C:\Users\幸吴炜\Documents\Visual Studio 2015\Projects\MyDllInject\x64\Release\GDCheater64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
GDCheater64.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GDCheater64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
GDCheater_V1.7_beta.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
GDCheater_V1.7_beta.exe
Resource
win10v2004-20240226-en
General
-
Target
3dae763564c5f021627487468fcaa1bf13e45e4d3ae73014b065dde87eb72ed9
-
Size
270KB
-
MD5
ae6ca8003cb3320ef2cc1e4a4cd11c90
-
SHA1
4b52e6ae8bf18e98791333797634774c5c458b51
-
SHA256
3dae763564c5f021627487468fcaa1bf13e45e4d3ae73014b065dde87eb72ed9
-
SHA512
af98654d4d578fa26f97ff32a9a5bf2a35fcd7dd2b11314c022652b9958a80e9351414f7c9f7c704057b84c350580ae5388ab6b06b08357bb8ffe4421b796803
-
SSDEEP
3072:QqyWrdxPT6KfUxlGx7yApIzCU7zqkb7rq5bMAFmSu7QlDCQYaqj4Cim8VHBAku45:dxxWK8POpI29kb7olk0DCpj+2yGzr+
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/GDCheater64.dll unpack001/GDCheater_V1.7_beta.exe
Files
-
3dae763564c5f021627487468fcaa1bf13e45e4d3ae73014b065dde87eb72ed9.rar
-
GDCheater64.dll.dll windows:6 windows x64 arch:x64
d0393ed70202629b40b5ce82995f0c6b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
WideCharToMultiByte
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsDebuggerPresent
UnmapViewOfFile
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
MapViewOfFile
OpenFileMappingW
VirtualProtect
CreateThread
GetFileInformationByHandleEx
GetLastError
CloseHandle
ReadFile
CreateFileW
GetProcAddress
GetModuleHandleA
VirtualQuery
IsProcessorFeaturePresent
InitializeSListHead
user32
DefWindowProcW
LoadCursorW
ClientToScreen
SetCursor
SetCursorPos
GetClientRect
CallWindowProcA
RegisterClassExA
CreateWindowExA
GetWindowRect
GetKeyState
TrackMouseEvent
EmptyClipboard
GetClipboardData
SetClipboardData
CloseClipboard
GetForegroundWindow
OpenClipboard
GetCapture
SetWindowLongPtrW
GetWindowLongPtrW
ScreenToClient
GetCursorPos
SetCapture
ReleaseCapture
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcp140
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
??Bid@locale@std@@QEAA_KXZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?always_noconv@codecvt_base@std@@QEBA_NXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@M@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
d3dcompiler_47
D3DCompile
d3d11
D3D11CreateDeviceAndSwapChain
dinput8
DirectInput8Create
imm32
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmAssociateContextEx
vcruntime140
__current_exception
__C_specific_handler
strstr
memmove
__current_exception_context
__std_type_info_destroy_list
memchr
_CxxThrowException
__std_exception_destroy
__std_exception_copy
__std_terminate
memset
memcpy
memcmp
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_invalid_parameter_noinfo_noreturn
_cexit
_initterm_e
_crt_atexit
_execute_onexit_table
terminate
_initialize_onexit_table
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initterm
api-ms-win-crt-stdio-l1-1-0
fflush
fclose
_get_stream_buffer_pointers
fseek
__stdio_common_vsprintf
ftell
_wfopen
fgetpos
fputc
fread
fsetpos
__stdio_common_vsscanf
_fseeki64
fwrite
setvbuf
__stdio_common_vsprintf_s
ungetc
fgetc
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
api-ms-win-crt-convert-l1-1-0
atoi
atof
api-ms-win-crt-string-l1-1-0
strcmp
strnlen
strncpy
wcscpy_s
wcscat_s
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-math-l1-1-0
cosf
pow
logf
log
fmodf
sqrtf
ceilf
acosf
powf
sinf
Exports
Exports
?ReflectiveLoader@@YA_KPEAX@Z
Sections
.text Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 706KB - Virtual size: 711KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
GDCheater_TeleportList.txt
-
GDCheater_V1.7_beta.exe.exe windows:6 windows x64 arch:x64
887c5d9e052ce91817dc479ac8751ec0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\幸吴炜\Documents\Visual Studio 2015\Projects\MyDllInject\x64\Release\GDCheater_V1.7_beta.pdb
Imports
kernel32
ReadFile
HeapFree
GetCurrentProcess
WaitForSingleObject
CreateFileW
UnmapViewOfFile
OpenProcess
Sleep
CloseHandle
HeapAlloc
GetCurrentDirectoryW
VirtualAllocEx
VerSetConditionMask
GetProcessHeap
GetModuleHandleW
VerifyVersionInfoW
CreateFileMappingW
MapViewOfFile
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlCaptureContext
TerminateProcess
GetProcAddress
GetModuleHandleA
GetFileSize
WriteProcessMemory
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
user32
FindWindowA
MessageBoxA
SwitchToThisWindow
GetWindowThreadProcessId
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
vcruntime140
memcpy
__current_exception
__current_exception_context
__C_specific_handler
strstr
memset
api-ms-win-crt-string-l1-1-0
wcscpy_s
wcscat_s
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_crt_atexit
terminate
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_initialize_onexit_table
_set_app_type
_configure_narrow_argv
_cexit
_c_exit
_exit
exit
_initterm_e
_initterm
_get_narrow_winmain_command_line
_initialize_narrow_environment
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
logo.dds
-
使用说明.txt