C:\Users\Steven\Desktop\Unturned\Unturned 3.23.14.x\x64\Release\Unturned 3.23.14.x.pdb
Static task
static1
General
-
Target
Unturned 3.23.14.x.exe
-
Size
134KB
-
MD5
7ac0b8e282bdee537c65bbb192816e16
-
SHA1
36f66db6ab0bdb9ae41699685164bf2efd0d18c8
-
SHA256
42b8d94c3dc19f019e3e8c4b5665eb43cc2f52689cbaf4c73a4ac60d8b973d0f
-
SHA512
c9b93b2d0bb2b44a5625472454c665478f8588dea18931c84d43fd73444b3df86bd53935640ac4d905f4e24b2f52f97a0bf248c35042d83dc6713669523b4786
-
SSDEEP
3072:mwUfuBGxKUa0HqV6VEb4ZNXyLhnsBmZRJJ7G8b:mjPxUCEGMLhMCJJ7G8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Unturned 3.23.14.x.exe
Files
-
Unturned 3.23.14.x.exe.exe windows:6 windows x64 arch:x64
d8e29c4b2a83bcc4ab14e7b344f6d17f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
GetCurrentProcess
CreateMutexA
WaitForSingleObject
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
TerminateThread
Process32FirstW
CloseHandle
LoadLibraryA
GetSystemTime
lstrcmpW
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
CreateThread
GetModuleHandleA
InitializeSListHead
RtlCaptureContext
user32
GetSystemMetrics
SetWindowPos
DefWindowProcW
GetMessageA
DestroyWindow
SetForegroundWindow
RegisterClassExA
SetWindowLongW
ShowWindow
SetWindowLongA
SetWindowsHookExA
GetForegroundWindow
SetCursor
SendMessageA
LoadCursorW
SetLayeredWindowAttributes
CallNextHookEx
CreateWindowExA
UnhookWindowsHookEx
msvcp140
?_Xout_of_range@std@@YAXPEBD@Z
??Bid@locale@std@@QEAA_KXZ
?_Incref@facet@locale@std@@UEAAXXZ
?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z
?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z
?_Xlength_error@std@@YAXPEBD@Z
??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z
??1?$codecvt@_SDU_Mbstatet@@@std@@MEAA@XZ
??0?$codecvt@_SDU_Mbstatet@@@std@@QEAA@_K@Z
?in@?$codecvt@_SDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_S3AEAPEA_S@Z
?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z
?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ
msvcp140_codecvt_ids
?id@?$codecvt@_SDU_Mbstatet@@@std@@2V0locale@2@A
dwmapi
DwmExtendFrameIntoClientArea
d2d1
ord1
dwrite
DWriteCreateFactory
vcruntime140_1
__CxxFrameHandler4
vcruntime140
_CxxThrowException
__C_specific_handler
__current_exception
__std_exception_copy
__std_exception_destroy
__std_terminate
memcmp
memcpy
memmove
memset
__current_exception_context
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
__stdio_common_vfprintf
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vsnwprintf_s
__stdio_common_vsprintf_s
api-ms-win-crt-heap-l1-1-0
_callnewh
free
_set_new_mode
malloc
api-ms-win-crt-utility-l1-1-0
rand
srand
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_exit
_initterm
_get_wide_winmain_command_line
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_initialize_wide_environment
_configure_wide_argv
_invalid_parameter_noinfo_noreturn
_set_app_type
_seh_filter_exe
_initterm_e
_cexit
_crt_atexit
_c_exit
terminate
exit
api-ms-win-crt-math-l1-1-0
cosf
atan2f
fmodf
powf
__setusermatherr
sinf
sqrtf
asinf
tanf
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-string-l1-1-0
strcmp
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ