RegisterForProvider
SB_SMS_GetCtrlCountEx
SB_SMS_QuickCommandEx
SB_SMS_ReadBlockEx
SB_SMS_ReadByteEx
SB_SMS_ReadWordEx
SB_SMS_WriteBlockEx
SB_SMS_WriteByteEx
SB_SMS_WriteWordEx
Overview
overview
8Static
static
3HOW TO USE.txt
windows10-2004-x64
1HOW TO USE.txt
windows11-21h2-x64
3ManualLoader.bat
windows10-2004-x64
8ManualLoader.bat
windows11-21h2-x64
8PRIVATE_P2C.exe
windows10-2004-x64
1PRIVATE_P2C.exe
windows11-21h2-x64
1Taigei64.dll
windows10-2004-x64
1Taigei64.dll
windows11-21h2-x64
1battleye.sys
windows10-2004-x64
1battleye.sys
windows11-21h2-x64
1diag.txt
windows10-2004-x64
1diag.txt
windows11-21h2-x64
3drv64.dll
windows10-2004-x64
1drv64.dll
windows11-21h2-x64
1kdu.exe
windows10-2004-x64
1kdu.exe
windows11-21h2-x64
1Static task
static1
Behavioral task
behavioral1
Sample
HOW TO USE.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
HOW TO USE.txt
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
ManualLoader.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
ManualLoader.bat
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
PRIVATE_P2C.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
PRIVATE_P2C.exe
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
Taigei64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Taigei64.dll
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
battleye.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
battleye.sys
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
diag.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
diag.txt
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
drv64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
drv64.dll
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
kdu.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
kdu.exe
Resource
win11-20240709-en
Target
UD_[unknowncheats.me]_.zip
Size
1.3MB
MD5
057e0de050e187a3c107ae0761d8dc2b
SHA1
5b0b10544e16be809ffb33a686c6a3920090370a
SHA256
911ae64b845bc889dbd249e3e45652fc767418ea12141a9ce865ad47ca2c7a07
SHA512
dec1f71b94d16889cec03e10fe2499d7f3574f1c640c404bb1e6d162c4797b72fb538f325a2bc5573083c1746d2c17a1db8330c4acd51d5c4b755a0f2bd669c6
SSDEEP
24576:0W7/h5YqDRBIyBJdJ3P9hqPcfDHtmsl8tqtdQepFUTtx/nuXj:x7p5V1Brv9s3sl8tzyFUJ5w
Checks for missing Authenticode signature.
resource |
---|
unpack001/PRIVATE_P2C.exe |
unpack001/Taigei64.dll |
unpack001/battleye.sys |
unpack001/drv64.dll |
unpack001/kdu.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
DwmExtendFrameIntoClientArea
GetModuleHandleA
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
CreateFileA
Process32Next
CloseHandle
CreateThread
Beep
GetProcAddress
GetCurrentProcessId
WideCharToMultiByte
FlushFileBuffers
GlobalAlloc
VirtualAlloc
GlobalLock
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
FreeLibrary
QueryPerformanceCounter
GetModuleFileNameA
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStdHandle
GetCurrentProcess
SetConsoleTitleA
VirtualFree
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetConsoleTextAttribute
GlobalFree
LoadCursorA
ScreenToClient
GetCapture
TrackMouseEvent
SetCapture
SetCursor
ReleaseCapture
SetWindowDisplayAffinity
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetWindowThreadProcessId
GetCursorPos
GetKeyState
GetWindow
DispatchMessageA
SetCursorPos
UpdateWindow
RegisterClassExA
FindWindowA
PostQuitMessage
UnregisterClassA
PeekMessageA
GetClientRect
TranslateMessage
GetWindowRect
DestroyWindow
SetWindowPos
ShowWindow
GetAsyncKeyState
SetWindowLongA
CreateWindowExA
GetWindowLongA
ClientToScreen
GetForegroundWindow
MoveWindow
DefWindowProcA
MessageBoxA
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
_Xtime_get_ticks
_Query_perf_frequency
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?_Xlength_error@std@@YAXPEBD@Z
_Mtx_destroy_in_situ
_Mtx_init_in_situ
_Thrd_sleep
_Query_perf_counter
ZwQueryValueKey
ZwClose
ZwSetValueKey
ZwOpenKey
ZwCreateKey
Direct3DCreate9Ex
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ImmAssociateContextEx
__CxxFrameHandler4
__current_exception_context
_CxxThrowException
memset
strstr
__current_exception
memmove
memcpy
memcmp
memchr
__std_exception_copy
__std_exception_destroy
__std_terminate
__C_specific_handler
_seh_filter_exe
_set_app_type
_cexit
_get_initial_narrow_environment
_initterm
_initterm_e
_exit
system
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_crt_atexit
_configure_narrow_argv
exit
_invalid_parameter_noinfo_noreturn
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
terminate
__stdio_common_vsprintf_s
__stdio_common_vfprintf
__p__commode
_set_fmode
__stdio_common_vsscanf
fread
__stdio_common_vsprintf
_wfopen
fwrite
__stdio_common_vsnprintf_s
__acrt_iob_func
fseek
fclose
fflush
ftell
strncpy
strncmp
wcscpy_s
strcmp
qsort
rand
rename
_set_new_mode
free
_callnewh
malloc
fmodf
tanf
sinf
floorf
cosf
sqrt
sqrtf
ceilf
asin
hypot
acosf
__setusermatherr
atof
_configthreadlocale
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RaiseException
EncodePointer
InterlockedFlushSList
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
ExitProcess
TerminateProcess
FreeLibrary
GetModuleHandleExW
GetProcAddress
GetModuleFileNameW
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlPcToFileHeader
NtCreateFile
NtDeviceIoControlFile
NtDelayExecution
RtlInitUnicodeString
NtQueryInformationProcess
RegisterForProvider
SB_SMS_GetCtrlCountEx
SB_SMS_QuickCommandEx
SB_SMS_ReadBlockEx
SB_SMS_ReadByteEx
SB_SMS_ReadWordEx
SB_SMS_WriteBlockEx
SB_SMS_WriteByteEx
SB_SMS_WriteWordEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\sam\Downloads\Shared-FlushFileBuffers-Communication-main\x64\Release\kernel.pdb
IoGetCurrentProcess
ObfDereferenceObject
KeAttachProcess
KeDetachProcess
PsLookupProcessByProcessId
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
MmCopyVirtualMemory
PsGetProcessSectionBaseAddress
ZwProtectVirtualMemory
MmHighestUserAddress
DbgPrintEx
ExAllocatePool
ExFreePoolWithTag
IofCompleteRequest
ZwClose
ZwOpenKey
ZwQueryValueKey
RtlRandomEx
ObReferenceObjectByName
IoDriverObjectType
RtlInitUnicodeString
RtlCompareUnicodeString
RtlGetVersion
MmUnmapIoSpace
MmMapIoSpaceEx
ZwSetValueKey
MmCopyMemory
PsGetProcessPeb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
gProvTable
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\LP\source\repos\KDU\Source\Hamakaze\output\x64\Release\kdu.pdb
GetProcAddress
FreeLibrary
LoadLibraryExW
VirtualFree
VirtualUnlock
VirtualLock
HeapCreate
HeapAlloc
HeapDestroy
GetStartupInfoW
WriteProcessMemory
ResumeThread
UnmapViewOfFile
DeleteFileW
CreateProcessW
GetModuleHandleW
TerminateProcess
Sleep
GetCurrentProcessId
TerminateThread
GetSystemDirectoryW
HeapSetInformation
SetDllDirectoryW
CreateEventW
GetProcessHeap
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetCommandLineW
GetStdHandle
GetModuleFileNameW
CreateFileW
GetSystemInfo
ReadProcessMemory
GetSystemTimeAsFileTime
CreateFileMappingW
MapViewOfFile
GetFirmwareEnvironmentVariableW
GetConsoleMode
WriteConsoleW
RtlCompareMemory
CloseHandle
WaitForSingleObject
SetLastError
GetLastError
GetCurrentProcess
CreateThread
VirtualAlloc
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
GetCommandLineA
GetModuleHandleExW
ExitProcess
WriteFile
RtlPcToFileHeader
RaiseException
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
LdrLockLoaderLock
RtlTimeToSecondsSince1970
LdrUnlockLoaderLock
NtWaitForSingleObject
NtSetValueKey
NtOpenSection
NtLoadDriver
NtSetInformationProcess
NtOpenFile
NtQueryObject
LdrFindEntryForAddress
NtFsControlFile
RtlLengthRequiredSid
NtUnloadDriver
RtlEqualUnicodeString
LdrGetProcedureAddress
RtlFreeAnsiString
NtSetSecurityObject
RtlDoesFileExists_U
NtCreateMutant
RtlGetVersion
LdrUnloadDll
NtAlpcDisconnectPort
RtlCreateSecurityDescriptor
RtlCreateAcl
NtAlpcAcceptConnectPort
RtlAddAccessAllowedAce
RtlLengthSid
NtReplyWaitReceivePort
RtlSetDaclSecurityDescriptor
RtlSubAuthoritySid
RtlInitializeSid
NtDeviceIoControlFile
NtTerminateProcess
NtDuplicateObject
NtOpenKey
NtMapViewOfSection
NtUnmapViewOfSection
LdrLoadDll
NtCreateSection
LdrAccessResource
RtlSetLastWin32Error
NtCreateFile
RtlNtStatusToDosError
RtlEqualSid
RtlInitString
RtlFreeHeap
NtQueryDirectoryObject
RtlFreeSid
RtlExpandEnvironmentStrings
NtOpenDirectoryObject
NtFlushBuffersFile
RtlUnicodeStringToAnsiString
NtClose
RtlImageNtHeader
NtQueryInformationToken
RtlAllocateAndInitializeSid
LdrFindResource_U
RtlDosPathNameToNtPathName_U
RtlInitUnicodeString
NtOpenProcess
RtlFreeUnicodeString
NtQueryInformationProcess
NtWriteFile
NtQuerySystemInformation
RtlAllocateHeap
NtOpenThread
NtFreeVirtualMemory
NtOpenProcessToken
RtlAnsiStringToUnicodeString
NtAdjustPrivilegesToken
NtAlpcCreatePort
UuidCreate
SetupDiCreateDeviceInfoList
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoW
SetupDiSetDeviceRegistryPropertyW
SetupDiCallClassInstaller
SetupDiGetINFClassW
SetupDiRemoveDevice
UpdateDriverForPlugAndPlayDevicesW
BCryptEncrypt
BCryptDestroyKey
BCryptOpenAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
DeltaFree
ApplyDeltaB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ