StartGameTask
StartGameTaskLine
Static task
static1
Behavioral task
behavioral1
Sample
DevData.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
DevData.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
HiJack.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
HiJack.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Kernel.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Kernel.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Main.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Main.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
wyad.dll
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
wyad.dll
Resource
win10v2004-20221111-en
Target
25ab8ac34780c1c20f77bfa3d4c04a0c02219d3bf2723f77c551b85bc9eacfe7
Size
1.0MB
MD5
07c345c2121ec1cbac9243717351b7d2
SHA1
dfc507527ca1c519dd1156503f93127a64fb6acc
SHA256
25ab8ac34780c1c20f77bfa3d4c04a0c02219d3bf2723f77c551b85bc9eacfe7
SHA512
0f7c70e9d4a0172f554d100f4e2b04cc17c01b2239917f4ed9a210be470ca62719fae510b086a5246d9823c562e9cab8811c2aa93f972c7ee403c279096de96d
SSDEEP
24576:kY0RgATEIRNTfavOBx9vWtSsw5P4BsscH94KVtkAGb:kI4EARiGBfsU4escH94KVtkAGb
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StartGameTask
StartGameTaskLine
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord1134
ord6467
ord4202
ord5265
ord4376
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2086
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord4234
ord4710
ord2379
ord1113
ord3237
ord4278
ord6663
ord1116
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord4299
ord1768
ord6215
ord5718
ord641
ord858
ord2818
ord2725
ord3953
ord815
ord561
ord3738
ord3081
ord3262
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord823
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord6059
ord3229
ord860
ord535
ord5204
ord5808
ord540
ord5353
ord533
ord5194
ord798
ord6392
ord389
ord537
ord2915
ord800
ord743
ord446
ord4003
ord2486
ord4226
ord4622
ord1223
ord290
ord2623
ord1206
ord614
ord4424
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord2985
ord3136
ord4465
ord3259
ord3147
ord2982
ord1799
ord825
ord2446
strncat
malloc
free
strstr
strncmp
sprintf
memmove
strncpy
calloc
_mbsstr
printf
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_mbscmp
atol
__CxxFrameHandler
_stricmp
_strlwr
_access
rand
srand
time
InitializeCriticalSection
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFilePointer
CreateToolhelp32Snapshot
Process32First
Process32Next
GetSystemDirectoryA
FindResourceA
LoadResource
SizeofResource
WriteFile
GlobalAlloc
OpenFileMappingA
GetTempPathA
DeleteCriticalSection
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
ReadFile
FlushViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
DeleteFileA
RemoveDirectoryA
GetVersionExA
WaitForSingleObject
TerminateThread
CreateEventA
GetLastError
CloseHandle
CreateThread
VirtualQuery
Sleep
OutputDebugStringA
lstrlenW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
ExitProcess
LocalFree
LocalAlloc
MultiByteToWideChar
CreateProcessA
GetWindowThreadProcessId
PostMessageA
EnableWindow
wsprintfA
SetTimer
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CoCreateInstance
CoInitialize
VariantChangeType
VariantClear
VariantInit
SysAllocString
VariantCopy
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Xlen@std@@YAXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
InternetCrackUrlA
GetAdaptersInfo
setsockopt
listen
accept
send
recv
select
bind
getpeername
recvfrom
__WSAFDIsSet
sendto
gethostbyaddr
ioctlsocket
htons
connect
gethostbyname
closesocket
socket
WSACleanup
WSAStartup
inet_addr
inet_ntoa
htonl
ntohl
gethostname
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord3318
ord5186
ord6385
ord2818
ord1116
ord1176
ord1575
ord1168
ord1577
ord1182
ord1979
ord1243
ord1197
ord1570
ord1253
ord1255
ord6467
ord1578
ord600
ord826
ord269
ord5442
ord858
ord6877
ord3953
ord2725
ord665
ord561
ord354
ord815
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord825
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord6059
ord3229
ord860
ord939
ord5204
ord5808
ord540
ord5353
ord533
ord5194
ord798
ord2915
ord6392
ord823
ord389
ord537
ord4204
ord535
ord800
ord342
memmove
strrchr
_mbsstr
exit
printf
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
_mbscmp
atol
__CxxFrameHandler
_itoa
_adjust_fdiv
time
free
_stricmp
malloc
strncpy
strncat
rand
srand
sprintf
localtime
calloc
WritePrivateProfileStringA
GetCurrentProcessId
GetTickCount
GetCurrentThread
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFilePointer
WriteFile
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
GlobalAlloc
GetTempPathA
CreateFileMappingA
FlushViewOfFile
MapViewOfFile
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
GetCurrentProcess
GetVersionExA
DeleteFileA
CreateProcessA
LoadLibraryExA
GetProcAddress
GetModuleFileNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
Sleep
CreateEventA
GetLastError
VirtualQuery
CreateThread
TerminateThread
OutputDebugStringA
CreateFileA
GetFileInformationByHandle
ReadFile
CloseHandle
LocalAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnmapViewOfFile
OpenProcess
LocalFree
wsprintfA
PostMessageA
RegOpenKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
SHGetSpecialFolderPathA
?_Xlen@std@@YAXXZ
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
GetAdaptersInfo
InternetCrackUrlA
send
recv
gethostname
gethostbyaddr
getpeername
recvfrom
__WSAFDIsSet
sendto
accept
connect
closesocket
socket
WSACleanup
WSAStartup
inet_addr
inet_ntoa
htonl
setsockopt
listen
bind
ioctlsocket
select
htons
ntohs
gethostbyname
ntohl
MyStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetPrivateProfileStringA
GetModuleFileNameA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateProcessA
GetSystemDirectoryA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetLastError
WriteProcessMemory
VirtualAllocEx
OpenProcess
FreeLibrary
GetExitCodeThread
LCMapStringW
LCMapStringA
SetStdHandle
LoadLibraryA
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetVersion
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetFilePointer
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
FlushFileBuffers
wsprintfA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateThread
VirtualQuery
Process32Next
CloseHandle
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetTempPathA
GetTickCount
WriteFile
CreateFileA
SizeofResource
LoadResource
FindResourceA
DeleteFileA
Sleep
TerminateProcess
WaitForSingleObject
CreateProcessA
GetModuleFileNameA
InterlockedExchange
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapAlloc
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RaiseException
GetModuleFileNameExA
EnumProcessModules
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ