FactoryGameEGS-EventLoop.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9e953c6b3b80dbee87186bb9672468aa1710c8ff66f130d193aba28a31eb2ab0.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e953c6b3b80dbee87186bb9672468aa1710c8ff66f130d193aba28a31eb2ab0.dll
Resource
win10v2004-20240426-en
General
-
Target
9e953c6b3b80dbee87186bb9672468aa1710c8ff66f130d193aba28a31eb2ab0
-
Size
123KB
-
MD5
919a5c1919507c06c4912b9944e41af7
-
SHA1
1c5a8dc78316c3fd724f635897f0868338b58987
-
SHA256
9e953c6b3b80dbee87186bb9672468aa1710c8ff66f130d193aba28a31eb2ab0
-
SHA512
521feed6b737512edce2a29669d14b10e468e0ca64d275410237e2d62a2e50167d726e3ad7f016f15e16d7f906061d3157892bb06d21b10a786983d892b319fd
-
SSDEEP
3072:1sXt+D4RZkmlz0/VQ/mkjrAVO9caMFHt1BWg9RkkBz:1Ct+EVruRZUmR/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e953c6b3b80dbee87186bb9672468aa1710c8ff66f130d193aba28a31eb2ab0
Files
-
9e953c6b3b80dbee87186bb9672468aa1710c8ff66f130d193aba28a31eb2ab0.dll windows:6 windows x64 arch:x64
801b14816224061681019badfdf5fdf4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
factorygameegs-core
??0FName@@QEAA@PEB_WW4EFindName@@@Z
??0FLogCategoryBase@@QEAA@AEBVFName@@W4Type@ELogVerbosity@@1@Z
??1FLogCategoryBase@@QEAA@XZ
?GCoreObjectArrayForDebugVisualizers@@3PEAVFChunkedFixedUObjectArray@@EA
?GCoreComplexObjectPathDebug@@3PEAUFStoredObjectPathDebug@Private@CoreUObject@UE@@EA
?GCoreObjectHandlePackageDebug@@3PEAUFObjectHandlePackageDebugData@Private@CoreUObject@UE@@EA
?HandleAtomicsFailure@FWindowsPlatformAtomics@@KAXPEB_WZZ
?BeginNamedEvent@FWindowsPlatformMisc@@SAXAEBUFColor@@PEBD@Z
?EndNamedEvent@FWindowsPlatformMisc@@SAXXZ
?OutputBeginDynamicEventWithId@FCpuProfilerTrace@@SAXVFName@@PEB_WPEBDI@Z
?OutputEndEvent@FCpuProfilerTrace@@SAXXZ
?CheckVerifyFailedImpl@FDebug@@SA_NPEBD0HPEAXPEB_WZZ
?CheckVerifyImpl@@YA_NAEA_N_NPEBDHPEAX2PEB_WZZ
?Malloc@FMemory@@SAPEAX_KI@Z
?Realloc@FMemory@@SAPEAXPEAX_KI@Z
?Free@FMemory@@SAXPEAX@Z
?QuantizeSize@FMemory@@SA_K_KI@Z
?OnInvalidArrayNum@Private@Core@UE@@YAX_K@Z
?ResizeAllocation@ForAnyElementType@?$TSizedHeapAllocator@$0CA@UFMemory@@@@QEAAXHH_K@Z
?ResizeAllocation@ForAnyElementType@?$TSizedHeapAllocator@$0CA@UFMemory@@@@QEAAXHH_KI@Z
??0FString@@QEAA@PEB_W@Z
?PrintfImpl@FString@@CA?AV1@PEB_WZZ
?GetBlocks@FNameDebugVisualizer@@SAPEAPEAEXZ
?BasicLog@Private@Logging@UE@@YAXAEBUFLogCategoryBase@@PEBUFStaticBasicLogRecord@123@ZZ
?BasicFatalLog@Private@Logging@UE@@YAXAEBUFLogCategoryBase@@PEBUFStaticBasicLogRecord@123@ZZ
?SleepNoStats@FWindowsPlatformProcess@@SAXM@Z
??0FMemScope@@QEAA@W4ELLMTag@@_N@Z
??1FMemScope@@QEAA@XZ
?Init@FLLMScope@@IEAAXW4ELLMTag@@_NW4ELLMTagSet@@W4ELLMTracker@@1@Z
?Destruct@FLLMScope@@IEAAXXZ
?Get@FThreadStatsPool@@SAAEAU1@XZ
?GetFromPool@FThreadStatsPool@@QEAAPEAVFThreadStats@@XZ
?Flush@FThreadStats@@QEAAX_N0@Z
?FlushRawStats@FThreadStats@@QEAAX_N0@Z
?DoSetup@FThreadSafeStaticStatBase@@IEBAPEBUTStatIdData@@PEBDPEB_W001_N2W4Type@EStatDataType@@22W4EMemoryCounterRegion@FWindowsPlatformMemory@@@Z
?CpuChannel@@3AEAVFChannel@Trace@UE@@EA
?GCycleStatsShouldEmitNamedEvents@@3HA
?GShouldEmitVerboseNamedEvents@@3_NA
?bIsDisabled@FLowLevelMemTracker@@2_NA
?TlsSlot@FThreadStats@@0IA
?bPrimaryEnable@FThreadStats@@0_NA
?bPrimaryDisableForever@FThreadStats@@0_NA
?bIsRawStatsActive@FThreadStats@@0_NA
ws2_32
__WSAFDIsSet
select
kernel32
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
TlsGetValue
TerminateProcess
GetCurrentProcess
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSListHead
vcruntime140
_purecall
memcpy
memmove
__C_specific_handler
memset
__current_exception
__current_exception_context
__std_type_info_destroy_list
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_seh_filter_dll
terminate
_initterm_e
_initterm
_errno
_crt_at_quick_exit
_crt_atexit
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_cexit
strerror_s
_configure_narrow_argv
Exports
Exports
??0FIOManagerBSDSocketSelect@EventLoop@UE@@QEAA@AEAVIEventLoop@12@$$QEAUFParams@012@@Z
?GetIOAccess@FIOManagerBSDSocketSelect@EventLoop@UE@@QEAAAEAVFIOAccessBSDSocket@23@XZ
?Init@FIOManagerBSDSocketSelect@EventLoop@UE@@UEAA_NXZ
?Notify@FIOManagerBSDSocketSelect@EventLoop@UE@@UEAAXXZ
?Poll@FIOManagerBSDSocketSelect@EventLoop@UE@@UEAAXUFTimespan@@@Z
?Shutdown@FIOManagerBSDSocketSelect@EventLoop@UE@@UEAAXXZ
InitializeModule
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.uedbg Size: 512B - Virtual size: 247B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ