D:\builds\build-amxmodx\win32-1.8\OUTPUT\modules\fakemeta\fakemeta_amxx\fakemeta_amxx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fakemeta_amxx.dll
Resource
win10v2004-20240709-es
General
-
Target
fakemeta_amxx.dll
-
Size
305KB
-
MD5
52c18f32a8044d8cbfc0da6b2d9e00db
-
SHA1
45803737ef478fafb8a73c95d4c48ba1b3f07a8e
-
SHA256
8672b572f9f188257b0b5471ed81fcb4ab856397b343162b8a0c6b6852eaf320
-
SHA512
a9c78eda4bd12720da6fe9c1d9a9882fd6aa7fd45a4089f1e5e704f68b5828ea03f3ee0281ab33abc9e546499ede7d3062cb1ffc9146f7ce38cad030c4cd24d6
-
SSDEEP
6144:7KISILuwBTZUECGJSYx9BPc34Zy65bE7otaTn6/:uISIBZUECGJSYx9BPA4Zy65bE7TU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fakemeta_amxx.dll
Files
-
fakemeta_amxx.dll.dll windows:5 windows x86 arch:x86
51c70b82196086c5d806147858f0d7af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
VirtualQuery
GetModuleFileNameA
FreeLibrary
GetLastError
FormatMessageA
LoadLibraryA
IsBadReadPtr
IsBadWritePtr
EncodePointer
DecodePointer
RtlUnwind
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
IsProcessorFeaturePresent
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
RaiseException
SetLastError
GetProcessHeap
GetStdHandle
WriteFile
GetModuleFileNameW
DeleteCriticalSection
GetFileType
GetStartupInfoW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryExW
HeapReAlloc
OutputDebugStringW
FlushFileBuffers
GetStringTypeW
LCMapStringW
ReadFile
ReadConsoleW
SetStdHandle
WriteConsoleW
CloseHandle
CreateFileW
Exports
Exports
?CallMonsterThink@CBaseMonster@@QAEXXZ
?SUB_CallUseToggle@CBaseEntity@@QAEXXZ
AMXX_Attach
AMXX_CheckGame
AMXX_Detach
AMXX_PluginsLoaded
AMXX_PluginsUnloaded
AMXX_PluginsUnloading
AMXX_Query
GetEngineFunctions
GetEngineFunctions_Post
GetEntityAPI2
GetEntityAPI2_Post
GetNewDLLFunctions
GetNewDLLFunctions_Post
GiveFnptrsToDll
Meta_Attach
Meta_Detach
Meta_Query
_GiveFnptrsToDll@8
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ