C:\f\save\bin\client\master\five\release\dbg\FiveM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
FiveM.exe.00_004f3400.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
FiveM.exe.00_004f3400.exe
Resource
win11-20240802-en
General
-
Target
FiveM.exe.00_004f3400.exe
-
Size
5.0MB
-
MD5
f695e7cd3d0b4247218afec81d0cb46a
-
SHA1
b23cfb60f98f8d29964397c49c0a0e0cda7deb28
-
SHA256
8bce893661094a9e39de3776da3dd276b873875c0d7fc668dc8b0aa351b6ad18
-
SHA512
55073d9eaa9b795d4dd16972201bca0e394fac0efdf5817cda0cc17119fb0ce54c263ec96c144a4d2a7c8ffd301464422b374a2f622abb0dd2ec5ef6e2c7917a
-
SSDEEP
49152:eOjPWFWnM4r0BEjYoVKs0B6N58NaUjwg1mxE9tOjhhVmaeI84dhAzBM04arJYLax:RMKk0N5f/rQcc9YL4P1G/Lzg5ji1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource FiveM.exe.00_004f3400.exe
Files
-
FiveM.exe.00_004f3400.exe.exe windows:6 windows x64 arch:x64
a1dcb540897e1c783a91e1b60d1eb4ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
ord344
InitCommonControlsEx
ord345
crypt32
CertFreeCertificateContext
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertOpenSystemStoreW
CryptUnprotectData
CertEnumCertificatesInStore
CertCloseStore
CertGetEnhancedKeyUsage
kernel32
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
CreateMutexW
OpenMutexW
CreateThread
GetCurrentThread
GetCurrentThreadId
GetSystemTime
GetTickCount64
SystemTimeToFileTime
GetPrivateProfileIntW
VirtualQuery
OpenFileMappingW
OpenProcess
K32GetProcessImageFileNameW
WriteFile
FormatMessageW
VerSetConditionMask
OpenThread
ResumeThread
VerifyVersionInfoW
LoadLibraryA
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
GetPrivateProfileStringW
WritePrivateProfileStringW
GetFullPathNameW
SetFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEvent
WaitForSingleObject
CreateEventW
GetExitCodeProcess
GetSystemDirectoryW
IsProcessInJob
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
SetDllDirectoryW
GetFileAttributesExW
CreateDirectoryW
CreateRemoteThread
GetExitCodeThread
GetProcessId
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
QueryFullProcessImageNameW
K32EnumProcessModules
K32GetModuleFileNameExW
K32GetModuleInformation
ReadFile
GetOverlappedResult
EncodePointer
DecodePointer
ReleaseSRWLockShared
AcquireSRWLockShared
InitOnceExecuteOnce
FreeLibrary
LoadResource
LockResource
SizeofResource
FindResourceW
MulDiv
VirtualProtect
IsDebuggerPresent
GetCurrentProcess
TerminateProcess
GetModuleHandleW
GetProcAddress
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
SetEndOfFile
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
OutputDebugStringW
HeapReAlloc
HeapAlloc
HeapFree
GetConsoleOutputCP
SetFilePointerEx
SetConsoleCtrlHandler
SetStdHandle
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetDriveTypeW
FreeLibraryAndExitThread
GetStartupInfoW
ExitProcess
GetCurrentProcessId
WaitForMultipleObjects
MultiByteToWideChar
MoveFileW
CopyFileW
LocalFree
GetModuleFileNameW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateProcessW
Sleep
ExitThread
RtlUnwind
LoadLibraryExW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryExA
GetSystemInfo
RaiseException
IsProcessorFeaturePresent
GetLastError
CloseHandle
GetFileAttributesW
DeleteFileW
CreateFileW
GetCommandLineW
LoadLibraryW
UnhandledExceptionFilter
InitializeSListHead
WriteConsoleW
OutputDebugStringA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableCS
GetTickCount
GetVersion
GlobalMemoryStatus
QueryPerformanceCounter
WideCharToMultiByte
SetFilePointer
FormatMessageA
CreateEventA
WaitForSingleObjectEx
FoldStringW
LCMapStringW
CompareStringW
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
GetCurrencyFormatW
GetLocaleInfoA
EnumSystemLocalesA
IsValidCodePage
IsDBCSLeadByteEx
DuplicateHandle
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
ResetEvent
SetUnhandledExceptionFilter
ReleaseSemaphore
CreateSemaphoreW
VirtualQueryEx
GetProcessTimes
UnregisterWaitEx
UnregisterWait
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
ReleaseMutex
RegisterWaitForSingleObject
GetStdHandle
GetFileType
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionEx
SleepEx
QueryPerformanceFrequency
CompareFileTime
GetEnvironmentVariableA
MoveFileExW
GetModuleHandleA
GetStringTypeW
GetLocaleInfoEx
FindFirstFileExW
GetFileInformationByHandle
SetFileInformationByHandle
AreFileApisANSI
GetFileInformationByHandleEx
InitializeSRWLock
TryAcquireSRWLockExclusive
LCMapStringEx
CompareStringEx
GetCPInfo
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
user32
LoadIconW
LoadCursorW
FindWindowExW
GetDesktopWindow
SetWindowLongW
GetWindowLongW
GetSysColorBrush
MonitorFromPoint
SetWindowTextW
EndPaint
BeginPaint
ReleaseDC
GetDC
AllowSetForegroundWindow
SetTimer
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
DefWindowProcW
RegisterWindowMessageW
SendMessageW
GetProcessWindowStation
GetUserObjectInformationW
MsgWaitForMultipleObjects
PeekMessageW
DispatchMessageW
TranslateMessage
MessageBoxW
GetSysColor
gdi32
GetDeviceCaps
CreateFontIndirectW
SetBkMode
SetTextColor
advapi32
RegSetKeyValueW
RegOpenKeyW
RegEnumValueW
RegGetValueW
RegDeleteKeyW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
OpenProcessToken
GetTokenInformation
RegCloseKey
RegDeleteValueW
shell32
SHBindToParent
SetCurrentProcessExplicitAppUserModelID
SHSetLocalizedName
ord709
SHGetKnownFolderPath
SHCreateItemFromParsingName
ShellExecuteExW
ShellExecuteW
CommandLineToArgvW
SHParseDisplayName
ntdll
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
NtQueryInformationProcess
oleaut32
SysFreeString
SysAllocString
GetErrorInfo
SetErrorInfo
SysStringLen
Exports
Exports
AmdPowerXpressRequestHighPerformance
AsyncTrace
BeforeTerminateHandler
DllGetActivationFactory
EarlyInitializeExceptionHandler
GetErrorData
InitializeExceptionHandler
NvOptimusEnablement
RemoteExceptionFunc
TerminateForException
TryCollectCrashLog
free
malloc
realloc
Sections
.text Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 147KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 331KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ