Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
amneziawg.exe

Overview

General Information

Sample name:amneziawg.exe
Analysis ID:1532546
MD5:9c3859eba6a53e9df1d885c8147337bd
SHA1:2adb6cc21f9973f1aa7a083fe86c4b88a9a5f58c
SHA256:ba23f928c64cca759bbf6f1f8318300ea384662f8b0c40bf22eb059beefc37af
Tags:exeuser-Bacn
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected UAC Bypass using CMSTP
Creates a process in suspended mode (likely to inject code)
Installs a raw input device (often for capturing keystrokes)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Yara signature match

Classification

  • System is w10x64
  • amneziawg.exe (PID: 2700 cmdline: "C:\Users\user\Desktop\amneziawg.exe" MD5: 9C3859EBA6A53E9DF1D885C8147337BD)
    • amneziawg.exe (PID: 3340 cmdline: "C:\Users\user\Desktop\amneziawg.exe" /installmanagerservice MD5: 9C3859EBA6A53E9DF1D885C8147337BD)
  • amneziawg.exe (PID: 7156 cmdline: C:\Users\user\Desktop\amneziawg.exe /managerservice MD5: 9C3859EBA6A53E9DF1D885C8147337BD)
    • amneziawg.exe (PID: 3176 cmdline: C:\Users\user\Desktop\amneziawg.exe /ui 764 760 772 780 MD5: 9C3859EBA6A53E9DF1D885C8147337BD)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
amneziawg.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    amneziawg.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
    • 0x3c9782:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    • 0x3cf731:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    • 0x49d5cd:$s1: CoGetObject
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.3370356203.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000002.00000000.2118774849.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000001.00000000.2117248766.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000001.00000002.2125608494.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000000.00000002.2118135735.0000000000C72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              Click to see the 7 entries
              SourceRuleDescriptionAuthorStrings
              2.2.amneziawg.exe.980000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                2.2.amneziawg.exe.980000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x3c9782:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x3cf731:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x49d5cd:$s1: CoGetObject
                0.0.amneziawg.exe.980000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  0.0.amneziawg.exe.980000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                  • 0x3c9782:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x3cf731:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x49d5cd:$s1: CoGetObject
                  4.2.amneziawg.exe.980000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    Click to see the 11 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    Exploits

                    barindex
                    Source: Yara matchFile source: amneziawg.exe, type: SAMPLE
                    Source: Yara matchFile source: 2.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3370356203.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.2118774849.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.2117248766.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2125608494.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2118135735.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2114585117.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3370357272.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.2120858143.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: amneziawg.exe PID: 2700, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: amneziawg.exe PID: 3340, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: amneziawg.exe PID: 7156, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: amneziawg.exe PID: 3176, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWGJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWG\DataJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWG\Data\log.binJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWG\Data\ConfigurationsJump to behavior
                    Source: amneziawg.exeStatic PE information: certificate valid
                    Source: amneziawg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: amneziawg.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: amneziawg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                    Source: amneziawg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                    Source: amneziawg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                    Source: amneziawg.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                    Source: amneziawg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                    Source: amneziawg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                    Source: amneziawg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                    Source: amneziawg.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                    Source: amneziawg.exeString found in binary or memory: http://ocsp.comodoca.com0
                    Source: amneziawg.exeString found in binary or memory: http://ocsp.sectigo.com0
                    Source: amneziawg.exeString found in binary or memory: https://amnezia.org/D
                    Source: amneziawg.exeString found in binary or memory: https://amnezia.org/wireguard-log-%s.txtTaskbarButtonCreatedreflect.Value.IsZeroreflect.Value.SetInt
                    Source: amneziawg.exe, 00000000.00000002.2120077035.000000C0000E2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS
                    Source: amneziawg.exeString found in binary or memory: https://sectigo.com/CPS0
                    Source: amneziawg.exe, 00000000.00000002.2120077035.000000C0000E2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS2.23.140.1.4.1
                    Source: amneziawg.exe, 00000000.00000002.2118135735.0000000000C72000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: FwpmEngineOpen0FwpmFreeMemory0handshakeZeroedGetModuleHandleclientCompositeSetActiveWindowwidget requiredCreatePopupMenuSysTabControl32ToolbarWindow32RegisterClassExExcludeClipRectGetEnhMetaFileWGetTextMetricsWPlayEnhMetaFileNotTrueTypeFontProfileNotFoundGdiplusShutdownGetThreadLocaleOleUninitializewglGetCurrentDCDragAcceptFilesCallWindowProcWCreateWindowExWDialogBoxParamWGetActiveWindowGetDpiForWindowGetMonitorInfoWGetRawInputDataInsertMenuItemWIsWindowEnabledPostQuitMessageSetWinEventHookTrackMouseEventWindowFromPointDrawThemeTextExzipinsecurepathjstmpllitinterptarinsecurepathx509usepoliciesinvalid pointerWintunSetLoggeravx512vpopcntdq&Save to filememstr_8f1681dd-b

                    System Summary

                    barindex
                    Source: amneziawg.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 2.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 4.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 2.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 4.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: amneziawg.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 2.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 4.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 2.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 4.0.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.amneziawg.exe.980000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: classification engineClassification label: mal56.expl.winEXE@6/1@0/0
                    Source: C:\Users\user\Desktop\amneziawg.exeFile created: C:\Program Files\AmneziaWGJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeFile opened: C:\Windows\system32\eca7494d4e254c1e0b6e04506a7fd3f00de299ec8a858d9b22102932b4e93054AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeFile opened: C:\Windows\system32\5919c4fa007950ff9fd565974fab4216e24214c0fbc7da20a4a904f9e5cd40f0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeFile opened: C:\Windows\system32\54d556396c49db0a849f394780942514ba738478999859b49a72fe90147340d7AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeFile opened: C:\Windows\system32\c84f4d8d6396fed1d59d385764634dd02067f628821080447a8dc9cfdbd3e9e5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                    Source: amneziawg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\amneziawg.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: amneziawg.exeString found in binary or memory: pacer: assist ratio=workbuf is not emptybad use of bucket.mpbad use of bucket.bpruntime: double waitws2_32.dll not foundpreempt off reason: forcegc: phase errorgopark: bad g statusgo of nil func valueselectgo: bad wakeupsemaRoot rotateRightreflect.makeFuncStubdodeltimer0: wrong Ptrace: out of memorywirep: already in goGetProcessMemoryInfobcryptprimitives.dllinvalid request codebad font file formatis a named type filekey has been revokedconnection timed outEgyptian_HieroglyphsMeroitic_Hieroglyphsinvalid DNS responsegetadaptersaddressesunexpected network: bind is already openadding existing peerother UAPI error: %wextra data in bufferbitmap cannot be nilSetBrushOrgEx failedparent cannot be nilmin must be positiveInitCommonControlsExCommDlgExtendedErrorAddFontMemResourceExGetEnhMetaFileHeaderPropertyNotSupportedUnknown Status ValueFileTimeToSystemTimeSystemTimeToFileTimewglGetCurrentContextSHGetPathFromIDListWflate: closed writerhttplaxcontentlengthx509usefallbackrootsmissing IPv6 addressunexpected characterWintunGetAdapterLUIDexpression too largeinvalid repeat countAmneziaWG DeactivatedBind close failed: %vExport tunnels to zipInvalid endpoint hostKey must have a valuePersistent keepalive:Tunnel already existsUAPI: Updating fwmark/installtunnelserviceunsupported operationreflect.Value.Complex186264514923095703125931322574615478515625Morocco Standard TimeNamibia Standard TimeAlaskan Standard TimeCentral Standard TimePacific Standard TimeEastern Standard TimeSE Asia Standard TimeArabian Standard TimeMagadan Standard TimeMyanmar Standard TimeYakutsk Standard TimeBelarus Standard TimeRussian Standard TimeRomance Standard TimeSaratov Standard TimeNorfolk Standard Timetrace/breakpoint trapuser defined signal 1user defined signal 2CM_Get_DevNode_StatusAdjustTokenPrivilegesChangeServiceConfig2WDeregisterEventSourceEnumServicesStatusExWGetNamedSecurityInfoWLookupPrivilegeValueWSetNamedSecurityInfoWDwmGetWindowAttributeDwmSetWindowAttributeGetVolumeInformationWReadDirectoryChangesWNetGetJoinInformationNtCreateNamedPipeFileSetupDiEnumDeviceInfoSetupUninstallOEMInfWWSALookupServiceNextWWTSEnumerateSessionsWSeLoadDriverPrivilegebad type in compare: of unexported methodunexpected value stepreflect.Value.SetZeroreflect.Value.Pointerreflect.Value.SetUintnegative shift amountconcurrent map writes/gc/heap/allocs:bytesruntime: work.nwait= previous allocCount=, levelBits[level] = runtime: searchIdx = defer on system stackpanic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionNetUserGetLocalGroupsGetProfilesDirectoryWlink has been severedpackage not installedblock device requiredstate not recoverableread-only file systemstale NFS file handleAnatolian_HieroglyphsInscriptional_Pahlavilocalhost.localdomaininitPacketMagicHeaderFwpmTransactionAbort0FwpmTrans
                    Source: amneziawg.exeString found in binary or memory: Interface up requested[EnumerationSeparator]/installmanagerservicereflectlite.Value.Type0123456789aAbBcCdDeEfFexpected quoted string4656612873077392578125Sao Tome Standard TimeAleutian Standard TimeParaguay Standard TimeMountain Standard TimeAtlantic Standard TimePakistan Standard TimeSakhalin Standard TimeGeorgian Standard TimeCaucasus Standard TimeTasmania Standard TimeDateline Standard TimeHawaiian Standard TimeConvertSidToStringSidWConvertStringSidToSidWEnumDependentServicesWCreateIoCompletionPortGetEnvironmentStringsWGetTimeZoneInformationWaitForMultipleObjectsNtSetSystemInformationRtlDeleteFunctionTableRtlGetNtVersionNumbersSetupDiEnumDriverInfoWSetupDiGetClassDevsExWCreateEnvironmentBlockWSAGetOverlappedResultWSALookupServiceBeginWAMNEZIAWG_TUNNEL_NAME=Session has logged outreflectlite.Value.Elemunexpected method stepreflect.Value.MapIndexreflect.Value.SetFloatinteger divide by zeroCountPagesInUse (test)ReadMetricsSlow (test)trace reader (blocked)trace goroutine statussend on closed channelcall not at safe pointgetenv before env initinterface conversion: freeIndex is not validoldoverflow is not nils.freeindex > s.nelemsbad sweepgen in refillspan has no free space/gc/scan/globals:bytes/gc/heap/frees:objectsruntime: work.nwait = runtime:scanstack: gp=scanstack - bad statusheadTailIndex overflowruntime.main not on m0set_crosscall2 missingbad g->status in readywirep: invalid p stateassembly checks failedstack not a power of 2minpc or maxpc invalidcompileCallback: type non-Go function at pc=RtlLookupFunctionEntryargument list too longaddress already in usenetwork is unreachablecannot allocate memoryprotocol not availableprotocol not supportedremote address changedInscriptional_ParthianNyiakeng_Puachue_Hmong%SystemRoot%\system32\.localhost.localdomainmissing ']' in addressinvalid address familyoperation was canceledresponsePacketJunkSizeFwpmTransactionCommit0CancelMibChangeNotify2invalid message lengthslice length too largeunsupported image typebuffered BitBlt failedCreateWindowEx(BUTTON)SetMenuItemInfo failedPlayEnhMetaFile failedcreating static failedWireGuard UI - TabPageCreateCompatibleBitmapwglRealizeLayerPaletteGetSystemMetricsForDpiRegisterWindowMessageWzip: file closed twicecatmsg: illegal varintunexpected length codeIPv4 address too shortmultiple :: in addressskipping Question Nameskipping Question TypeWintunGetReadWaitEventerror parsing regexp: Error Exiting WireGuardUnable to create tunnelUnable to delete tunnel/uninstalltunnelservicereflectlite.Value.IsNil<invalid reflect.Value>0123456789aAbBcCdDeEfF_23283064365386962890625E. Africa Standard TimeTocantins Standard TimeArgentina Standard TimeVenezuela Standard TimeGreenland Standard TimeSri Lanka Standard TimeWest Bank Standard TimeQyzylorda Standard TimeSingapore Standard TimeWest Asia Standard TimeGreenwich Standard TimeLord Howe Standard TimeAstrakhan Standard TimeW. Europe Standard TimeE. Europe Standard TimeVolgograd Standard TimeMauritius Standard TimeMarquesas Standard Time" no
                    Source: amneziawg.exeString found in binary or memory: " not supported for cpu option "unexpected character, want colonchacha20: invalid buffer overlap%v - Failed to derive keypair: %v%v - Sending handshake initiation%v - UAPI: Updating preshared keyFailed to create cookie reply: %vFailed to decode response messageInvalid key for interface sectionReceived packet with invalid mac1Receiving cookie response from %sThe %s tunnel has been activated.UAPI: Using default response typeno configuration files were found/installtunnelservice CONFIG_PATH142108547152020037174224853515625710542735760100185871124267578125CryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWSCGQUUSGSCOMPRKCYMSPMSRBATFMYTATNbytes.Buffer.Grow: negative countreflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangesync: RUnlock of unlocked RWMutexslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangeskip everything and stop the walktoo many levels of symbolic linkswaiting for unsupported file typego package net: confVal.netCgo = Data directory is actually a filepersistent_keepalive_interval=%d
                    Source: amneziawg.exeString found in binary or memory: " not supported for cpu option "unexpected character, want colonchacha20: invalid buffer overlap%v - Failed to derive keypair: %v%v - Sending handshake initiation%v - UAPI: Updating preshared keyFailed to create cookie reply: %vFailed to decode response messageInvalid key for interface sectionReceived packet with invalid mac1Receiving cookie response from %sThe %s tunnel has been activated.UAPI: Using default response typeno configuration files were found/installtunnelservice CONFIG_PATH142108547152020037174224853515625710542735760100185871124267578125CryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWSCGQUUSGSCOMPRKCYMSPMSRBATFMYTATNbytes.Buffer.Grow: negative countreflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangesync: RUnlock of unlocked RWMutexslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangeskip everything and stop the walktoo many levels of symbolic linkswaiting for unsupported file typego package net: confVal.netCgo = Data directory is actually a filepersistent_keepalive_interval=%d
                    Source: amneziawg.exeString found in binary or memory: " not supported for cpu option "unexpected character, want colonchacha20: invalid buffer overlap%v - Failed to derive keypair: %v%v - Sending handshake initiation%v - UAPI: Updating preshared keyFailed to create cookie reply: %vFailed to decode response messageInvalid key for interface sectionReceived packet with invalid mac1Receiving cookie response from %sThe %s tunnel has been activated.UAPI: Using default response typeno configuration files were found/installtunnelservice CONFIG_PATH142108547152020037174224853515625710542735760100185871124267578125CryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWSCGQUUSGSCOMPRKCYMSPMSRBATFMYTATNbytes.Buffer.Grow: negative countreflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangesync: RUnlock of unlocked RWMutexslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangeskip everything and stop the walktoo many levels of symbolic linkswaiting for unsupported file typego package net: confVal.netCgo = Data directory is actually a filepersistent_keepalive_interval=%d
                    Source: amneziawg.exeString found in binary or memory: Permit inbound on loopback (IPv4)Permit inbound on loopback (IPv6)Error converting luid to guid: %wUnable to create Wintun interfacehex string does not fit the slicewidget must be child of containerSendMessage(TCM_SETCURSEL) failedfailed to create clipboard windowFailed to get comctl32.dll handlecatmsg: no translation for inputsleafCounts[maxBits][maxBits] != nGODEBUG: no value specified for "too many Answers to pack (>65535)encoding: missing byte order markRegistered I/O is unavailable: %vGODEBUG sys/cpu: can not enable "regexp: unhandled case in compile%v - Received handshake initiation%v - UAPI: Removing all allowedipsReceived message with unknown typeUAPI: Using default transport typeUAPI: Using default underload typeUnable to create new configurationUnable to import configuration: %vfailed to restrict dll search path3552713678800500929355621337890625: day-of-year does not match monthCM_Get_Device_Interface_List_SizeWSetFileCompletionNotificationModesbytes: Join output length overflowreflect: Field of non-struct type reflect: Field index out of boundsreflect: string index out of rangereflect.Value.Grow: slice overflowslice bounds out of range [:%x:%y]slice bounds out of range [%x:%y:]out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already set in timertoo many references: cannot spliceunexpected runtime.netpoll error: Permit inbound IPv4 traffic on TUNPermit inbound IPv6 traffic on TUNPermit outbound on loopback (IPv4)Permit outbound on loopback (IPv6)Unable to set device configurationtrailing character in UAPI get: %qname too long (%d bytes): %.20q...SendMessage(TCM_INSERTITEM) failedGetPhysicallyInstalledSystemMemoryillegal base64 data at input byte NoDefaultCurrentDirectoryInExePathGODEBUG sys/cpu: can not disable "invalid nested repetition operatorinvalid or unsupported Perl syntaxchacha20: wrong HChaCha20 key sizeFailed to decode initiation messageInvalid key for [Interface] sectionThe %s tunnel has been deactivated.UAPI: Updating junk_packet_max_sizeUAPI: Updating junk_packet_min_size/uninstalltunnelservice TUNNEL_NAMEunsigned integer overflow on token 1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 92006-01-02T15:04:05.999999999Z07:00non-positive interval for NewTickerSubscribeServiceChangeNotificationsParseAcceptLanguage: invalid weightreflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freeattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has non-empty run queue
                    Source: amneziawg.exeString found in binary or memory: Permit inbound on loopback (IPv4)Permit inbound on loopback (IPv6)Error converting luid to guid: %wUnable to create Wintun interfacehex string does not fit the slicewidget must be child of containerSendMessage(TCM_SETCURSEL) failedfailed to create clipboard windowFailed to get comctl32.dll handlecatmsg: no translation for inputsleafCounts[maxBits][maxBits] != nGODEBUG: no value specified for "too many Answers to pack (>65535)encoding: missing byte order markRegistered I/O is unavailable: %vGODEBUG sys/cpu: can not enable "regexp: unhandled case in compile%v - Received handshake initiation%v - UAPI: Removing all allowedipsReceived message with unknown typeUAPI: Using default transport typeUAPI: Using default underload typeUnable to create new configurationUnable to import configuration: %vfailed to restrict dll search path3552713678800500929355621337890625: day-of-year does not match monthCM_Get_Device_Interface_List_SizeWSetFileCompletionNotificationModesbytes: Join output length overflowreflect: Field of non-struct type reflect: Field index out of boundsreflect: string index out of rangereflect.Value.Grow: slice overflowslice bounds out of range [:%x:%y]slice bounds out of range [%x:%y:]out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workruntime: g is running but p is notdoaddtimer: P already set in timertoo many references: cannot spliceunexpected runtime.netpoll error: Permit inbound IPv4 traffic on TUNPermit inbound IPv6 traffic on TUNPermit outbound on loopback (IPv4)Permit outbound on loopback (IPv6)Unable to set device configurationtrailing character in UAPI get: %qname too long (%d bytes): %.20q...SendMessage(TCM_INSERTITEM) failedGetPhysicallyInstalledSystemMemoryillegal base64 data at input byte NoDefaultCurrentDirectoryInExePathGODEBUG sys/cpu: can not disable "invalid nested repetition operatorinvalid or unsupported Perl syntaxchacha20: wrong HChaCha20 key sizeFailed to decode initiation messageInvalid key for [Interface] sectionThe %s tunnel has been deactivated.UAPI: Updating junk_packet_max_sizeUAPI: Updating junk_packet_min_size/uninstalltunnelservice TUNNEL_NAMEunsigned integer overflow on token 1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 92006-01-02T15:04:05.999999999Z07:00non-positive interval for NewTickerSubscribeServiceChangeNotificationsParseAcceptLanguage: invalid weightreflect.MakeSlice of non-slice typepersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid freeattempt to clear non-empty span setruntime: close polldesc w/o unblockruntime: inconsistent read deadlinefindrunnable: netpoll with spinningpidleput: P has non-empty run queue
                    Source: amneziawg.exeString found in binary or memory: net/addrselect.go
                    Source: amneziawg.exeString found in binary or memory: github.com/amnezia-vpn/amneziawg-go@v0.2.8/device/noise-helpers.go
                    Source: amneziawg.exeString found in binary or memory: github.com/amnezia-vpn/amneziawg-windows@v0.1.4-0.20240526104134-db18f2297e5e/tunnel/addressconfig.go
                    Source: amneziawg.exeString found in binary or memory: github.com/amnezia-vpn/amneziawg-windows-client/elevate/loader.go
                    Source: amneziawg.exeString found in binary or memory: github.com/amnezia-vpn/amneziawg-windows-client/manager/install.go
                    Source: amneziawg.exeString found in binary or memory: github.com/lxn/walk@v0.0.0-20210112085537-c389da54e794/stopwatch.go
                    Source: amneziawg.exeString found in binary or memory: github.com/lxn/walk@v0.0.0-20210112085537-c389da54e794/stopwatch.go
                    Source: C:\Users\user\Desktop\amneziawg.exeFile read: C:\Users\user\Desktop\amneziawg.exe:Zone.IdentifierJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\amneziawg.exe "C:\Users\user\Desktop\amneziawg.exe"
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess created: C:\Users\user\Desktop\amneziawg.exe "C:\Users\user\Desktop\amneziawg.exe" /installmanagerservice
                    Source: unknownProcess created: C:\Users\user\Desktop\amneziawg.exe C:\Users\user\Desktop\amneziawg.exe /managerservice
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess created: C:\Users\user\Desktop\amneziawg.exe C:\Users\user\Desktop\amneziawg.exe /ui 764 760 772 780
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess created: C:\Users\user\Desktop\amneziawg.exe "C:\Users\user\Desktop\amneziawg.exe" /installmanagerserviceJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess created: C:\Users\user\Desktop\amneziawg.exe C:\Users\user\Desktop\amneziawg.exe /ui 764 760 772 780Jump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeWindow found: window name: SysTabControl32Jump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeWindow detected: Number of UI elements: 15
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWGJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWG\DataJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWG\Data\log.binJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeDirectory created: C:\Program Files\AmneziaWG\Data\ConfigurationsJump to behavior
                    Source: amneziawg.exeStatic PE information: certificate valid
                    Source: amneziawg.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: amneziawg.exeStatic file information: File size 8231576 > 1048576
                    Source: amneziawg.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2f0200
                    Source: amneziawg.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x3b2400
                    Source: amneziawg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: amneziawg.exeStatic PE information: section name: .xdata
                    Source: amneziawg.exeStatic PE information: section name: .symtab
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                    Source: amneziawg.exe, 00000004.00000002.3374666441.00000278C1D4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll??]
                    Source: amneziawg.exe, 00000000.00000002.2121805539.000001E310258000.00000004.00000020.00020000.00000000.sdmp, amneziawg.exe, 00000001.00000002.2130844942.000001DE3141E000.00000004.00000020.00020000.00000000.sdmp, amneziawg.exe, 00000002.00000002.3374324008.0000022A76328000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess created: C:\Users\user\Desktop\amneziawg.exe "C:\Users\user\Desktop\amneziawg.exe" /installmanagerserviceJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeProcess created: C:\Users\user\Desktop\amneziawg.exe C:\Users\user\Desktop\amneziawg.exe /ui 764 760 772 780Jump to behavior
                    Source: amneziawg.exeBinary or memory string: %sinvalid styleSetWindowLongeffect == nilShell_TrayWndDestroyWindowSysListView32SelectedCountGetWindowLongLVM_SETCOLUMNGetWindowRectGetClientRectImageList_AddCreateRectRgnGetDeviceCapsSetBrushOrgExValueOverflowCreateActCtxWRtlMoveMemoryOleInitializeSysFreeStringwglShareListsPdhCloseQueryAnimateWindowDrawFocusRectGetMenuItemIDGetScrollInfoGetSystemMenuSetScrollInfoGetThemeColorOpenThemeDataEnumPrintersWRoundingMode(gocacheverifyinstallgoroothtml/templatetlsmaxrsasizeinvalid port name too longcq is corruptnot availableinvalid UTF-8Device closingPreshared key:listen_port=%dunexpected EOFComputerNameExinvalid syntax1907348632812595367431640625: extra text: ControlServiceCreateServiceWCryptGenRandomIsWellKnownSidMakeAbsoluteSDOpenSCManagerWSetThreadTokenCertCloseStoreCreateEventExWCreateMutexExWCreateProcessWFindFirstFileWFormatMessageWGetConsoleModeGetProcAddressGetTickCount64IsWow64ProcessLoadLibraryExWModule32FirstWProcess32NextWSetConsoleModeSetFilePointerSizeofResourceVirtualProtectVirtualQueryExNetUserGetInfoCoInitializeExCoUninitializeGetUserNameExWTranslateNameWGetShellWindowVerQueryValueWgetprotobyname procedure in Executing: %#qAdministrators/tunnelservice on zero Valueunknown methodunsafe.PointeruserArenaStateread mem statsallocfreetracegcstoptheworldGC assist waitfinalizer waitsync.Cond.Waits.allocCount= key size wrongnil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated timeEndPeriodbad restart PC-thread limit
                    Source: amneziawg.exeBinary or memory string: %sinvalid styleSetWindowLongeffect == nilShell_TrayWndDestroyWindowSysListView32SelectedCountGetWindowLongLVM_SETCOLUMNGetWindowRectGetClientRectImageList_AddCreateRectRgnGetDeviceCapsSetBrushOrgExValueOverflowCreateActCtxWRtlMoveMemoryOleInitializeSysFreeStringwglShareListsPdhCloseQueryAnimateWindowDrawFocusRectGetMenuItemIDGetScrollInfoGetSystemMenuSetScrollInfoGetThemeColorOpenThemeDataEnumPrintersWRoundingMode(gocacheverifyinstallgoroothtml/templatetlsmaxrsasizeinvalid port name too longcq is corruptnot availableinvalid UTF-8Device closingPreshared key:listen_port=%dunexpected EOFComputerNameExinvalid syntax1907348632812595367431640625: extra text: ControlServiceCreateServiceWCryptGenRandomIsWellKnownSidMakeAbsoluteSDOpenSCManagerWSetThreadTokenCertCloseStoreCreateEventExWCreateMutexExWCreateProcessWFindFirstFileWFormatMessageWGetConsoleModeGetProcAddressGetTickCount64IsWow64ProcessLoadLibraryExWModule32FirstWProcess32NextWSetConsoleModeSetFilePointerSizeofResourceVirtualProtectVirtualQueryExNetUserGetInfoCoInitializeExCoUninitializeGetUserNameExWTranslateNameWGetShellWindowVerQueryValueWgetprotobyname procedure in Executing: %#qAdministrators/tunnelservice on zero Valueunknown methodunsafe.PointeruserArenaStateread mem statsallocfreetracegcstoptheworldGC assist waitfinalizer waitsync.Cond.Waits.allocCount= key size wrongnil elem type! to finalizer GC worker initruntime: full=runtime: want=MB; allocated timeEndPeriod
                    Source: amneziawg.exe, 00000004.00000002.3371139511.000000C00009C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Ctrl+NC:\Windows\system32\shell32.dllC:\Windows\system32\shell32.dllShell_TrayWnd&Import tunnel(s) from file
                    Source: amneziawg.exe, 00000004.00000002.3371139511.000000C00009C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Status: UnknownShell_TrayWndStatus: UnknownShell_TrayWndListen port:DNS servers:Import tunnel(s) from fileListen port:DNS servers:Listen port:DNS servers:Import tunnel(s) from file
                    Source: C:\Users\user\Desktop\amneziawg.exeQueries volume information: C:\Program Files\AmneziaWG\Data VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeQueries volume information: C:\Program Files\AmneziaWG\Data\Configurations VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeQueries volume information: C:\Program Files\AmneziaWG\Data\Configurations VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeQueries volume information: C:\Program Files\AmneziaWG\Data\Configurations VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeQueries volume information: C:\Program Files\AmneziaWG\Data\Configurations VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeQueries volume information: C:\Program Files\AmneziaWG\Data\Configurations VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeQueries volume information: C:\Program Files\AmneziaWG\Data\Configurations VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\amneziawg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    DLL Side-Loading
                    12
                    Process Injection
                    2
                    Masquerading
                    11
                    Input Capture
                    1
                    Security Software Discovery
                    Remote Services11
                    Input Capture
                    Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    12
                    Process Injection
                    LSASS Memory2
                    Process Discovery
                    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    DLL Side-Loading
                    Security Account Manager1
                    File and Directory Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532546 Sample: amneziawg.exe Startdate: 13/10/2024 Architecture: WINDOWS Score: 56 14 Malicious sample detected (through community Yara rule) 2->14 16 Yara detected UAC Bypass using CMSTP 2->16 6 amneziawg.exe 4 2->6         started        8 amneziawg.exe 1 2->8         started        process3 process4 10 amneziawg.exe 6->10         started        12 amneziawg.exe 8->12         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    amneziawg.exe3%ReversingLabs
                    amneziawg.exe0%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl00%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#0%URL Reputationsafe
                    http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
                    http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#0%URL Reputationsafe
                    https://amnezia.org/D2%VirustotalBrowse
                    https://sectigo.com/CPS2.23.140.1.4.10%VirustotalBrowse
                    https://sectigo.com/CPS0%VirustotalBrowse
                    https://amnezia.org/wireguard-log-%s.txtTaskbarButtonCreatedreflect.Value.IsZeroreflect.Value.SetInt2%VirustotalBrowse
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    https://sectigo.com/CPSamneziawg.exe, 00000000.00000002.2120077035.000000C0000E2000.00000004.00001000.00020000.00000000.sdmpfalseunknown
                    https://amnezia.org/Damneziawg.exefalseunknown
                    https://sectigo.com/CPS0amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yamneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    https://amnezia.org/wireguard-log-%s.txtTaskbarButtonCreatedreflect.Value.IsZeroreflect.Value.SetIntamneziawg.exefalseunknown
                    http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zamneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#amneziawg.exefalse
                    • URL Reputation: safe
                    unknown
                    https://sectigo.com/CPS2.23.140.1.4.1amneziawg.exe, 00000000.00000002.2120077035.000000C0000E2000.00000004.00001000.00020000.00000000.sdmpfalseunknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1532546
                    Start date and time:2024-10-13 16:31:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 43s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:amneziawg.exe
                    Detection:MAL
                    Classification:mal56.expl.winEXE@6/1@0/0
                    EGA Information:Failed
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target amneziawg.exe, PID 2700 because it is empty
                    • Execution Graph export aborted for target amneziawg.exe, PID 3176 because it is empty
                    • Execution Graph export aborted for target amneziawg.exe, PID 3340 because it is empty
                    • Execution Graph export aborted for target amneziawg.exe, PID 7156 because there are no executed function
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Users\user\Desktop\amneziawg.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):1064968
                    Entropy (8bit):0.0027932901809495625
                    Encrypted:false
                    SSDEEP:6:Mo/lRpQ6H2AKTKBvPk6TmduWVyF9gzrP5C:MoC6WAKTKBvPk6pF+zr
                    MD5:1EF81D45DD2A32DE7830ADA0375F7BF5
                    SHA1:0E8E11AF3E20889450EEDEB30CCB9666ABFEA9EF
                    SHA-256:626C4CF50BBF004DB256A7D01E48F01725FE59C8D8476897102FB3A8D7E43E3A
                    SHA-512:4DAEC987C5900ACB48BDADCF3E7E543ED2FD14A8FA6A03808A6C3DD491D699FE513CD0C9F7227AC97A427C8E85C99EB18D4204FD7C359EE9BE23883AD608097B
                    Malicious:false
                    Reputation:low
                    Preview:........4..+....[MGR] Starting AmneziaWG/1.0.0 (Windows 10.0.19045; amd64)...................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ..,....[MGR] Starting UI process for user .user@user-PC. for session 1.........................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                    Entropy (8bit):6.279002018539988
                    TrID:
                    • Win64 Executable GUI (202006/5) 92.65%
                    • Win64 Executable (generic) (12005/4) 5.51%
                    • Generic Win/DOS Executable (2004/3) 0.92%
                    • DOS Executable Generic (2002/1) 0.92%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:amneziawg.exe
                    File size:8'231'576 bytes
                    MD5:9c3859eba6a53e9df1d885c8147337bd
                    SHA1:2adb6cc21f9973f1aa7a083fe86c4b88a9a5f58c
                    SHA256:ba23f928c64cca759bbf6f1f8318300ea384662f8b0c40bf22eb059beefc37af
                    SHA512:3824cb357c508f7a87894af928d97ad99d543e950af19bd82c0edda2196f36d272d27b54f1315a85921a41fb346b75b261e1fd366021f2b9623f810229300b93
                    SSDEEP:98304:jHJNGoKgovuzo8bhevZrQZXE79+tA3wUkQok:xo27hevxKU7otA8QR
                    TLSH:29863AC7AD914598DCA987F0896692623A70BC4C4FF693D33B21B7582F367D06B7A340
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........bq......."......./...................@.....................................s&~...`... ............................
                    Icon Hash:3370ccd6d4cc692b
                    Entrypoint:0x46dd00
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:1
                    File Version Major:6
                    File Version Minor:1
                    Subsystem Version Major:6
                    Subsystem Version Minor:1
                    Import Hash:c2d457ad8ac36fc9f18d45bffcd450c2
                    Signature Valid:true
                    Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                    Signature Validation Error:The operation completed successfully
                    Error Number:0
                    Not Before, Not After
                    • 31/08/2023 02:00:00 31/08/2026 01:59:59
                    Subject Chain
                    • CN=Privacy Technologies OU, O=Privacy Technologies OU, S=Harjumaa, C=EE
                    Version:3
                    Thumbprint MD5:AD1BCBF19AE2F91BB114D33B85359E56
                    Thumbprint SHA-1:141D90A1BA8F61863FBEDDF7DD1D66C1D1E0B128
                    Thumbprint SHA-256:A08EA2A7A257AD690B988446951E9DEF2986A2F3F546B6F0902805330F3B6B48
                    Serial:00D0461B529F67189D43744E9CEFE172AE
                    Instruction
                    jmp 00007FC6E933F600h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    dec eax
                    mov ebp, esp
                    pushfd
                    cld
                    dec eax
                    sub esp, 000000E0h
                    dec eax
                    mov dword ptr [esp], edi
                    dec eax
                    mov dword ptr [esp+08h], esi
                    dec eax
                    mov dword ptr [esp+10h], ebp
                    dec eax
                    mov dword ptr [esp+18h], ebx
                    dec esp
                    mov dword ptr [esp+20h], esp
                    dec esp
                    mov dword ptr [esp+28h], ebp
                    dec esp
                    mov dword ptr [esp+30h], esi
                    dec esp
                    mov dword ptr [esp+38h], edi
                    movups dqword ptr [esp+40h], xmm6
                    movups dqword ptr [esp+50h], xmm7
                    inc esp
                    movups dqword ptr [esp+60h], xmm0
                    inc esp
                    movups dqword ptr [esp+70h], xmm1
                    inc esp
                    movups dqword ptr [esp+00000080h], xmm2
                    inc esp
                    movups dqword ptr [esp+00000090h], xmm3
                    inc esp
                    movups dqword ptr [esp+000000A0h], xmm4
                    inc esp
                    movups dqword ptr [esp+000000B0h], xmm5
                    inc esp
                    movups dqword ptr [esp+000000C0h], xmm6
                    inc esp
                    movups dqword ptr [esp+000000D0h], xmm7
                    inc ebp
                    xorps xmm7, xmm7
                    dec ebp
                    xor esi, esi
                    dec eax
                    mov eax, dword ptr [00709A92h]
                    dec eax
                    mov eax, dword ptr [eax]
                    dec eax
                    cmp eax, 00000000h
                    je 00007FC6E9342F05h
                    dec esp
                    mov esi, dword ptr [eax]
                    dec eax
                    sub esp, 10h
                    dec eax
                    mov eax, ecx
                    dec eax
                    mov ebx, edx
                    call 00007FC6E93438DBh
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x7940000x554.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x7a80000xc06f0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x77c0000x168c0.pdata
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x7d6c000x2e98.rsrc
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7950000x11faa.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x6a56200x180.data
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x2f01c60x2f0200bac4717a3b7baf8ae7b00c4e66bf754funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x2f20000x3b23e00x3b2400416eedbdee6f75c1e0356aba62866a1funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x6a50000xd6c600x4a400a40485bd08a1bf4f02212a53a898bf19False0.34078414351851855data4.438560923126627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .pdata0x77c0000x168c00x16a008f01e16f39866c3ce4899ce04fa36242False0.3901717886740331data5.509527765883878IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .xdata0x7930000xb40x2009429dd67ca883e67888efcb7512327d7False0.224609375shared library1.787112262798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .idata0x7940000x5540x60097f81edbedeb121cd609839463911428False0.3795572916666667data3.9924969780968635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x7950000x11faa0x12000285bcb388db1369171a878e74588f16cFalse0.21012369791666666data5.458447502506389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .symtab0x7a70000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .rsrc0x7a80000xc06f00xc0800a36cbfd1fd3fd8bbbf39573dcb6b0d3fFalse0.35044389204545456data5.584675086600346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x7a8b580x28b7aPNG image data, 256 x 256, 16-bit/color RGBA, non-interlaced1.000365755675209
                    RT_ICON0x7d16d80x25228Device independent bitmap graphic, 192 x 384 x 32, image size 147456, resolution 3779 x 3779 px/m0.18735864934518487
                    RT_ICON0x7f69000x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/m0.25810363184668167
                    RT_ICON0x8071280x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 3779 x 3779 px/m0.3244692032793778
                    RT_ICON0x8105d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/m0.43132971185640057
                    RT_ICON0x8147f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/m0.5116182572614107
                    RT_ICON0x816da00x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6400, resolution 3779 x 3779 px/m0.5597633136094674
                    RT_ICON0x8188080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/m0.6334427767354597
                    RT_ICON0x8198b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 3779 x 3779 px/m0.703688524590164
                    RT_ICON0x81a2380x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600, resolution 3779 x 3779 px/m0.7395348837209302
                    RT_ICON0x81a8f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/m0.7721631205673759
                    RT_ICON0x81adf80x24e2PNG image data, 256 x 256, 16-bit gray+alpha, non-interlaced0.9936454141071807
                    RT_ICON0x81d2e00x25228Device independent bitmap graphic, 192 x 384 x 32, image size 147456, resolution 3779 x 3779 px/m0.047086204176090045
                    RT_ICON0x8425080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/m0.060865964746243936
                    RT_ICON0x852d300x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 3779 x 3779 px/m0.07026487281900358
                    RT_ICON0x85c1d80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/m0.08827350023618327
                    RT_ICON0x8604000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/m0.10269709543568464
                    RT_ICON0x8629a80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6400, resolution 3779 x 3779 px/m0.11789940828402366
                    RT_ICON0x8644100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/m0.125
                    RT_ICON0x8654b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 3779 x 3779 px/m0.1540983606557377
                    RT_ICON0x865e400x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600, resolution 3779 x 3779 px/m0.18488372093023256
                    RT_ICON0x8664f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/m0.19148936170212766
                    RT_GROUP_ICON0x81ad580xa0data0.69375
                    RT_GROUP_ICON0x8669600xa0data0.7
                    RT_VERSION0x8682380x4b4dataChineseTaiwan0.45099667774086377
                    RT_VERSION0x866a000x4d4dataEnglishUnited States0.43284789644012944
                    RT_VERSION0x866ed80x4dcdataFrenchFrance0.430064308681672
                    RT_VERSION0x8673b80x4dcdataItalianItaly0.4316720257234727
                    RT_VERSION0x8678980x4c4dataJapaneseJapan0.4565573770491803
                    RT_VERSION0x867d600x4d4dataSlovenianSlovenia0.42961165048543687
                    RT_MANIFEST0x7a85c80x58eXML 1.0 document, ASCII text0.39943741209563993
                    DLLImport
                    kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
                    Language of compilation systemCountry where language is spokenMap
                    ChineseTaiwan
                    EnglishUnited States
                    FrenchFrance
                    ItalianItaly
                    JapaneseJapan
                    SlovenianSlovenia
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:10:32:08
                    Start date:13/10/2024
                    Path:C:\Users\user\Desktop\amneziawg.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\amneziawg.exe"
                    Imagebase:0x980000
                    File size:8'231'576 bytes
                    MD5 hash:9C3859EBA6A53E9DF1D885C8147337BD
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Go lang
                    Yara matches:
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2118135735.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.2114585117.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:10:32:08
                    Start date:13/10/2024
                    Path:C:\Users\user\Desktop\amneziawg.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\amneziawg.exe" /installmanagerservice
                    Imagebase:0x980000
                    File size:8'231'576 bytes
                    MD5 hash:9C3859EBA6A53E9DF1D885C8147337BD
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Go lang
                    Yara matches:
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000000.2117248766.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.2125608494.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:10:32:08
                    Start date:13/10/2024
                    Path:C:\Users\user\Desktop\amneziawg.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Users\user\Desktop\amneziawg.exe /managerservice
                    Imagebase:0x980000
                    File size:8'231'576 bytes
                    MD5 hash:9C3859EBA6A53E9DF1D885C8147337BD
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Go lang
                    Yara matches:
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000000.2118774849.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.3370357272.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Target ID:4
                    Start time:10:32:09
                    Start date:13/10/2024
                    Path:C:\Users\user\Desktop\amneziawg.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Users\user\Desktop\amneziawg.exe /ui 764 760 772 780
                    Imagebase:0x980000
                    File size:8'231'576 bytes
                    MD5 hash:9C3859EBA6A53E9DF1D885C8147337BD
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Go lang
                    Yara matches:
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.3370356203.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000000.2120858143.0000000000C72000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.2117873898.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.2117837933.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118135735.0000000000C72000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118567555.0000000001025000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118690916.000000000102A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118724498.000000000102D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118759211.000000000102E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118933499.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118976494.0000000001057000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119013017.0000000001058000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119036068.0000000001059000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119090063.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119113583.0000000001068000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119136633.000000000106B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119160763.000000000106D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.000000000106E000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.0000000001089000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.000000000108F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.00000000010F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119328302.00000000010FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119355045.0000000001114000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119377943.0000000001115000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119377943.0000000001128000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_amneziawg.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                      • Instruction ID: c7620dd07016295618f2fa9581421663232282e83aee4d25c59c917093547dee
                      • Opcode Fuzzy Hash: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                      • Instruction Fuzzy Hash: 9D31986391CFC482D3218B25F5413AAB364F7A9784F15A715EFC812A1ADF38E2E5CB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.2117873898.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.2117837933.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118135735.0000000000C72000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118567555.0000000001025000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118690916.000000000102A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118724498.000000000102D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118759211.000000000102E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118933499.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2118976494.0000000001057000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119013017.0000000001058000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119036068.0000000001059000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119090063.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119113583.0000000001068000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119136633.000000000106B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119160763.000000000106D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.000000000106E000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.0000000001089000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.000000000108F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119184349.00000000010F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119328302.00000000010FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119355045.0000000001114000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119377943.0000000001115000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2119377943.0000000001128000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_amneziawg.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                      • Instruction ID: a992bdb9de96ffcf336066b4e5bb68cc97d8973278ee78b4a32f132c0206305c
                      • Opcode Fuzzy Hash: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000001.00000002.2125328211.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000001.00000002.2125297212.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2125608494.0000000000C72000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2125965569.0000000001025000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2125987653.000000000102A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126010113.000000000102D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126029501.000000000102E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126059946.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126083490.0000000001057000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126108435.0000000001058000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126130865.0000000001059000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126152802.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126174465.0000000001068000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126199846.000000000106B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126224516.000000000106D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.000000000106E000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.0000000001089000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.000000000108F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.00000000010F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126651352.00000000010FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126699812.0000000001114000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126730529.0000000001115000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126730529.0000000001128000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_980000_amneziawg.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                      • Instruction ID: c7620dd07016295618f2fa9581421663232282e83aee4d25c59c917093547dee
                      • Opcode Fuzzy Hash: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                      • Instruction Fuzzy Hash: 9D31986391CFC482D3218B25F5413AAB364F7A9784F15A715EFC812A1ADF38E2E5CB40
                      Memory Dump Source
                      • Source File: 00000001.00000002.2125328211.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000001.00000002.2125297212.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2125608494.0000000000C72000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2125965569.0000000001025000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2125987653.000000000102A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126010113.000000000102D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126029501.000000000102E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126059946.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126083490.0000000001057000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126108435.0000000001058000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126130865.0000000001059000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126152802.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126174465.0000000001068000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126199846.000000000106B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126224516.000000000106D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.000000000106E000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.0000000001089000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.000000000108F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126282607.00000000010F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126651352.00000000010FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126699812.0000000001114000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126730529.0000000001115000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000001.00000002.2126730529.0000000001128000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_980000_amneziawg.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                      • Instruction ID: a992bdb9de96ffcf336066b4e5bb68cc97d8973278ee78b4a32f132c0206305c
                      • Opcode Fuzzy Hash: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000004.00000002.3370116069.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000004.00000002.3370075473.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370356203.0000000000C72000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370593192.0000000001025000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370619365.000000000102A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370646182.000000000102D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370670192.000000000102E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370702646.0000000001055000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370726798.0000000001057000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370753126.0000000001058000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370777119.000000000105A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370801207.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370828716.0000000001068000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370852650.000000000106B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370876127.000000000106D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370899444.000000000106E000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370899444.0000000001089000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370899444.00000000010F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370981507.00000000010FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3371009621.0000000001114000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3371035554.0000000001115000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3371035554.0000000001128000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_980000_amneziawg.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                      • Instruction ID: c7620dd07016295618f2fa9581421663232282e83aee4d25c59c917093547dee
                      • Opcode Fuzzy Hash: cff9fe2135e67e95bb574443de1d06a8e0b8e89167aa2be6e3a61b8e8eda4513
                      • Instruction Fuzzy Hash: 9D31986391CFC482D3218B25F5413AAB364F7A9784F15A715EFC812A1ADF38E2E5CB40
                      Memory Dump Source
                      • Source File: 00000004.00000002.3370116069.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000004.00000002.3370075473.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370356203.0000000000C72000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370593192.0000000001025000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370619365.000000000102A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370646182.000000000102D000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370670192.000000000102E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370702646.0000000001055000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370726798.0000000001057000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370753126.0000000001058000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370777119.000000000105A000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370801207.000000000105B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370828716.0000000001068000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370852650.000000000106B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370876127.000000000106D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370899444.000000000106E000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370899444.0000000001089000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370899444.00000000010F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3370981507.00000000010FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3371009621.0000000001114000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3371035554.0000000001115000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000004.00000002.3371035554.0000000001128000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_980000_amneziawg.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                      • Instruction ID: a992bdb9de96ffcf336066b4e5bb68cc97d8973278ee78b4a32f132c0206305c
                      • Opcode Fuzzy Hash: 6e2dc365eeaf7d755159d019c6b8806dfc90132728faab9ca90f57871b6c792b
                      • Instruction Fuzzy Hash: