D:\desktop\simplicity cheats free version\build\build.pdb
Static task
static1
Behavioral task
behavioral1
Sample
build.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
build.dll
Resource
win10v2004-20240412-en
General
-
Target
build.dll
-
Size
2.7MB
-
MD5
bc436b9f657ddbe5c28f8aa12bc7156b
-
SHA1
592c9143b672a7a9d503298735c33292f1894dff
-
SHA256
616785444ce882d4c7e0ee46aef5c0e8155e3727e9fb7d21bb16e6f5cbd4ff10
-
SHA512
e11f55261ee00a3b4083162d1bba0d850ab01368907c6ea79c7fbcb76ea362772283bf3a19f5a25fafc8f1d88ee9f93267916c8e55136e6020721d56ce3a43c5
-
SSDEEP
49152:TkFPE3r4DtM7DUcIUmLr0B8sX+rrLlXaedkQO8PT7n:gFPKIRrJrrcedW87
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource build.dll
Files
-
build.dll.dll windows:6 windows x64 arch:x64
a1e5e65ea3fc329e31cd77c31ededad2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
EnumWindows
GetAsyncKeyState
GetSystemMetrics
SetWindowLongPtrW
MessageBoxW
CallWindowProcW
GetWindowThreadProcessId
SetClipboardData
GetClipboardData
LoadCursorW
EmptyClipboard
CloseClipboard
OpenClipboard
GetKeyState
ScreenToClient
GetCapture
ClientToScreen
TrackMouseEvent
GetForegroundWindow
GetCursorPos
SetCapture
SetCursor
GetClientRect
IsWindowUnicode
ReleaseCapture
SetCursorPos
d3d11
D3D11CreateDeviceAndSwapChain
kernel32
GetExitCodeProcess
WaitForSingleObject
DeleteFileW
GetConsoleOutputCP
WriteFile
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStdHandle
ReadConsoleW
GetConsoleMode
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
FileTimeToSystemTime
SizeofResource
GetVolumeInformationW
FindFirstFileA
HeapFree
FindNextFileA
InitializeCriticalSectionEx
FindClose
GetModuleHandleA
HeapSize
MultiByteToWideChar
Sleep
GetLastError
GetCurrentThread
LockResource
QueryPerformanceFrequency
HeapReAlloc
RaiseException
CreateThread
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
VirtualProtectEx
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
WideCharToMultiByte
CreateDirectoryA
QueryPerformanceCounter
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
FreeLibrary
VirtualFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapCreate
VirtualProtect
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
CloseHandle
GetThreadContext
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
SetLastError
LoadLibraryExW
CreateFileA
GetFileSizeEx
ReadFile
MapViewOfFile
UnmapViewOfFile
GetOEMCP
CreateProcessW
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
LocalFree
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
WriteConsoleW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
GetFileInformationByHandleEx
EncodePointer
LCMapStringEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetStringTypeW
GetCPInfo
OutputDebugStringW
SystemTimeToTzSpecificLocalTime
GetCommandLineA
GetCommandLineW
PeekNamedPipe
GetFileType
GetDriveTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetStdHandle
GetTimeZoneInformation
IsValidCodePage
EnterCriticalSection
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
CreateFileMappingA
FindFirstFileW
RtlUnwind
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwindEx
advapi32
GetUserNameA
winmm
PlaySoundA
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetContext
d3dcompiler_43
D3DCompile
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ