6378 7ff73d40a5c5 strcmp 6376->6378 6377->6343 6389 7ff73d40abd9 6377->6389 6390 7ff73d40aa3c 6377->6390 6379 7ff73d40a5dc strcmp 6378->6379 6400 7ff73d40aa90 6378->6400 6381 7ff73d40a5f3 strcmp 6379->6381 6411 7ff73d40ab56 6379->6411 6380 7ff73d40b2a0 fputc __acrt_iob_func 6380->6401 6382 7ff73d40a60a strcmp 6381->6382 6383 7ff73d40ac1b 6381->6383 6386 7ff73d40ac70 6382->6386 6387 7ff73d40a621 __acrt_iob_func 6382->6387 6383->6343 6391 7ff73d40ac7f 6383->6391 6410 7ff73d40ac32 6383->6410 6384 7ff73d40b2a0 fputc __acrt_iob_func 6384->6409 6385->6343 6403 7ff73d40b2a0 fputc __acrt_iob_func 6385->6403 6628 7ff73d40b840 6386->6628 6392 7ff73d40a3f0 fputc 6387->6392 6388->6343 6393 7ff73d40b2a0 2 API calls 6388->6393 6389->6343 6397 7ff73d40b2a0 2 API calls 6389->6397 6390->6343 6406 7ff73d40b2a0 fputc __acrt_iob_func 6390->6406 6405 7ff73d40ac92 puts 6391->6405 6396 7ff73d40a63e 6392->6396 6393->6388 6395 7ff73d40a930 puts 6395->6409 6613 7ff73d40bb70 __acrt_iob_func 6396->6613 6397->6389 6400->6343 6408 7ff73d40b2a0 fputc __acrt_iob_func 6400->6408 6401->6343 6401->6380 6404 7ff73d40a862 puts 6401->6404 6616 7ff73d40b370 6401->6616 6402 7ff73d40b2a0 2 API calls 6402->6410 6403->6385 6404->6343 6404->6401 6405->6343 6405->6391 6406->6390 6407 7ff73d40b2a0 fputc __acrt_iob_func 6407->6411 6408->6400 6409->6343 6409->6384 6409->6395 6410->6402 6413 7ff73d40ac57 puts 6410->6413 6411->6343 6411->6407 6412 7ff73d40ab80 puts 6411->6412 6412->6343 6412->6411 6413->6343 6413->6410 6415 7ff73d405113 _errno _errno 6414->6415 6416 7ff73d404ca8 6414->6416 6417 7ff73d405145 6415->6417 6418 7ff73d40512f _errno _errno 6415->6418 6419 7ff73d404d0f SetupDiEnumDeviceInfo 6416->6419 6431 7ff73d404d84 WideCharToMultiByte 6416->6431 6423 7ff73d405150 _errno 6417->6423 6424 7ff73d40517e free 6418->6424 6427 7ff73d40518b 6418->6427 6419->6416 6420 7ff73d404d00 GetLastError 6419->6420 6420->6416 6422 7ff73d404f9b SetupDiDestroyDeviceInfoList FindFirstFileA 6420->6422 6422->6418 6425 7ff73d404fd9 6422->6425 6426 7ff73d40515c FindClose 6423->6426 6424->6427 6428 7ff73d40506c memcmp 6425->6428 6426->6418 6427->6149 6429 7ff73d405053 FindNextFileA 6428->6429 6430 7ff73d405081 strlen 6428->6430 6429->6428 6432 7ff73d405111 6429->6432 6433 7ff73d405091 6430->6433 6434 7ff73d404ff8 6430->6434 6431->6416 6435 7ff73d404dc4 malloc 6431->6435 6432->6426 6433->6434 6437 7ff73d4050a4 realloc 6433->6437 6434->6423 6434->6429 6436 7ff73d4051d0 4 API calls 6434->6436 6438 7ff73d405001 memcpy 6434->6438 6440 7ff73d404f0b 6435->6440 6441 7ff73d404dd9 WideCharToMultiByte 6435->6441 6436->6434 6437->6438 6439 7ff73d4050db _errno 6437->6439 6438->6434 6439->6432 6439->6434 6440->6416 6450 7ff73d404f44 GetLastError 6440->6450 6452 7ff73d404f88 free 6440->6452 6442 7ff73d404e77 free 6441->6442 6446 7ff73d404e0d 6441->6446 6442->6440 6444 7ff73d404e3e strlen 6444->6446 6446->6444 6447 7ff73d404e84 realloc 6446->6447 6448 7ff73d404ea9 memcpy 6446->6448 6673 7ff73d4051d0 6446->6673 6447->6448 6449 7ff73d404ee6 _errno 6447->6449 6448->6446 6449->6446 6450->6440 6451 7ff73d404f4e calloc 6450->6451 6451->6440 6452->6440 6454 7ff73d3f7e60 fputc 6453->6454 6455 7ff73d3f7d3c fwrite 6454->6455 6456 7ff73d3f7e60 fputc 6455->6456 6457 7ff73d3f7d76 6456->6457 6458 7ff73d3f7e60 fputc 6457->6458 6459 7ff73d3f7d8f 6458->6459 6460 7ff73d3f7e60 fputc 6459->6460 6461 7ff73d3f7da8 6460->6461 6462 7ff73d3f7e60 fputc 6461->6462 6463 7ff73d3f7dc1 6462->6463 6464 7ff73d3f7e60 fputc 6463->6464 6465 7ff73d3f7dda 6464->6465 6466 7ff73d3f7e60 fputc 6465->6466 6467 7ff73d3f7df3 6466->6467 6468 7ff73d3f7e60 fputc 6467->6468 6469 7ff73d3f7e0c 6468->6469 6470 7ff73d3f7e60 fputc 6469->6470 6471 7ff73d3f7e25 6470->6471 6472 7ff73d3f7e60 fputc 6471->6472 6473 7ff73d3f7e3e 6472->6473 6681 7ff73d3f1d90 6474->6681 6476 7ff73d3f7c3d __acrt_iob_func 6476->6193 6478 7ff73d3f1d90 fputc 6477->6478 6479 7ff73d3f7d0c 6478->6479 6479->6140 6481 7ff73d3f1d90 fputc 6480->6481 6482 7ff73d40a40d 6481->6482 6482->6141 6685 7ff73d40c140 6483->6685 6486 7ff73d40c140 12 API calls 6491 7ff73d40ace3 6486->6491 6487 7ff73d40ad0c 6488 7ff73d40ad60 6487->6488 6489 7ff73d40ad13 getenv 6487->6489 6490 7ff73d40ad77 6488->6490 6495 7ff73d40c140 12 API calls 6488->6495 6492 7ff73d40ad2b strcmp 6489->6492 6493 7ff73d40ad3e 6489->6493 6496 7ff73d40ad8d 6490->6496 6498 7ff73d40c140 12 API calls 6490->6498 6491->6487 6497 7ff73d40c140 12 API calls 6491->6497 6492->6493 6494 7ff73d40c140 12 API calls 6493->6494 6494->6488 6495->6490 6499 7ff73d40ada4 6496->6499 6500 7ff73d40c140 12 API calls 6496->6500 6497->6487 6498->6496 6501 7ff73d40adbb 6499->6501 6503 7ff73d40c140 12 API calls 6499->6503 6500->6499 6502 7ff73d40add2 6501->6502 6504 7ff73d40c140 12 API calls 6501->6504 6505 7ff73d40ade9 6502->6505 6506 7ff73d40c140 12 API calls 6502->6506 6503->6501 6504->6502 6507 7ff73d40ae00 6505->6507 6508 7ff73d40c140 12 API calls 6505->6508 6506->6505 6509 7ff73d40ae16 6507->6509 6510 7ff73d40c140 12 API calls 6507->6510 6508->6507 6511 7ff73d40ae2c 6509->6511 6512 7ff73d40c140 12 API calls 6509->6512 6510->6509 6513 7ff73d40ae42 6511->6513 6514 7ff73d40c140 12 API calls 6511->6514 6512->6511 6515 7ff73d40c140 12 API calls 6513->6515 6517 7ff73d40ae58 6513->6517 6514->6513 6515->6517 6516 7ff73d40b27e 6516->6194 6517->6516 6518 7ff73d40ae9c calloc 6517->6518 6519 7ff73d40afbf 6517->6519 6518->6519 6521 7ff73d40aeb2 qsort 6518->6521 6520 7ff73d40c140 12 API calls 6519->6520 6528 7ff73d40afce 6520->6528 6523 7ff73d40afa8 free 6521->6523 6524 7ff73d40aeff 6521->6524 6523->6519 6524->6523 6524->6524 6525 7ff73d40b030 getenv 6526 7ff73d40b048 strcmp 6525->6526 6525->6528 6526->6528 6527 7ff73d40b370 5 API calls 6527->6528 6528->6516 6528->6525 6528->6527 6529 7ff73d40b0da _time64 6528->6529 6530 7ff73d40b1bf strncpy 6528->6530 6532 7ff73d40b470 fputc 6528->6532 6533 7ff73d40c140 12 API calls 6528->6533 6534 7ff73d40b700 fputc 6528->6534 6529->6528 6531 7ff73d40c140 12 API calls 6530->6531 6531->6528 6532->6528 6533->6528 6534->6528 6536 7ff73d3f1d90 fputc 6535->6536 6537 7ff73d40b2dc 6536->6537 6537->6187 6539 7ff73d406551 6538->6539 6546 7ff73d40651c 6538->6546 6600 7ff73d406c20 6539->6600 6542 7ff73d4052c9 6542->6241 6542->6242 6543 7ff73d4065e0 strcmp 6543->6542 6543->6546 6544 7ff73d406580 6547 7ff73d4065a0 strcmp 6544->6547 6545 7ff73d4065fe 6545->6542 6546->6542 6546->6543 6548 7ff73d4065b3 FindNextFileA 6547->6548 6549 7ff73d4065c0 FindClose 6547->6549 6548->6547 6548->6549 6549->6542 6551 7ff73d40664b 6550->6551 6552 7ff73d4066e1 _errno 6551->6552 6553 7ff73d406c20 fputc 6551->6553 6554 7ff73d40530f 6552->6554 6555 7ff73d40666a CreateFileA 6553->6555 6554->6252 6554->6253 6555->6552 6556 7ff73d40669d 6555->6556 6557 7ff73d4066d8 CloseHandle 6556->6557 6558 7ff73d406709 LocalFree 6556->6558 6557->6552 6558->6557 6559 7ff73d40671a _open_osfhandle 6558->6559 6560 7ff73d40673e CloseHandle 6559->6560 6561 7ff73d40672d _fdopen 6559->6561 6560->6554 6561->6554 6563 7ff73d3f7eb6 malloc 6562->6563 6564 7ff73d3f7eae 6562->6564 6566 7ff73d3f7f2a 6563->6566 6567 7ff73d3f7edc 6563->6567 6564->6563 6564->6567 6565 7ff73d3f7ee0 fgetc 6565->6566 6565->6567 6566->6278 6567->6565 6567->6566 6568 7ff73d3f7f00 realloc 6567->6568 6568->6566 6568->6567 6570 7ff73d4067fc SetupDiGetClassDevsExW 6569->6570 6577 7ff73d406788 6569->6577 6571 7ff73d406ba4 6570->6571 6579 7ff73d406848 6570->6579 6571->6246 6572 7ff73d40689b SetupDiEnumDeviceInfo 6573 7ff73d4069c0 GetLastError 6572->6573 6572->6579 6575 7ff73d406b8f SetupDiDestroyDeviceInfoList _errno 6573->6575 6576 7ff73d4069b7 6573->6576 6574 7ff73d4067e0 strcmp 6574->6577 6578 7ff73d406b1a 6574->6578 6575->6571 6576->6246 6577->6570 6577->6574 6581 7ff73d406b81 _errno 6578->6581 6582 7ff73d406b3a calloc 6578->6582 6579->6572 6579->6576 6580 7ff73d406923 WideCharToMultiByte 6579->6580 6583 7ff73d406aca SetupDiDestroyDeviceInfoList CreateFileW 6579->6583 6594 7ff73d406a0a GetLastError 6579->6594 6580->6576 6584 7ff73d406957 malloc 6580->6584 6581->6571 6582->6581 6590 7ff73d406b53 6582->6590 6585 7ff73d406b09 free 6583->6585 6584->6576 6586 7ff73d406966 WideCharToMultiByte 6584->6586 6585->6571 6587 7ff73d406b18 6585->6587 6588 7ff73d40699a strcmp free 6586->6588 6589 7ff73d406aa9 6586->6589 6587->6581 6588->6576 6588->6579 6592 7ff73d406aac free 6589->6592 6591 7ff73d406b79 free 6590->6591 6593 7ff73d406bdc CreateFileW 6590->6593 6591->6581 6592->6576 6593->6585 6594->6576 6595 7ff73d406a11 calloc 6594->6595 6595->6576 6596 7ff73d406a28 6595->6596 6596->6589 6597 7ff73d406a62 calloc 6596->6597 6597->6589 6599 7ff73d406a7a 6597->6599 6598 7ff73d406aa1 free 6598->6589 6599->6592 6599->6598 6603 7ff73d3f1de0 6600->6603 6604 7ff73d3f1df1 6603->6604 6605 7ff73d3f1e19 6603->6605 6609 7ff73d3f2840 6604->6609 6607 7ff73d3f2840 fputc 6605->6607 6608 7ff73d3f1e0b FindFirstFileA 6607->6608 6608->6544 6608->6545 6611 7ff73d3f286b 6609->6611 6610 7ff73d3f3360 6610->6608 6611->6610 6612 7ff73d3f30ab fputc 6611->6612 6612->6611 6614 7ff73d40a3f0 fputc 6613->6614 6615 7ff73d40bb9c 6614->6615 6615->6343 6664 7ff73d3f27e0 6616->6664 6618 7ff73d40b37c memset 6619 7ff73d40b3e4 6618->6619 6620 7ff73d40b3e8 6619->6620 6621 7ff73d40b40d 6619->6621 6666 7ff73d3f13a0 6620->6666 6623 7ff73d40b43c 6621->6623 6624 7ff73d40b413 strchr 6621->6624 6669 7ff73d40b820 6623->6669 6624->6623 6625 7ff73d40b3ef strncpy 6627 7ff73d40b461 6625->6627 6627->6401 6629 7ff73d40b86f 6628->6629 6630 7ff73d40b860 6628->6630 6632 7ff73d40b2a0 2 API calls 6629->6632 6631 7ff73d40b2a0 2 API calls 6630->6631 6631->6629 6633 7ff73d40b8a1 6632->6633 6634 7ff73d40b2a0 2 API calls 6633->6634 6635 7ff73d40b8c9 6634->6635 6636 7ff73d40b2a0 2 API calls 6635->6636 6637 7ff73d40b8df 6636->6637 6638 7ff73d40b2a0 2 API calls 6637->6638 6639 7ff73d40b8ee 6638->6639 6640 7ff73d40b2a0 2 API calls 6639->6640 6641 7ff73d40b8fd 6640->6641 6642 7ff73d40b2a0 2 API calls 6641->6642 6643 7ff73d40b90c 6642->6643 6644 7ff73d40b2a0 2 API calls 6643->6644 6645 7ff73d40b91b 6644->6645 6646 7ff73d40b2a0 2 API calls 6645->6646 6647 7ff73d40b92a 6646->6647 6648 7ff73d40b2a0 2 API calls 6647->6648 6649 7ff73d40b938 6648->6649 6650 7ff73d40b2a0 2 API calls 6649->6650 6651 7ff73d40b946 6650->6651 6652 7ff73d40b2a0 2 API calls 6651->6652 6653 7ff73d40b954 6652->6653 6654 7ff73d40b2a0 2 API calls 6653->6654 6655 7ff73d40b962 6654->6655 6656 7ff73d40b97a puts 6655->6656 6657 7ff73d40b96c 6655->6657 6662 7ff73d40b978 6656->6662 6658 7ff73d40b2a0 2 API calls 6657->6658 6658->6662 6659 7ff73d40bb54 6659->6343 6660 7ff73d40b2a0 fputc __acrt_iob_func 6660->6662 6661 7ff73d40b370 5 API calls 6661->6662 6662->6659 6662->6660 6662->6661 6663 7ff73d40b9d0 puts 6662->6663 6663->6662 6665 7ff73d3f27ef 6664->6665 6665->6618 6665->6665 6672 7ff73d3f20e0 FormatMessageW 6666->6672 6668 7ff73d3f13aa 6668->6625 6670 7ff73d3f1de0 fputc 6669->6670 6671 7ff73d40b838 6670->6671 6671->6627 6672->6668 6676 7ff73d4051e1 6673->6676 6674 7ff73d40523b calloc 6677 7ff73d404efb free 6674->6677 6679 7ff73d40525f _strdup 6674->6679 6675 7ff73d405220 strcmp 6675->6676 6675->6677 6676->6674 6676->6675 6677->6440 6679->6677 6680 7ff73d405276 free 6679->6680 6680->6677 6682 7ff73d3f1da5 6681->6682 6683 7ff73d3f2840 fputc 6682->6683 6684 7ff73d3f1dbd 6683->6684 6684->6476 6686 7ff73d40c179 6685->6686 6689 7ff73d40c19f 6685->6689 6687 7ff73d40c20c 6686->6687 6688 7ff73d40c181 __acrt_iob_func 6686->6688 6700 7ff73d3f1e40 6687->6700 6691 7ff73d3f1d90 fputc 6688->6691 6693 7ff73d40c1d9 __acrt_iob_func _fileno _isatty 6689->6693 6694 7ff73d40c1b0 strcmp 6689->6694 6692 7ff73d40acd4 6691->6692 6692->6486 6693->6686 6694->6686 6695 7ff73d40c1c6 strcmp 6694->6695 6695->6686 6695->6693 6696 7ff73d40c2c8 6697 7ff73d40c32e free 6696->6697 6697->6692 6698 7ff73d40c2e8 __acrt_iob_func fputs strlen 6699 7ff73d40c21c 6698->6699 6699->6696 6699->6697 6699->6698 6701 7ff73d3f1de0 fputc 6700->6701 6702 7ff73d3f1e66 6701->6702 6703 7ff73d3f1e6f malloc 6702->6703 6706 7ff73d3f1e99 6702->6706 6704 7ff73d3f1e85 6703->6704 6703->6706 6705 7ff73d3f1de0 fputc 6704->6705 6705->6706 6706->6699 6707->6208 6708 7ff73d3f13d0 6709 7ff73d3f13e3 6708->6709 6710 7ff73d3f1411 6708->6710 6711 7ff73d3f13f0 WSACleanup 6709->6711 6711->6710 6711->6711 7167 7ff73d3f7150 7168 7ff73d3f7165 DeleteCriticalSection 7167->7168 7169 7ff73d3f7187 7167->7169 7168->7169 8087 7ff73d3f15d0 8088 7ff73d3f15e2 __acrt_iob_func 8087->8088 8092 7ff73d3f23f0 __stdio_common_vfprintf 8088->8092 8091 7ff73d3f162f 8092->8091 7170 7ff73d408540 7171 7ff73d408558 __acrt_iob_func 7170->7171 7172 7ff73d40857a calloc 7170->7172 7272 7ff73d408ea0 7171->7272 7174 7ff73d408ce2 perror 7172->7174 7201 7ff73d40859d 7172->7201 7175 7ff73d408575 7174->7175 7176 7ff73d408600 strcmp 7177 7ff73d408640 strcmp 7176->7177 7176->7201 7178 7ff73d4086f0 strcmp 7177->7178 7177->7201 7179 7ff73d408729 strcmp 7178->7179 7178->7201 7181 7ff73d4087b9 strcmp 7179->7181 7179->7201 7183 7ff73d40881f strcmp 7181->7183 7181->7201 7182 7ff73d408669 _stricmp 7182->7201 7185 7ff73d408885 strcmp 7183->7185 7183->7201 7189 7ff73d408899 7185->7189 7190 7ff73d4088eb strcmp 7185->7190 7186 7ff73d40869e strlen 7194 7ff73d4086c5 strtoul 7186->7194 7186->7201 7187 7ff73d408cc3 __acrt_iob_func 7191 7ff73d408ccc 7187->7191 7188 7ff73d4087b4 strncpy 7395 7ff73d406c50 7188->7395 7189->7190 7192 7ff73d408cf0 __acrt_iob_func fwrite 7189->7192 7218 7ff73d4088af strtoul 7189->7218 7198 7ff73d4088ff 7190->7198 7199 7ff73d408951 strcmp 7190->7199 7458 7ff73d3f81d0 7191->7458 7207 7ff73d408634 7192->7207 7193 7ff73d408753 strtoul 7193->7201 7202 7ff73d408ddd __acrt_iob_func 7193->7202 7194->7201 7203 7ff73d4086e0 7194->7203 7196 7ff73d4087e3 strtoul 7196->7201 7208 7ff73d408dfb __acrt_iob_func 7196->7208 7198->7192 7198->7199 7225 7ff73d408915 strtoul 7198->7225 7204 7ff73d4089ab strcmp 7199->7204 7205 7ff73d408965 7199->7205 7200 7ff73d408d22 free 7200->7175 7201->7176 7201->7177 7201->7178 7201->7179 7201->7181 7201->7182 7201->7183 7201->7185 7201->7186 7201->7187 7201->7188 7201->7192 7201->7193 7201->7194 7201->7196 7201->7202 7201->7207 7201->7208 7211 7ff73d408849 strtoul 7201->7211 7216 7ff73d408e16 __acrt_iob_func 7201->7216 7275 7ff73d3f8090 7201->7275 7288 7ff73d3f8be0 7201->7288 7210 7ff73d408e80 7202->7210 7203->7187 7213 7ff73d4089ef strcmp 7204->7213 7214 7ff73d4089bf 7204->7214 7205->7192 7205->7204 7226 7ff73d40897b strtoul 7205->7226 7206 7ff73d408d50 free 7206->7200 7206->7207 7207->7200 7207->7206 7212 7ff73d408d80 free 7207->7212 7208->7210 7217 7ff73d3f81d0 fputc 7210->7217 7211->7201 7211->7216 7212->7207 7212->7212 7220 7ff73d408a33 strcmp 7213->7220 7221 7ff73d408a03 7213->7221 7214->7213 7310 7ff73d3f8310 7214->7310 7216->7210 7222 7ff73d408e8b exit 7217->7222 7223 7ff73d4088d0 7218->7223 7224 7ff73d408e31 __acrt_iob_func 7218->7224 7219 7ff73d408d93 perror 7237 7ff73d408da9 perror 7219->7237 7229 7ff73d408a77 strcmp 7220->7229 7230 7ff73d408a47 7220->7230 7221->7220 7246 7ff73d3f8310 6 API calls 7221->7246 7223->7224 7228 7ff73d4088db 7223->7228 7224->7210 7231 7ff73d408e4c __acrt_iob_func 7225->7231 7232 7ff73d408936 7225->7232 7235 7ff73d408e67 __acrt_iob_func 7226->7235 7236 7ff73d40899c 7226->7236 7227 7ff73d408c72 free 7227->7175 7228->7190 7233 7ff73d408a8b 7229->7233 7234 7ff73d408af1 strcmp 7229->7234 7230->7229 7253 7ff73d3f8310 6 API calls 7230->7253 7231->7210 7232->7231 7240 7ff73d408941 7232->7240 7233->7234 7241 7ff73d408a8f calloc 7233->7241 7242 7ff73d408b1d strcmp 7234->7242 7243 7ff73d408b04 7234->7243 7235->7210 7236->7204 7237->7207 7239 7ff73d408c80 free 7239->7227 7245 7ff73d408c65 7239->7245 7240->7199 7241->7237 7247 7ff73d408ab0 7241->7247 7249 7ff73d408b4d strcmp 7242->7249 7250 7ff73d408b31 7242->7250 7243->7242 7248 7ff73d408b09 7243->7248 7245->7191 7245->7227 7245->7239 7251 7ff73d408cb4 free 7245->7251 7252 7ff73d408a21 7246->7252 7317 7ff73d3f8af0 7247->7317 7248->7207 7260 7ff73d408bf2 strcmp 7248->7260 7261 7ff73d408dba __acrt_iob_func 7248->7261 7269 7ff73d3f8be0 12 API calls 7248->7269 7255 7ff73d408ba7 strcmp 7249->7255 7256 7ff73d408b61 7249->7256 7250->7249 7259 7ff73d408b3a 7250->7259 7251->7245 7252->7207 7252->7220 7257 7ff73d408a65 7253->7257 7255->7260 7264 7ff73d408bbb 7255->7264 7256->7255 7263 7ff73d408b6a 7256->7263 7257->7207 7257->7229 7323 7ff73d3f83b0 _strdup getenv 7259->7323 7260->7248 7260->7261 7265 7ff73d3f81d0 fputc 7261->7265 7361 7ff73d3f8d70 strlen calloc 7263->7361 7264->7260 7388 7ff73d3f8b40 _stricmp 7264->7388 7265->7207 7269->7248 7273 7ff73d3f1d90 fputc 7272->7273 7274 7ff73d408ec4 7273->7274 7274->7175 7276 7ff73d3f810d __acrt_iob_func fwrite 7275->7276 7277 7ff73d3f80c7 7275->7277 7283 7ff73d3f8150 7276->7283 7278 7ff73d3f80e9 __acrt_iob_func 7277->7278 7279 7ff73d3f8137 7277->7279 7280 7ff73d3f8176 7278->7280 7281 7ff73d3f80fe _errno strerror 7278->7281 7279->7283 7284 7ff73d3f819b __acrt_iob_func 7279->7284 7282 7ff73d3f13a0 FormatMessageW 7280->7282 7285 7ff73d3f817d 7281->7285 7282->7285 7283->7201 7287 7ff73d3f81d0 fputc 7284->7287 7286 7ff73d3f81d0 fputc 7285->7286 7286->7283 7287->7283 7289 7ff73d3f8bfc 7288->7289 7290 7ff73d3f8c05 7289->7290 7291 7ff73d3f8d4c perror 7289->7291 7293 7ff73d3f8c7c 7290->7293 7294 7ff73d3f8c26 7290->7294 7292 7ff73d3f8d14 7291->7292 7292->7201 7295 7ff73d3f8d1e feof 7293->7295 7296 7ff73d3f8c8c __acrt_iob_func fwrite 7293->7296 7297 7ff73d3f8cb3 ferror 7294->7297 7299 7ff73d3f8c5a __acrt_iob_func 7294->7299 7295->7296 7298 7ff73d3f8d2e 7295->7298 7306 7ff73d3f8c77 7296->7306 7301 7ff73d3f8cbf _errno 7297->7301 7302 7ff73d3f8cce 7297->7302 7298->7296 7298->7306 7303 7ff73d3f81d0 fputc 7299->7303 7300 7ff73d3f8d0c fclose 7300->7292 7301->7302 7304 7ff73d3f8d5c perror 7301->7304 7461 7ff73d4029d0 strlen 7302->7461 7303->7306 7304->7306 7306->7300 7308 7ff73d3f8ce1 __acrt_iob_func 7309 7ff73d3f81d0 fputc 7308->7309 7309->7306 7311 7ff73d3f8321 strtoul 7310->7311 7312 7ff73d3f834b __acrt_iob_func fwrite 7310->7312 7313 7ff73d3f837f __acrt_iob_func 7311->7313 7314 7ff73d3f8347 7311->7314 7312->7314 7315 7ff73d3f81d0 fputc 7313->7315 7314->7207 7314->7213 7316 7ff73d3f839f exit 7315->7316 7318 7ff73d4029d0 strlen 7317->7318 7319 7ff73d3f8b02 7318->7319 7320 7ff73d3f8b25 7319->7320 7321 7ff73d3f8b08 __acrt_iob_func 7319->7321 7320->7207 7320->7234 7322 7ff73d3f81d0 fputc 7321->7322 7322->7320 7324 7ff73d3f844b 7323->7324 7325 7ff73d3f83eb strcmp 7323->7325 7327 7ff73d3f8485 7324->7327 7328 7ff73d3f86be perror 7324->7328 7325->7324 7326 7ff73d3f8401 strtoul 7325->7326 7329 7ff73d3f8424 __acrt_iob_func 7326->7329 7330 7ff73d3f8420 7326->7330 7331 7ff73d3f84d1 free __acrt_iob_func fwrite 7327->7331 7332 7ff73d3f848a 7327->7332 7333 7ff73d3f869d 7328->7333 7334 7ff73d3f81d0 fputc 7329->7334 7330->7324 7330->7329 7331->7333 7335 7ff73d3f8503 strrchr 7332->7335 7336 7ff73d3f848f strchr 7332->7336 7333->7248 7337 7ff73d3f8441 exit 7334->7337 7338 7ff73d3f84a5 7335->7338 7340 7ff73d3f8631 free __acrt_iob_func 7335->7340 7336->7338 7339 7ff73d3f8678 free __acrt_iob_func 7336->7339 7337->7324 7338->7340 7356 7ff73d3f84c0 7338->7356 7341 7ff73d3f8692 7339->7341 7340->7341 7342 7ff73d3f81d0 fputc 7341->7342 7342->7333 7343 7ff73d3f864d free __acrt_iob_func 7345 7ff73d3f869f 7343->7345 7346 7ff73d3f8669 _errno strerror 7343->7346 7344 7ff73d3f86e5 7347 7ff73d3f8709 free __acrt_iob_func 7344->7347 7351 7ff73d3f8743 memcpy 7344->7351 7352 7ff73d3f13a0 FormatMessageW 7345->7352 7348 7ff73d3f86a7 7346->7348 7347->7341 7354 7ff73d3f81d0 fputc 7348->7354 7349 7ff73d3f85a5 __acrt_iob_func 7353 7ff73d3f85b9 _errno strerror 7349->7353 7349->7356 7350 7ff73d3f8591 7350->7343 7357 7ff73d3f8755 free 7351->7357 7352->7348 7353->7356 7354->7333 7356->7343 7356->7344 7356->7349 7356->7350 7358 7ff73d3f13a0 FormatMessageW 7356->7358 7359 7ff73d3f81d0 fputc 7356->7359 7463 7ff73d3f1d60 7356->7463 7357->7333 7358->7356 7359->7356 7362 7ff73d3f8de6 perror 7361->7362 7363 7ff73d3f8d98 7361->7363 7362->7363 7363->7207 7364 7ff73d3f8770 _strdup 7363->7364 7365 7ff73d3f879d 7364->7365 7366 7ff73d3f8acc perror 7364->7366 7368 7ff73d3f8a29 free 7365->7368 7377 7ff73d3f87a9 7365->7377 7367 7ff73d3f8ab9 free 7366->7367 7367->7207 7367->7248 7368->7367 7369 7ff73d3f8820 strcspn 7369->7377 7370 7ff73d3f8a38 free 7370->7367 7371 7ff73d3f8853 _strdup strcspn 7371->7377 7372 7ff73d3f8893 calloc 7373 7ff73d3f88ab strchr 7372->7373 7374 7ff73d3f8ada perror 7372->7374 7373->7377 7375 7ff73d3f8aa7 free 7374->7375 7376 7ff73d3f8ab4 free 7375->7376 7376->7367 7377->7369 7377->7370 7377->7371 7377->7372 7378 7ff73d3f8a82 __acrt_iob_func 7377->7378 7380 7ff73d3f8a4e free free __acrt_iob_func 7377->7380 7381 7ff73d3f893e strtoul 7377->7381 7385 7ff73d3f87f0 free 7377->7385 7386 7ff73d3f87d0 __acrt_iob_func 7377->7386 7379 7ff73d3f81d0 fputc 7378->7379 7382 7ff73d3f8a9f free 7379->7382 7383 7ff73d3f81d0 fputc 7380->7383 7381->7377 7381->7380 7382->7375 7384 7ff73d3f8a7d 7383->7384 7384->7376 7385->7377 7387 7ff73d3f81d0 fputc 7386->7387 7387->7385 7389 7ff73d3f8b64 7388->7389 7394 7ff73d3f8b92 7388->7394 7390 7ff73d3f8b75 __acrt_iob_func 7389->7390 7391 7ff73d3f8b9d strtoul 7389->7391 7392 7ff73d3f81d0 fputc 7390->7392 7391->7390 7393 7ff73d3f8bba 7391->7393 7392->7394 7393->7390 7393->7394 7394->7248 7396 7ff73d406c66 7395->7396 7397 7ff73d406500 6 API calls 7396->7397 7398 7ff73d406cb5 7397->7398 7399 7ff73d40776f 7398->7399 7400 7ff73d406cbd 7398->7400 7401 7ff73d406750 23 API calls 7399->7401 7402 7ff73d406620 8 API calls 7400->7402 7404 7ff73d407777 7401->7404 7403 7ff73d406cda 7402->7403 7405 7ff73d406ce3 fwrite 7403->7405 7406 7ff73d407912 _errno 7403->7406 7407 7ff73d407921 _errno 7404->7407 7425 7ff73d407780 7404->7425 7409 7ff73d406d0b 7405->7409 7420 7ff73d407948 7405->7420 7408 7ff73d40833d 7406->7408 7407->7408 7408->7219 7408->7245 7411 7ff73d406d13 7409->7411 7413 7ff73d4083a0 fputc 7409->7413 7410 7ff73d4079d8 calloc 7412 7ff73d408184 7410->7412 7440 7ff73d4079f9 DeviceIoControl _errno 7410->7440 7415 7ff73d406d1b 7411->7415 7417 7ff73d4083a0 fputc 7411->7417 7414 7ff73d408324 _errno free CloseHandle 7412->7414 7413->7411 7414->7408 7418 7ff73d406d23 7415->7418 7419 7ff73d40802f fwrite 7415->7419 7416 7ff73d40792e _errno 7416->7414 7417->7415 7422 7ff73d406d2b 7418->7422 7424 7ff73d4083a0 fputc 7418->7424 7419->7418 7419->7422 7420->7420 7421 7ff73d4083a0 fputc 7420->7421 7421->7409 7423 7ff73d406d33 7422->7423 7427 7ff73d4083a0 fputc 7422->7427 7426 7ff73d406d3b 7423->7426 7429 7ff73d4083a0 fputc 7423->7429 7424->7422 7425->7410 7425->7416 7428 7ff73d406d46 7426->7428 7430 7ff73d4083a0 fputc 7426->7430 7427->7423 7431 7ff73d406d51 7428->7431 7432 7ff73d4083a0 fputc 7428->7432 7429->7426 7430->7428 7433 7ff73d406d5c 7431->7433 7434 7ff73d4083a0 fputc 7431->7434 7432->7431 7435 7ff73d406d67 7433->7435 7436 7ff73d4083a0 fputc 7433->7436 7434->7433 7437 7ff73d406d72 7435->7437 7438 7ff73d4083a0 fputc 7435->7438 7436->7435 7457 7ff73d406d8f 7437->7457 7466 7ff73d4083a0 7437->7466 7438->7437 7439 7ff73d4077e7 fputc fflush 7452 7ff73d407820 7439->7452 7440->7412 7443 7ff73d3f7e90 3 API calls 7443->7452 7444 7ff73d4078f4 _errno 7447 7ff73d407bd5 7444->7447 7448 7ff73d407903 _errno 7444->7448 7445 7ff73d407837 strlen 7446 7ff73d407857 strchr 7445->7446 7445->7452 7446->7444 7446->7452 7449 7ff73d407bda free fclose _errno 7447->7449 7448->7449 7449->7408 7450 7ff73d406e00 fwrite 7450->7457 7451 7ff73d40787d strcmp 7451->7452 7452->7443 7452->7444 7452->7445 7452->7446 7452->7449 7452->7451 7453 7ff73d4078af strtoll 7452->7453 7453->7444 7453->7452 7454 7ff73d4083a0 fputc 7454->7457 7455 7ff73d4076e3 fwrite 7455->7457 7456 7ff73d407681 strchr 7456->7457 7457->7439 7457->7450 7457->7454 7457->7455 7457->7456 7459 7ff73d3f1d90 fputc 7458->7459 7460 7ff73d3f81ed 7459->7460 7460->7207 7462 7ff73d3f8cdb 7461->7462 7462->7300 7462->7308 7464 7ff73d3f1d7b 7463->7464 7465 7ff73d3f1d68 Sleep 7463->7465 7464->7356 7465->7464 7467 7ff73d3f1d90 fputc 7466->7467 7468 7ff73d4083bd 7467->7468 7468->7457 8097 7ff73d3f2cc8 8098 7ff73d3f2e48 8097->8098 8099 7ff73d3f3ec0 34 API calls 8098->8099 8100 7ff73d3f3079 8099->8100 8101 7ff73d40cbc6 8102 7ff73d40cc32 8101->8102 8103 7ff73d3f7320 11 API calls 8102->8103 8104 7ff73d40cc62 8103->8104

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 134 7ff73d404c30-7ff73d404ca2 SetupDiGetClassDevsExW 135 7ff73d405113-7ff73d40512d _errno * 2 134->135 136 7ff73d404ca8-7ff73d404cf8 134->136 137 7ff73d405145-7ff73d405148 135->137 138 7ff73d40512f-7ff73d405132 135->138 139 7ff73d404d0f-7ff73d404d2d SetupDiEnumDeviceInfo 136->139 145 7ff73d405150-7ff73d405159 _errno 137->145 142 7ff73d405168-7ff73d40517c _errno * 2 138->142 140 7ff73d404d00-7ff73d404d07 GetLastError 139->140 141 7ff73d404d2f-7ff73d404d66 139->141 143 7ff73d404d0d 140->143 144 7ff73d404f9b-7ff73d404fd3 SetupDiDestroyDeviceInfoList FindFirstFileA 140->144 141->143 154 7ff73d404d68-7ff73d404d6d 141->154 146 7ff73d40517e-7ff73d405189 free 142->146 147 7ff73d40518b-7ff73d40518e 142->147 143->139 149 7ff73d40513d-7ff73d405143 144->149 150 7ff73d404fd9-7ff73d404ff6 144->150 151 7ff73d40515c-7ff73d40515f FindClose 145->151 152 7ff73d40519f-7ff73d4051ce 146->152 147->152 153 7ff73d405190-7ff73d40519c call 7ff73d40c990 147->153 155 7ff73d405165 149->155 156 7ff73d40506c-7ff73d40507f memcmp 150->156 151->155 153->152 154->143 159 7ff73d404d6f-7ff73d404d82 154->159 155->142 160 7ff73d405053-7ff73d405066 FindNextFileA 156->160 161 7ff73d405081-7ff73d40508f strlen 156->161 159->143 162 7ff73d404d84-7ff73d404dbe WideCharToMultiByte 159->162 160->156 163 7ff73d405134-7ff73d40513b 160->163 164 7ff73d405091-7ff73d40509e 161->164 165 7ff73d40503b-7ff73d40504d call 7ff73d4051d0 161->165 166 7ff73d404f35-7ff73d404f3f 162->166 167 7ff73d404dc4-7ff73d404dd3 malloc 162->167 163->151 169 7ff73d4050a4-7ff73d4050d5 realloc 164->169 170 7ff73d404ff8-7ff73d404ffe 164->170 165->145 165->160 166->143 173 7ff73d404f2b 167->173 174 7ff73d404dd9-7ff73d404e0b WideCharToMultiByte 167->174 171 7ff73d405001-7ff73d405034 memcpy 169->171 172 7ff73d4050db-7ff73d40510b _errno 169->172 170->171 171->165 172->165 176 7ff73d405111 172->176 179 7ff73d404f2e 173->179 177 7ff73d404e0d-7ff73d404e2a 174->177 178 7ff73d404e77-7ff73d404e7f free 174->178 176->151 181 7ff73d404e30-7ff73d404e38 177->181 182 7ff73d404eec-7ff73d404f09 call 7ff73d4051d0 free 177->182 178->173 179->166 181->182 184 7ff73d404e3e-7ff73d404e49 strlen 181->184 182->173 189 7ff73d404f0b-7ff73d404f29 182->189 184->182 186 7ff73d404e4f-7ff73d404e6b 184->186 187 7ff73d404e84-7ff73d404ea7 realloc 186->187 188 7ff73d404e6d-7ff73d404e75 186->188 190 7ff73d404ea9-7ff73d404ee4 memcpy 187->190 191 7ff73d404ee6 _errno 187->191 188->190 189->173 193 7ff73d404f44-7ff73d404f4c GetLastError 189->193 190->182 191->182 193->179 194 7ff73d404f4e-7ff73d404f66 calloc 193->194 194->173 195 7ff73d404f68-7ff73d404f86 194->195 195->173 197 7ff73d404f88-7ff73d404f99 free 195->197 197->173
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: _errno$free$FindSetup$ByteCharDeviceErrorFileInfoLastMultiWidecallocmemcpyreallocstrlen$ClassCloseDestroyDevsEnumFirstListNext_strdupmallocmemcmpstrcmp
    • String ID: 0$ProtectedPrefix\Administrators\AmneziaWG\$ROOT\WIREGUARD$SWD\WireGuard$\\.\pipe\*
    • API String ID: 511970441-1465563367
    • Opcode ID: 31473880f6ee27ced1abcb7dbae51acad2ab8800172729fbd3af9c349e15b66e
    • Instruction ID: ba43aecad17dd14afbd484d0f82693128c6138fda2b43111788989c69b8226dd
    • Opcode Fuzzy Hash: 31473880f6ee27ced1abcb7dbae51acad2ab8800172729fbd3af9c349e15b66e
    • Instruction Fuzzy Hash: 65E19661A0C68AA5E720ABA1B8003BAE3A0FF84794FD54131DE4D57794FF3CE545E721

    Control-flow Graph

    APIs
    • Sleep.KERNEL32(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F11A5
    • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F120F
    • SetUnhandledExceptionFilter.KERNEL32(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F124E
    • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F1265
    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F127E
    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F12A4
    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F12B0
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F12C3
    • _cexit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF73D3F1366), ref: 00007FF73D3F132D
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterSleepUnhandled_cexit_initterm_set_invalid_parameter_handlermemcpystrlen
    • String ID:
    • API String ID: 3415622771-0
    • Opcode ID: 2acc55856a8ff17b4a32b5b16622e15da31847f96dffeee44c128cb4905c5a3c
    • Instruction ID: adb938749099c7b6dc0c4dce8f0d0aa53741afc5293e86505959579e68392c09
    • Opcode Fuzzy Hash: 2acc55856a8ff17b4a32b5b16622e15da31847f96dffeee44c128cb4905c5a3c
    • Instruction Fuzzy Hash: 9D515D35A0E64EE1FA10BB95E9503B9E3A4AF84780F858035DD0D477A1FF3DE849A321

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff73d3f7a60-7ff73d3f7a84 call 7ff73d3f1490 3 7ff73d3f7b2d-7ff73d3f7b41 0->3 4 7ff73d3f7a8a-7ff73d3f7a8d 0->4 7 7ff73d409fb0-7ff73d409fd2 3->7 5 7ff73d3f7b46 4->5 6 7ff73d3f7a93-7ff73d3f7aa8 strcmp 4->6 12 7ff73d3f7b4a-7ff73d3f7b5f strcmp 5->12 8 7ff73d3f7c53-7ff73d3f7c5a call 7ff73d3f7cd0 6->8 9 7ff73d3f7aae-7ff73d3f7abf strcmp 6->9 10 7ff73d409fd4-7ff73d40a001 __acrt_iob_func call 7ff73d40a3f0 7->10 11 7ff73d40a006-7ff73d40a00b 7->11 21 7ff73d3f7c5f 8->21 9->8 13 7ff73d3f7ac5-7ff73d3f7ad6 strcmp 9->13 33 7ff73d40a36a-7ff73d40a37c 10->33 18 7ff73d40a0dc call 7ff73d404c30 11->18 19 7ff73d40a011-7ff73d40a02b strcmp 11->19 16 7ff73d3f7b65-7ff73d3f7b76 strcmp 12->16 17 7ff73d3f7c6a-7ff73d3f7c6c 12->17 13->8 20 7ff73d3f7adc-7ff73d3f7aed strcmp 13->20 24 7ff73d3f7c6e-7ff73d3f7c73 16->24 25 7ff73d3f7b7c-7ff73d3f7b8d strcmp 16->25 26 7ff73d3f7ca4-7ff73d3f7cbd 17->26 34 7ff73d40a0e1-7ff73d40a0e4 18->34 19->18 27 7ff73d40a031-7ff73d40a042 strcmp 19->27 30 7ff73d3f7b15-7ff73d3f7b28 __acrt_iob_func call 7ff73d3f7d20 20->30 31 7ff73d3f7aef-7ff73d3f7b00 strcmp 20->31 32 7ff73d3f7c61-7ff73d3f7c69 21->32 24->26 35 7ff73d3f7c75-7ff73d3f7c7a 25->35 36 7ff73d3f7b93-7ff73d3f7ba4 strcmp 25->36 26->7 28 7ff73d40a048-7ff73d40a04b 27->28 29 7ff73d40a2b3-7ff73d40a2b6 27->29 39 7ff73d40a04d-7ff73d40a05e strcmp 28->39 40 7ff73d40a092-7ff73d40a0aa call 7ff73d4052a0 28->40 29->10 41 7ff73d40a2bc-7ff73d40a2c4 call 7ff73d404c30 29->41 30->21 31->30 42 7ff73d3f7b02-7ff73d3f7b13 strcmp 31->42 44 7ff73d40a0ea-7ff73d40a103 34->44 45 7ff73d40a3cf 34->45 35->26 37 7ff73d3f7c7c-7ff73d3f7c81 36->37 38 7ff73d3f7baa-7ff73d3f7bbb strcmp 36->38 37->26 46 7ff73d3f7c83-7ff73d3f7c88 38->46 47 7ff73d3f7bc1-7ff73d3f7bd2 strcmp 38->47 48 7ff73d40a31b-7ff73d40a345 __acrt_iob_func call 7ff73d40a3f0 39->48 49 7ff73d40a064-7ff73d40a075 strcmp 39->49 67 7ff73d40a0b0-7ff73d40a0b8 40->67 68 7ff73d40a3e2-7ff73d40a3e9 40->68 41->45 69 7ff73d40a2ca-7ff73d40a2d7 41->69 42->12 42->30 54 7ff73d40a146-7ff73d40a151 strlen 44->54 50 7ff73d40a3d6-7ff73d40a3e0 perror 45->50 46->26 56 7ff73d3f7c8a-7ff73d3f7c8f 47->56 57 7ff73d3f7bd8-7ff73d3f7be9 strcmp 47->57 48->33 49->48 58 7ff73d40a07b-7ff73d40a08c strcmp 49->58 50->33 59 7ff73d40a157-7ff73d40a170 call 7ff73d4052a0 54->59 60 7ff73d40a233-7ff73d40a23c 54->60 56->26 64 7ff73d3f7c91-7ff73d3f7c96 57->64 65 7ff73d3f7bef-7ff73d3f7c00 strcmp 57->65 58->40 58->48 80 7ff73d40a110-7ff73d40a143 __acrt_iob_func _errno call 7ff73d40c610 call 7ff73d40a3f0 59->80 81 7ff73d40a172-7ff73d40a17a 59->81 70 7ff73d40a365 free 60->70 64->26 71 7ff73d3f7c06-7ff73d3f7c17 strcmp 65->71 72 7ff73d3f7c98-7ff73d3f7c9d 65->72 74 7ff73d40a347-7ff73d40a34f call 7ff73d40acb0 67->74 75 7ff73d40a0be-7ff73d40a0d7 call 7ff73d40a420 67->75 68->50 76 7ff73d40a2f5-7ff73d40a300 strlen 69->76 70->33 78 7ff73d3f7c9f 71->78 79 7ff73d3f7c1d-7ff73d3f7c51 __acrt_iob_func call 7ff73d3f7e60 __acrt_iob_func call 7ff73d3f7d20 71->79 72->26 94 7ff73d40a351-7ff73d40a354 74->94 75->94 83 7ff73d40a3c3-7ff73d40a3cd free 76->83 84 7ff73d40a306-7ff73d40a311 76->84 78->26 79->32 80->54 88 7ff73d40a17c-7ff73d40a192 call 7ff73d40a420 81->88 89 7ff73d40a1a0-7ff73d40a1ae call 7ff73d40acb0 81->89 83->33 91 7ff73d40a2e0-7ff73d40a2f2 call 7ff73d40b2a0 84->91 92 7ff73d40a313-7ff73d40a319 84->92 105 7ff73d40a1ba-7ff73d40a1c5 88->105 111 7ff73d40a194-7ff73d40a244 88->111 89->105 106 7ff73d40a1b0-7ff73d40a1b5 call 7ff73d40c720 89->106 91->76 92->91 94->33 100 7ff73d40a356-7ff73d40a360 94->100 108 7ff73d40a390-7ff73d40a3a1 100->108 109 7ff73d40a362 100->109 113 7ff73d40a1c7-7ff73d40a1d6 105->113 114 7ff73d40a1e5-7ff73d40a1eb 105->114 106->105 115 7ff73d40a380-7ff73d40a38e free 108->115 116 7ff73d40a3a3 108->116 109->70 120 7ff73d40a25a-7ff73d40a264 111->120 121 7ff73d40a246-7ff73d40a250 111->121 118 7ff73d40a1d8-7ff73d40a1e3 free 113->118 119 7ff73d40a200-7ff73d40a213 113->119 114->54 115->108 115->109 122 7ff73d40a3b0-7ff73d40a3bf free 116->122 118->114 123 7ff73d40a1f0-7ff73d40a1fe free 119->123 124 7ff73d40a215 119->124 120->70 125 7ff73d40a280-7ff73d40a291 121->125 126 7ff73d40a252-7ff73d40a255 free 121->126 122->122 127 7ff73d40a3c1 122->127 123->118 123->119 130 7ff73d40a220-7ff73d40a22f free 124->130 128 7ff73d40a270-7ff73d40a27e free 125->128 129 7ff73d40a293 125->129 126->120 127->115 128->125 128->126 131 7ff73d40a2a0-7ff73d40a2af free 129->131 130->130 132 7ff73d40a231 130->132 131->131 133 7ff73d40a2b1 131->133 132->123 133->128
    APIs
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7AA1
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7AB8
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7ACF
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7AE6
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7AF9
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7B0C
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7B1A
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7B58
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7B6F
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7B86
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7B9D
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7BB4
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7BCB
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7BE2
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7BF9
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7C10
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00007FF73D411A28,00000000,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7C29
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7C42
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF73D411A28), ref: 00007FF73D409FD9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strcmp$__acrt_iob_func
    • String ID: %s%c$--help$--version$1.0.20210914$Invalid subcommand: `%s'$Unable to access interface$Unable to access interface %s: %s$Unable to list interfaces$Usage: %s %s { <interface> | all | interfaces } [public-key | private-key | listen-port | fwmark | peers | preshared-keys | endpoints | allowed-ips | latest-handshakes | transfer | persistent-keepalive | dump]$addconf$all$genkey$genpsk$help$interfaces$pubkey$set$setconf$show$showconf$syncconf$version
    • API String ID: 3287873120-3346360338
    • Opcode ID: 425a805aaf9ca79d0f9ae727ace8f52ef78ef8c212661f9117abc5f6e5af4b47
    • Instruction ID: d0a774da6a6dc66f624a14662aa47c2b46b366771f6eaaacb4d3b83b75571b9c
    • Opcode Fuzzy Hash: 425a805aaf9ca79d0f9ae727ace8f52ef78ef8c212661f9117abc5f6e5af4b47
    • Instruction Fuzzy Hash: 1FF17E61A0D60FB1FE54BBA599512B9D255AF85B80FC64035DD0E07392FF3CE849B322

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: ConsoleMode$DefaultDirectoriesDirectoryHandleStartup_putenvabortgetenv
    • String ID: WG_COLOR_MODE$WG_COLOR_MODE=never
    • API String ID: 3093664080-2833094913
    • Opcode ID: e45e11e632cb985923e5a64231e6f49c1478fe8ce4ee1d6e3cd999cc31cb6142
    • Instruction ID: 90e4c1b3327a6a978cb69ea938b0dbc1d150680ee471aac21e96adbf5c41c64d
    • Opcode Fuzzy Hash: e45e11e632cb985923e5a64231e6f49c1478fe8ce4ee1d6e3cd999cc31cb6142
    • Instruction Fuzzy Hash: A7216221A1D64BA2FA14B7A0A8442B5E350EF40790FC58234D92E465D5FF3CE949E662

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 209 7ff73d3f7320-7ff73d3f7383 210 7ff73d3f7385-7ff73d3f73aa RaiseException 209->210 211 7ff73d3f73af-7ff73d3f73db 209->211 212 7ff73d3f752e-7ff73d3f7541 210->212 213 7ff73d3f73ed-7ff73d3f73f0 211->213 214 7ff73d3f73dd-7ff73d3f73eb 211->214 215 7ff73d3f73f4-7ff73d3f7401 213->215 214->215 216 7ff73d3f7403-7ff73d3f7413 215->216 217 7ff73d3f7424-7ff73d3f7427 215->217 216->217 229 7ff73d3f7415-7ff73d3f741f 216->229 218 7ff73d3f7542-7ff73d3f754f 217->218 219 7ff73d3f742d-7ff73d3f7440 217->219 220 7ff73d3f7551-7ff73d3f755b call 7ff73d3f8060 218->220 221 7ff73d3f7569-7ff73d3f757a LoadLibraryA 218->221 223 7ff73d3f7442-7ff73d3f7458 219->223 224 7ff73d3f745e-7ff73d3f7462 219->224 232 7ff73d3f7561-7ff73d3f7567 220->232 227 7ff73d3f757c-7ff73d3f7586 221->227 228 7ff73d3f75ca-7ff73d3f75e1 GetLastError 221->228 223->224 233 7ff73d3f7500 223->233 225 7ff73d3f7464-7ff73d3f7468 224->225 226 7ff73d3f7492-7ff73d3f74a6 GetProcAddress 224->226 225->226 231 7ff73d3f746a-7ff73d3f7475 225->231 226->233 234 7ff73d3f74a8-7ff73d3f74bf GetLastError 226->234 235 7ff73d3f75bc-7ff73d3f75bf FreeLibrary 227->235 236 7ff73d3f7588-7ff73d3f758c 227->236 238 7ff73d3f75e3-7ff73d3f75f9 228->238 239 7ff73d3f75fb-7ff73d3f7622 RaiseException 228->239 237 7ff73d3f7503-7ff73d3f750a 229->237 231->226 241 7ff73d3f7477-7ff73d3f747b 231->241 232->221 232->227 233->237 242 7ff73d3f74c1-7ff73d3f74d7 234->242 243 7ff73d3f74d9-7ff73d3f74fb RaiseException 234->243 235->228 236->219 244 7ff73d3f7592-7ff73d3f75b7 LocalAlloc 236->244 237->212 240 7ff73d3f750c-7ff73d3f7523 237->240 238->227 238->239 239->212 240->212 241->226 246 7ff73d3f747d-7ff73d3f7482 241->246 242->233 242->243 243->233 244->219 246->226 247 7ff73d3f7484-7ff73d3f7490 246->247 247->226 247->233
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: ExceptionRaise$ErrorLastLibrary$AddressAllocFreeLoadLocalProc
    • String ID: H
    • API String ID: 3084743264-2852464175
    • Opcode ID: 90b053017ffec4ce6a6f1ed652612b8d3b6ef2b5775a48bc0b3869dd8a1c870d
    • Instruction ID: 6563d9e6166c878e27721a827daca9b25ffb30ff62c546f39a04a65d97b1fcb5
    • Opcode Fuzzy Hash: 90b053017ffec4ce6a6f1ed652612b8d3b6ef2b5775a48bc0b3869dd8a1c870d
    • Instruction Fuzzy Hash: 92916C61A0EB4AE2EA259F55E404269F7A4FF48B94F944039DE4D037A4FF3CE845DB20

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 289 7ff73d3f8060-7ff73d3f8067 290 7ff73d3f8085 289->290 291 7ff73d3f8069-7ff73d3f807e LoadLibraryExA 289->291 293 7ff73d3f8087-7ff73d3f808b 290->293 292 7ff73d3f8080 abort 291->292 291->293 292->290
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: LibraryLoadabort
    • String ID:
    • API String ID: 1242288263-0
    • Opcode ID: 661839867e1041109797e0a1672cef716d4d4810185ca33d6b7e997b6c7c655d
    • Instruction ID: 3d6502083f56052dbd41d3d2b0ebc177714361f83e88e2c3a169258fc4bc1f1f
    • Opcode Fuzzy Hash: 661839867e1041109797e0a1672cef716d4d4810185ca33d6b7e997b6c7c655d
    • Instruction Fuzzy Hash: D2D0C960F1E51BE0EE6C77E24981275C2D5EFD8B50FC94439C90D81280FF2DA8E567A2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 294 7ff73d3f13d0-7ff73d3f13e1 295 7ff73d3f13e3 294->295 296 7ff73d3f1411-7ff73d3f1415 294->296 297 7ff73d3f13f0-7ff73d3f140f WSACleanup 295->297 297->296 297->297
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: Cleanup
    • String ID:
    • API String ID: 99945797-0
    • Opcode ID: 7b552054284c38ac1c15fad1896c7acfb6fe327355bbe05baee0f83a3ac46483
    • Instruction ID: 01b1da32ddfcd21204c3bdd9a434e343c4ec6547312ea5ad7f7371bcdb78a83c
    • Opcode Fuzzy Hash: 7b552054284c38ac1c15fad1896c7acfb6fe327355bbe05baee0f83a3ac46483
    • Instruction Fuzzy Hash: A8E09A25E0EB4E90EE05AB45E880264ABA0FB58BC9F994435CD0C03764EF3CE4499320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strcmp$_errno$free$CloseHandlecallocmalloc$ControlCreateDeviceErrorFileLastfclosefgetcfwritereallocstrchrstrlenstrncpystrtoull
    • String ID: allowed_ip$endpoint$errno$fwmark$get=1$jmax$jmin$last_handshake_time_nsec$last_handshake_time_sec$listen_port$persistent_keepalive_interval$preshared_key$private_key$public_key$rx_bytes$tx_bytes
    • API String ID: 3180145613-1152024618
    • Opcode ID: f2384b0f748638761373d3e95b6cc435cda671c88fef00f4ea05c32897f33708
    • Instruction ID: 29568c8f462aa310baad1547b767b9dcc301058dd3363e0b9b6d8fa291650a3b
    • Opcode Fuzzy Hash: f2384b0f748638761373d3e95b6cc435cda671c88fef00f4ea05c32897f33708
    • Instruction Fuzzy Hash: 79A2C461A0C68A66FB25ABB5D41037AE790EF41784F858035DE8E477C6FF6CE441D322
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: _errno$CloseHandlefreefwritestrcmp$ControlCreateDeviceFilefflushfputcstrchrstrlenstrtoll
    • String ID: allowed_ip=%s/%d$endpoint=%s:%s$endpoint=[%s]:%s$errno$fwmark=%u$h1=%u$h2=%u$h3=%u$h4=%u$jc=%u$jmax=%u$jmin=%u$listen_port=%u$persistent_keepalive_interval=%u$preshared_key=%s$private_key=%s$public_key=%s$remove=true$replace_allowed_ips=true$replace_peers=true$s1=%u$s2=%u$set=1
    • API String ID: 1938545729-429151333
    • Opcode ID: 46033bbdbb12580742b975681dc404ebebb6623472df7e5de5a8ec3383a453aa
    • Instruction ID: 7115c4aa28c7d9b89a476e2735b88ea18645335d02110358c708413d26649d45
    • Opcode Fuzzy Hash: 46033bbdbb12580742b975681dc404ebebb6623472df7e5de5a8ec3383a453aa
    • Instruction Fuzzy Hash: C0B22D2AE2D7866AF713667594112F4E208AFA73C4F41D333FD8831996FF29E1129325
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: ByteCharMultiSetupWidestrcmp$ClassDeviceDevsEnumInfofreemalloc
    • String ID: 0$ROOT\WIREGUARD$SWD\WireGuard
    • API String ID: 1764286838-714841229
    • Opcode ID: 8b8b90365d9b1aafbd2efaaea433ded22b5284b1b836c6ee8cbd49cd1f499580
    • Instruction ID: 0d54c06f68db669064b3cfd97c1569f5cd15c0cf8cfb60bb44fc055e399c0249
    • Opcode Fuzzy Hash: 8b8b90365d9b1aafbd2efaaea433ded22b5284b1b836c6ee8cbd49cd1f499580
    • Instruction Fuzzy Hash: 56C10A61A0C68A96FB60AB91A41437AE3A0FF84B94F854135DE8E477D0FF3CE045D721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: Find$Filestrcmp$CloseFirstNext
    • String ID: ProtectedPrefix\Administrators\AmneziaWG\%s$\\.\pipe\*
    • API String ID: 4053930958-3389193308
    • Opcode ID: 22559c77d11a2a5e2de079b75b1fc88c09c696fec0a9997df009f1b1a1fe3dfe
    • Instruction ID: 1bb254666b0e33cfd4fc026b2b7f371c3674997910c645530f9645f5d355e066
    • Opcode Fuzzy Hash: 22559c77d11a2a5e2de079b75b1fc88c09c696fec0a9997df009f1b1a1fe3dfe
    • Instruction Fuzzy Hash: 2F312721B1C55E73FA20ABA1A8003BAD250AF40B94FCA0131DD6F476D4FF2CD506A322
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strlen
    • String ID:
    • API String ID: 39653677-0
    • Opcode ID: 5dd260e9e9f61ea4c082116c183498da0b4d9d79da5d0d54ee2918f9c6c739ba
    • Instruction ID: 9b56fa7993857bf3cec36a2dfe489c7c0eaabfed17e8bf0c4e2a502c953784e2
    • Opcode Fuzzy Hash: 5dd260e9e9f61ea4c082116c183498da0b4d9d79da5d0d54ee2918f9c6c739ba
    • Instruction Fuzzy Hash: 34E2D167D3E7821BE3035739EC126A4EA185FF32C5F44D326ED9171D92FB29A2934218
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fe63e039fb2d688b7a630c3388aa5a7583706e297051cf3f2ce90f746a0748fa
    • Instruction ID: da86f0698bb577b2ffbb324890eb47eb523322f117c658c9677074abe31f30d7
    • Opcode Fuzzy Hash: fe63e039fb2d688b7a630c3388aa5a7583706e297051cf3f2ce90f746a0748fa
    • Instruction Fuzzy Hash: 6A925D32A0E64DD6EB65AA65E4003BAE798FF817C4F904139ED4E43B95EF3CE8419710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strlen
    • String ID:
    • API String ID: 39653677-0
    • Opcode ID: 8d613b5a3ecefce5f5308531ac254ee5f92421bf27feff88c4495142be5149bf
    • Instruction ID: a8ac0ddb9f408f6eaabd425eea385aaa47ea65d624cfee6ad3f7e0fc7c7a5064
    • Opcode Fuzzy Hash: 8d613b5a3ecefce5f5308531ac254ee5f92421bf27feff88c4495142be5149bf
    • Instruction Fuzzy Hash: ED21492363C0E742E72E86356C106BAEB81DB56372B45A330EE6B06AC0C62886049711
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eefc4ba55b07cd2e39966fa5283efa252d32a8eb71e88bbe99fec4c6e413f74a
    • Instruction ID: dec2d44780866f5cb8c3c62881a64657b23c8f7164deb21b97b18b3ba8472fa4
    • Opcode Fuzzy Hash: eefc4ba55b07cd2e39966fa5283efa252d32a8eb71e88bbe99fec4c6e413f74a
    • Instruction Fuzzy Hash: EC51F597E39BD586F313173CAC03BB4E724ABA63C6F425320EEC445D96E62A8347D214
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_funcfree$_errno_strdupexitfwritegetenvmemcpystrchrstrcmpstrerrorstrrchrstrtoul
    • String ID: %s: `%s'$%s: `%s'. Trying again in %.2f seconds...$Neither IPv4 nor IPv6 address found: `%s'$Unable to find matching brace of endpoint: `%s'$Unable to find port of endpoint: `%s'$Unable to parse WG_ENDPOINT_RESOLUTION_RETRIES: `%s'$Unable to parse empty endpoint$WG_ENDPOINT_RESOLUTION_RETRIES$infinity$strdup
    • API String ID: 970331252-1639880925
    • Opcode ID: d670e78b44053a8970aa87013cebc9dff53a2daa68784ce55a47aa369ed3b4c4
    • Instruction ID: 800a616bde01355c9e30083b2fa55e1cf62b4340802984be0a217429d2ceaf16
    • Opcode Fuzzy Hash: d670e78b44053a8970aa87013cebc9dff53a2daa68784ce55a47aa369ed3b4c4
    • Instruction Fuzzy Hash: 1391A051A0D64EE2FE18BBA198143B9D254EF85790FC14139EE4E067D2FF3CE855A322
    APIs
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF73D40BF28
      • Part of subcall function 00007FF73D4052A0: calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73D4052F3
      • Part of subcall function 00007FF73D4052A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF73D405335
      • Part of subcall function 00007FF73D4052A0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D40534E
      • Part of subcall function 00007FF73D4052A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D4053B1
      • Part of subcall function 00007FF73D4052A0: strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF73D4053D1
      • Part of subcall function 00007FF73D4052A0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D40541A
      • Part of subcall function 00007FF73D4052A0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D405431
      • Part of subcall function 00007FF73D4052A0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D405448
      • Part of subcall function 00007FF73D4052A0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D40545F
    • puts.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF73D40BBFB
    • putchar.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF73D40BCAA
    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF73D40BE53
      • Part of subcall function 00007FF73D40C0F0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF73D40C116
    • perror.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73D40C0A3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strcmp$__acrt_iob_funcstrchr$callocfwriteperrorputcharputsstrlenstrncpy
    • String ID: %s/%d$AllowedIPs = $Endpoint = %s:%s$Endpoint = [%s]:%s$FwMark = 0x%x$H1 = %u$H2 = %u$H3 = %u$H4 = %u$Jc = %u$Jmax = %u$Jmin = %u$ListenPort = %u$PersistentKeepalive = %u$PresharedKey = %s$PrivateKey = %s$S1 = %u$S2 = %u$Unable to access interface$[Interface]$[Peer]PublicKey = %s
    • API String ID: 2189207758-3787348828
    • Opcode ID: dfbf7fe93071cc97e3f495807336d0028547e7f3f1906d4feaf296d50ef190cd
    • Instruction ID: 93444f7c3b326da958b0615c6a8ed0c8087c9239acf37b94fcd5d5fccc9030db
    • Opcode Fuzzy Hash: dfbf7fe93071cc97e3f495807336d0028547e7f3f1906d4feaf296d50ef190cd
    • Instruction Fuzzy Hash: 47D18C21A0C64AA1FA65BB91D4403BAE361AF40748FC2C031EE4D566D6FF3CE845E762
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: free$_strdupperrorstrcspn$callocstrchrstrtoul
    • String ID: AllowedIP is not in the correct format: `%s'$Unable to parse IP address: `%s'$Warning: AllowedIP has nonzero host part: %s/%s$calloc$strdup
    • API String ID: 3019466392-3341623562
    • Opcode ID: b47652f795d037d1c5cd60effb3e3d9ab8b9abaae243694418b2b71e70b33719
    • Instruction ID: 7701c4b0dd6122cf993bdc6a052b782c353d1b94530f7b909083c2c71fef79d2
    • Opcode Fuzzy Hash: b47652f795d037d1c5cd60effb3e3d9ab8b9abaae243694418b2b71e70b33719
    • Instruction Fuzzy Hash: 10811362A0E24EE1EE58B79198142BAE654EF81794FC54538DE4E073D1FF3CE811E321
    APIs
    • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,00007FFE1FFAFCF0,000002B0ADB976D8,00007FF73D3F7C4C,?,00007FF73D3F1315,?,?,?,00007FF73D3F1366), ref: 00007FF73D3F7D51
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: fwrite
    • String ID: %s: %s$Appends a configuration file to a WireGuard interface$Applies a configuration file to a WireGuard interface$Available subcommands:$Change the current configuration, add peers, remove peers, or change peers$Generates a new preshared key and writes it to stdout$Generates a new private key and writes it to stdout$Reads a private key from stdin and writes a public key to stdout$Shows the current configuration and device information$Shows the current configuration of a given WireGuard interface, for use with `setconf'$Synchronizes a configuration file to a WireGuard interface$Usage: %s <cmd> [<args>]$You may pass `--help' to any of these subcommands to view usage.$addconf$genkey$genpsk$pubkey$set$setconf$show$showconf$syncconf
    • API String ID: 3559309478-316989557
    • Opcode ID: ec3c38715fe2dad7355cb0636f5737f70661bde6b3fd5a32ac1da1ccc7394f0f
    • Instruction ID: 607a73bc1e5bb097dc020e89b394ab404fc0be15ecd0a938131fd4c892a12de5
    • Opcode Fuzzy Hash: ec3c38715fe2dad7355cb0636f5737f70661bde6b3fd5a32ac1da1ccc7394f0f
    • Instruction Fuzzy Hash: A331A590A2D55FB0EA10FBD1AD409F4E32A5F55BC4FC14033EC0D17A55AF7CA64AA362
    APIs
      • Part of subcall function 00007FF73D40C140: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C186
      • Part of subcall function 00007FF73D40C140: strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1BD
      • Part of subcall function 00007FF73D40C140: strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1D0
      • Part of subcall function 00007FF73D40C140: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1DE
      • Part of subcall function 00007FF73D40C140: _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1E7
      • Part of subcall function 00007FF73D40C140: _isatty.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1EE
      • Part of subcall function 00007FF73D40C140: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C331
    • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FF73D40AD1A
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D40AD35
    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73D40AEA4
    • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF73D40AEE6
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73D40AFBA
    • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FF73D40B037
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D40B052
    • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF73D40B0DC
    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73D40B1BF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strcmp$__acrt_iob_funcfreegetenv$_fileno_isatty_time64callocqsortstrncpy
    • String ID: ago$%s received, $%s sent$(hidden)$(none)$Now$WG_HIDE_KEYS$every $never
    • API String ID: 215390385-2913925316
    • Opcode ID: c33cc269365d38d8657cd7691dfa003362f079c905a89ee779b475fbf269c0e8
    • Instruction ID: 039a928dd058362d028a61d5f9a1c11c117f2df56fa9760ac099579ea6fb8cda
    • Opcode Fuzzy Hash: c33cc269365d38d8657cd7691dfa003362f079c905a89ee779b475fbf269c0e8
    • Instruction Fuzzy Hash: 19F17B21A0C64AB1EA15FBA5D8413B9E362BF54B84FC68135DE0D07291FF3CE549E362
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func$perror$_errnofclosefeofferrorfwrite
    • String ID: Found trailing character in key file: `%c'$Invalid length key in key file$Key is not the correct length or format: `%s'$fopen$getc
    • API String ID: 544416479-2653762025
    • Opcode ID: d23dc7c9aefdbbaf91b2a68ca54087207bd722f27c52376c0b2cb0d8abe4d8cc
    • Instruction ID: 48a606467a81904208b105f0ccd58ae26f7990e7f804b674c1d3776b5ee76cf7
    • Opcode Fuzzy Hash: d23dc7c9aefdbbaf91b2a68ca54087207bd722f27c52376c0b2cb0d8abe4d8cc
    • Instruction Fuzzy Hash: E241C261E0E60FE2FE14B7A194103F9D251AF95780FC54235EE0D076D2FF6CA995A322
    APIs
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C186
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1BD
    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1D0
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1DE
    • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1E7
    • _isatty.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C1EE
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40C331
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_funcstrcmp$_fileno_isattyfree
    • String ID: WG_COLOR_MODE$always$never
    • API String ID: 4211838187-4035333732
    • Opcode ID: 1508d377326ef1b0d0d0f2cb77dc06fe719fef41b60a7bfd94025024ec44bd8c
    • Instruction ID: b941c574f59bfcbc763aa66e6367757ba8c4ab2a41c092486d3fc6328df7113d
    • Opcode Fuzzy Hash: 1508d377326ef1b0d0d0f2cb77dc06fe719fef41b60a7bfd94025024ec44bd8c
    • Instruction Fuzzy Hash: 4B51C221E0C64AE1FA20B7E5A50037AE6819F447D0FCA8135EE0E17BD5FF2CE445A622
    APIs
      • Part of subcall function 00007FF73D40B2A0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,00007FF73D40A65D), ref: 00007FF73D40B2C6
    • puts.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,?,00000000,?,00000001,00000000,?,00007FF73D40AC7A), ref: 00007FF73D40B981
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_funcputs
    • String ID: %llu$%llu%llu$%s$%s/%u%c$%u$%u$(none)$(none)$0x%x$off
    • API String ID: 3278495061-353294181
    • Opcode ID: 7cd881c02aacaf1ffa50f974b3051d297a03e9a7fe656e3bd32015d6670265b1
    • Instruction ID: de40d541045dec6e62cdfc2659d21540cba02e6c14db88f9b4c90a2e75928e07
    • Opcode Fuzzy Hash: 7cd881c02aacaf1ffa50f974b3051d297a03e9a7fe656e3bd32015d6670265b1
    • Instruction Fuzzy Hash: CA81D011A0C55FB2EA22B791A5456BFE361AF80788FC28031DE5D06692FF3CE445E366
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func$_errnofreadgetcputs
    • String ID: %s: Key is not the correct length or format$%s: Trailing characters found after key$Usage: %s %s
    • API String ID: 3310308791-906102049
    • Opcode ID: d130606250bc12114dbc84f79be8272d9b3c075edf7276302a9e7231e4c0fdb9
    • Instruction ID: da5fb43a76bb0c713147c3544e81196fb2610f6f7a1449a6a2ef27774a9fbc5e
    • Opcode Fuzzy Hash: d130606250bc12114dbc84f79be8272d9b3c075edf7276302a9e7231e4c0fdb9
    • Instruction Fuzzy Hash: 0731D720A0C61FA2EE14B7D1A9102B9D350AF89794FC24035DE0D173D5FF2CE545EB22
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func$_fstat64fwriteperrorputsstrcmp
    • String ID: Warning: writing to world accessible file.Consider setting the umask to 077 and trying again.$genkey$getrandom
    • API String ID: 3840213802-2404912750
    • Opcode ID: 8354eefa0a16a462890dc4f54c070698f85da530be23ccf39a2af45e46c74903
    • Instruction ID: 7e1233afb19afe70f1b934324e8ac34965d61e1acba3323ea79c6ba507c73438
    • Opcode Fuzzy Hash: 8354eefa0a16a462890dc4f54c070698f85da530be23ccf39a2af45e46c74903
    • Instruction Fuzzy Hash: 8B21AE61E0C51BA1EA60B7E0A4113B9E360AF85744FC24131EE8E476C2FF1CE945A722
    APIs
    • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D3F3354), ref: 00007FF73D3F4B29
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: fputc
    • String ID: .
    • API String ID: 1992160199-248832578
    • Opcode ID: 286ecad110a6c2e765709354b6d0600fcc9d5dbb54b1899054fe519846916996
    • Instruction ID: 3cb9ec64433044024bd25bec9c37368b37986b1db89bfa2cba4230e7a2e65748
    • Opcode Fuzzy Hash: 286ecad110a6c2e765709354b6d0600fcc9d5dbb54b1899054fe519846916996
    • Instruction Fuzzy Hash: 53F18632A0E24ED7FB749A65E0507BAF7A5EB14740F805139DB9A46A81EB3CFC40E710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func$_errnofwritestrerror
    • String ID: %s: `%s'$Neither IPv4 nor IPv6 address found: `%s'$Unable to parse empty port
    • API String ID: 1250853250-3403716657
    • Opcode ID: 848df00da17942d2cbffea1b9b796cec72083165688fec3fd741c08586944590
    • Instruction ID: bd3bc85f88b9f51048afe7c14b4abe2baee41404c64824cc43143968eb1c0191
    • Opcode Fuzzy Hash: 848df00da17942d2cbffea1b9b796cec72083165688fec3fd741c08586944590
    • Instruction Fuzzy Hash: 5031D36190D65EA1FA286B95D8056F9E364EF84B90FC00239EE0E03791FF3CD896E711
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: CloseHandle$CreateFileFreeLocal_errno_fdopen_open_osfhandle
    • String ID: \\.\pipe\ProtectedPrefix\Administrators\AmneziaWG\%s
    • API String ID: 3829360951-2032867026
    • Opcode ID: 609dd99b710ee281472abad51e746a1d3f438d953befdd37ac575b8669ccf256
    • Instruction ID: 37fcf14d782defb37064df9ee6066820361770c9e9469ca9e38be2009ea0c286
    • Opcode Fuzzy Hash: 609dd99b710ee281472abad51e746a1d3f438d953befdd37ac575b8669ccf256
    • Instruction Fuzzy Hash: 64319331A1C64A92F710ABA1E81436AE360FB80B90F954231ED5E03AD4EF7CD449EB11
    APIs
    • VirtualQuery.KERNEL32(?,?,?,?,00007FF73D40F100,00007FF73D40F100,?,?,00007FF73D3F0000,?,00007FF73D3F1761), ref: 00007FF73D3F1A33
    • VirtualProtect.KERNEL32(?,?,?,?,00007FF73D40F100,00007FF73D40F100,?,?,00007FF73D3F0000,?,00007FF73D3F1761), ref: 00007FF73D3F1A97
    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,00007FF73D40F100,00007FF73D40F100,?,?,00007FF73D3F0000,?,00007FF73D3F1761), ref: 00007FF73D3F1AB0
    • GetLastError.KERNEL32(?,?,?,?,00007FF73D40F100,00007FF73D40F100,?,?,00007FF73D3F0000,?,00007FF73D3F1761), ref: 00007FF73D3F1AF3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: Virtual$ErrorLastProtectQuerymemcpy
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
    • API String ID: 2595394609-2123141913
    • Opcode ID: 329e3502598422498331ca800828cfac293d4b7ca7d2047c57ac6f5dc12973c9
    • Instruction ID: 51085ef84c047627449ca8d0929cc9b3dc7de71bd6a729ba68e4c7f7d9440cad
    • Opcode Fuzzy Hash: 329e3502598422498331ca800828cfac293d4b7ca7d2047c57ac6f5dc12973c9
    • Instruction Fuzzy Hash: 4F417272A0D64EE1EE51AB81E4446B9E764EF85BC0F954139CE0E43790EF3CE949E360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func$exitfwritestrtoul
    • String ID: Unable to parse %s: `%s'$Unable to parse empty string
    • API String ID: 3518195109-1204588140
    • Opcode ID: 084ae46b2a106989ba7d161fb11436114f07e247c82b8266f42d46fade1ed4dc
    • Instruction ID: 4031f2d4a77dd13dd1869b5d46920ffefa131ad2b5ac6487673d234f8a054205
    • Opcode Fuzzy Hash: 084ae46b2a106989ba7d161fb11436114f07e247c82b8266f42d46fade1ed4dc
    • Instruction Fuzzy Hash: AA012252E0D64EB1FA1837E298107F9D6109F85BD4F954034EE0D077C2FF2CA981A322
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func$exitfwritestrtoul
    • String ID: Unable to parse %s: `%s'$Unable to parse empty string
    • API String ID: 3518195109-1204588140
    • Opcode ID: 20f55168c9e1cafef60a3f54506447fc30e4767f4c82249152f32503b660bd5d
    • Instruction ID: 8346c8a28dd8fbb52fe2c051908087bcaecce1b667937a28aab22c8090b9472d
    • Opcode Fuzzy Hash: 20f55168c9e1cafef60a3f54506447fc30e4767f4c82249152f32503b660bd5d
    • Instruction Fuzzy Hash: AD014561A0D50EA1FB1437E298107BCD2109F85BD4F850035EE0D073D2FF2CD941A721
    APIs
    • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF73D3F40F7,?,?,?,00000000,?,00007FF73D3F3CF4), ref: 00007FF73D3F44FD
    • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF73D3F40F7,?,?,?,00000000,?,00007FF73D3F3CF4), ref: 00007FF73D3F4510
    • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF73D3F40F7,?,?,?,00000000,?,00007FF73D3F3CF4), ref: 00007FF73D3F4579
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: fputc
    • String ID:
    • API String ID: 1992160199-0
    • Opcode ID: 5bba3542e24a611a4f92aaeab2b7d090de676ce5aa7ce851e9f60a12db06b999
    • Instruction ID: 663961bb74eeb9e901b119928cdecc854bb863763f87c00a9e0d770428e51227
    • Opcode Fuzzy Hash: 5bba3542e24a611a4f92aaeab2b7d090de676ce5aa7ce851e9f60a12db06b999
    • Instruction Fuzzy Hash: 54E15132A0E24EDAFB34AA65E19477AF6D9EB44740F844139CB5E46AD1EB3CFC409710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: fputc$memset
    • String ID: 0
    • API String ID: 2944404495-4108050209
    • Opcode ID: 6b1aa06cdb067662631725c16fa8d76b0ea062e6b8605673a3d7a709e557d23e
    • Instruction ID: bd8a1130f4d47d1f16688c6fd277cd2548ce26b2895a133ec18d8de5195ca45c
    • Opcode Fuzzy Hash: 6b1aa06cdb067662631725c16fa8d76b0ea062e6b8605673a3d7a709e557d23e
    • Instruction Fuzzy Hash: FD812623E1D18ED2FF756E96E1507B9E6D5AB00744F845138CE6A467C1EB3CEC80A322
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: fputclocaleconvmbrtowcwcrtomb
    • String ID:
    • API String ID: 2968283867-0
    • Opcode ID: 235c412fda74ae61bdd71f298d7962477191b91c1e6b2450e50ed2c30e0ca071
    • Instruction ID: b3d4d0bbed3a41360d15d6c049f3b7d45e3a384106846a5d461bc86575dfe60f
    • Opcode Fuzzy Hash: 235c412fda74ae61bdd71f298d7962477191b91c1e6b2450e50ed2c30e0ca071
    • Instruction Fuzzy Hash: BE41C922E0D189D6F7346AB6E0813BAF3A4EB14754F504539DF6E42BC1EB3CE8819760
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
    • String ID:
    • API String ID: 3326252324-0
    • Opcode ID: b76accf9d40db69406eacac63beeb41308df90d6d1e8b85d71d203678686b37b
    • Instruction ID: bc013bd319b4c36ff1b5884cf3daa81660d80c50452f2516ad2e253019626cbb
    • Opcode Fuzzy Hash: b76accf9d40db69406eacac63beeb41308df90d6d1e8b85d71d203678686b37b
    • Instruction Fuzzy Hash: 9D21C425A0D54EF1FA55B7819545378D3547F40B90FD60035CD0D87AA0FF7CAA45A721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: _strdupcallocfreestrcmp
    • String ID: ProtectedPrefix\Administrators\AmneziaWG\
    • API String ID: 2774336195-4145502227
    • Opcode ID: f932b3720a53e748a99dc318476a627693a2e5fe5c5a817614beeb5cd88f76ec
    • Instruction ID: 1bbf8468d189e367f0434e2e5955696f18918b69828e09d2f5b7b6e5bed7416d
    • Opcode Fuzzy Hash: f932b3720a53e748a99dc318476a627693a2e5fe5c5a817614beeb5cd88f76ec
    • Instruction Fuzzy Hash: 751133B2B0D949A0FB546A9691403BDD292DF94BC0F8AC030CE0C4B7C5FF2CD442A712
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func_stricmpstrtoul
    • String ID: Persistent keepalive interval is neither 0/off nor 1-65535: `%s'$off
    • API String ID: 483165431-115456495
    • Opcode ID: 58f9759bb7702ee6b753b2c487eb7ec93fcfa4a7233e9373641f08d8f6f00e22
    • Instruction ID: aacdf09a036fa6e6b6ad7597076fc53d5bfda0a3dbb966d52536ed8c9d0ec46b
    • Opcode Fuzzy Hash: 58f9759bb7702ee6b753b2c487eb7ec93fcfa4a7233e9373641f08d8f6f00e22
    • Instruction Fuzzy Hash: A4010092B0C24EA0FB146BB1D8003B9EB949F45BD4F844139CE0D862D4FF6CD952A321
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: fputc$wcrtomb
    • String ID:
    • API String ID: 497632989-0
    • Opcode ID: d77316cdf160907d198d9005216d24f7fcaf5127487dc38de47bfba6be12ab5c
    • Instruction ID: 5e4dc49c95acd8aa1416bd29dd6dfdc365f257d6997a5031318f66dc4f465eb2
    • Opcode Fuzzy Hash: d77316cdf160907d198d9005216d24f7fcaf5127487dc38de47bfba6be12ab5c
    • Instruction Fuzzy Hash: 3141A232E0D54ED6EA35AA46E1506BAF7A5EB04754F844139DF4F426C1EB3CE840D711
    APIs
    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000001,00000000,00007FF73D40B094), ref: 00007FF73D40B393
    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40B3FF
    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00007FF73D40A1A8), ref: 00007FF73D40B420
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: memsetstrchrstrncpy
    • String ID: %s:%s$[%s]:%s
    • API String ID: 2090624546-3707195743
    • Opcode ID: 8875882216fdc86b0b74de7071c875222618e46d658b11f39b6586c8d9b5fbbb
    • Instruction ID: d58a4d19ff432f8bc069aaa48ce8801044bc31e8d0244906c107892d9b372469
    • Opcode Fuzzy Hash: 8875882216fdc86b0b74de7071c875222618e46d658b11f39b6586c8d9b5fbbb
    • Instruction Fuzzy Hash: 6821B631B0C65AA1FB21BB90E8042F5E2A0FB84384FC14136DD8D536D5EF3CD519A721
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strlen
    • String ID: +
    • API String ID: 39653677-2126386893
    • Opcode ID: dda78be2265a4093b9bc9960568dedb70fe805fcbb581ab24825183a18f80e67
    • Instruction ID: 746e2d6781cc6471c2d9da018c2683e8fe3f28f486a85dd92ebab106624169fa
    • Opcode Fuzzy Hash: dda78be2265a4093b9bc9960568dedb70fe805fcbb581ab24825183a18f80e67
    • Instruction Fuzzy Hash: 0251E963A0D24EDBEB349A65E0406BEF7A4EB01750F44413CDB9947AC1EB3CE9049B11
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID:
    • String ID: CCG
    • API String ID: 0-1584390748
    • Opcode ID: b87f54ebd02da3a61d33f90cba9ef3fff45637c8e6b297c20bd2be89c3e5ebab
    • Instruction ID: d2f4d909c8dfa20e4814d5b83ef88be4156c7bc26b92a8b67cfb8ba209f44a42
    • Opcode Fuzzy Hash: b87f54ebd02da3a61d33f90cba9ef3fff45637c8e6b297c20bd2be89c3e5ebab
    • Instruction Fuzzy Hash: 2821DD31E0F60EE1FE656694A5403F9D196AF843A0FA58539DD0D472C4FF3CAC8AA231
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: callocperrorstrlen
    • String ID: calloc
    • API String ID: 2253307862-2635317215
    • Opcode ID: 6103a812be84079c912508d359eb4f0285a0525434ae842cfe8ebe732e570ab2
    • Instruction ID: 9731d40fd5c02ba6ccc1f02bb29505ed1f73e4038b519eb2ce9ab36fd5920ce4
    • Opcode Fuzzy Hash: 6103a812be84079c912508d359eb4f0285a0525434ae842cfe8ebe732e570ab2
    • Instruction Fuzzy Hash: 49F0DB55B0F25EE2FE29669565107FAD5459FA0340F898234EE0D067C1FF2C9D94A260
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: CriticalLeaveSection$free
    • String ID:
    • API String ID: 2017658852-0
    • Opcode ID: dad2cc61c5960f0da9df35849d2976f6285ea7e62c2d1c923a156c1c73eb05a5
    • Instruction ID: 3a3a589b540a63b810ba40311bf885f5e19b2688088f7ae8e850b78905cd102d
    • Opcode Fuzzy Hash: dad2cc61c5960f0da9df35849d2976f6285ea7e62c2d1c923a156c1c73eb05a5
    • Instruction Fuzzy Hash: 4B518121A4EA4EE0FE54BB95D9453B6E398AF54B84F994039CD0D473A1FF3CE840A260
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: memset
    • String ID:
    • API String ID: 2221118986-0
    • Opcode ID: c638daa76f6221497d0727d3ee4cea762bed7065c1711a96793fc20d26fecf89
    • Instruction ID: 04983376135d8901272ec6383d4daeb69790dcb3f9ff4263fee9976b94058fd0
    • Opcode Fuzzy Hash: c638daa76f6221497d0727d3ee4cea762bed7065c1711a96793fc20d26fecf89
    • Instruction Fuzzy Hash: 90910672E0D24ED7FB349A9AD5407BAF695EB04790F448139CB9A43B80EB3CF8459711
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: CriticalLeaveSectionfreememset
    • String ID:
    • API String ID: 1662925646-3916222277
    • Opcode ID: 01c0cf66fa5b899311e6542b3090b6c4a67ae0483516fd3d326a7d848c4e6651
    • Instruction ID: 810a328ffe9a6752d767610d1696d67f3f52aa91578134dd9c9e79d6dd4decf8
    • Opcode Fuzzy Hash: 01c0cf66fa5b899311e6542b3090b6c4a67ae0483516fd3d326a7d848c4e6651
    • Instruction Fuzzy Hash: 92411462A4E64DE2EE24AF9594501BCE351EB447A4F818235CA5F423D0FF3CED86D210
    APIs
    • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73D3F1247), ref: 00007FF73D3F17C9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
    • API String ID: 544645111-395989641
    • Opcode ID: 089e299b17ca76b65b31de90546e56fae2357db5356189ae7f47250a00160afa
    • Instruction ID: 9e863992f60f4ce4a7e5509e7875a4eb00bd9f81724d5407fa05f4e80aa8a536
    • Opcode Fuzzy Hash: 089e299b17ca76b65b31de90546e56fae2357db5356189ae7f47250a00160afa
    • Instruction Fuzzy Hash: 61519F21E0D54EE6EF10ABA1EC407B4E769AB14B94F954135C91D03B94EF3CE98EE720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: __acrt_iob_func
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 711238415-3474627141
    • Opcode ID: 70f69d78bf8fee29de9953d37dc0df2b334942f215bcb2d18fe886ace857c9c3
    • Instruction ID: 454d1a94e11071c158c4bc6d0ace5e6e6a4279718ca419c444e2e6548bf5cb91
    • Opcode Fuzzy Hash: 70f69d78bf8fee29de9953d37dc0df2b334942f215bcb2d18fe886ace857c9c3
    • Instruction Fuzzy Hash: F1F0C811E0DA4DD2D610AB68A9410B9E320EF593D0F819235DE4E57551EF2CE5869310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: strerrorstrlen
    • String ID: (null)
    • API String ID: 960536887-3941151225
    • Opcode ID: 0b05897515035d7ba616b04ae10d89e7851345c5bc408184d683faca3e5a79e1
    • Instruction ID: 67815a32647d31f0b59c388cc206a08c4bb0e1d9ebfd37fcee8f55bbad8f0af8
    • Opcode Fuzzy Hash: 0b05897515035d7ba616b04ae10d89e7851345c5bc408184d683faca3e5a79e1
    • Instruction Fuzzy Hash: AEE01A10F0F20EE5EE04B6A054010F9E1555F85380FDC4439ED0D02286FF3CE804A162
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1749224314.00007FF73D3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73D3F0000, based on PE: true
    • Associated: 00000000.00000002.1749209464.00007FF73D3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749254622.00007FF73D40D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749277310.00007FF73D411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749314209.00007FF73D419000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1749349349.00007FF73D41C000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73d3f0000_awg.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeaveValue
    • String ID:
    • API String ID: 682475483-0
    • Opcode ID: 08af56dec14cee726e5e9c565d7400ea4c10c1628f34bf4d55a560529916973e
    • Instruction ID: b2488e66e3ea9ef8b78ec047e51ff19306ff0ef2408735173d61f247121974e5
    • Opcode Fuzzy Hash: 08af56dec14cee726e5e9c565d7400ea4c10c1628f34bf4d55a560529916973e
    • Instruction Fuzzy Hash: 76012565B0D64EE1FA05BB81E944178D3647F04B90FD50035CD0D87660FF3CEE85A220