C:\Users\Radar\Desktop\MW3_DMA final\x64\Release\KC.pdb
Static task
static1
Behavioral task
behavioral1
Sample
KC_[unknowncheats.me]_.exe
Resource
win10v2004-20240802-en
General
-
Target
KC_[unknowncheats.me]_.exe
-
Size
518KB
-
MD5
6eac97adc5aa0934ca86f39ab75e0a96
-
SHA1
d91b9b959a2d46df4349084ff523024dc05cdac1
-
SHA256
fa25cd8b887fb4b7362937c684daeeab1daa38a7c6234ecccbab210bd5f51ac6
-
SHA512
01338d3023fc27f7f54597ba76b35d4101956bdc26967094aaac170c649a7e3f39d516984c12beecb854b400d37930b138a1a12fa3d1f9bf615ada57e1445ec4
-
SSDEEP
12288:38XuSrJFtwBQkB1TeQSSFa/n2DgPuktwED:36Xm/0SFa/nA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource KC_[unknowncheats.me]_.exe
Files
-
KC_[unknowncheats.me]_.exe.exe windows:6 windows x64 arch:x64
9c5d100dd1002de572188b14e837388f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
vmm
VMMDLL_Scatter_Clear
VMMDLL_Scatter_CloseHandle
VMMDLL_Scatter_ExecuteRead
VMMDLL_Scatter_PrepareEx
VMMDLL_PidGetFromName
VMMDLL_Scatter_Initialize
VMMDLL_MemReadEx
VMMDLL_Initialize
VMMDLL_ProcessGetModuleBaseW
VMMDLL_ProcessGetInformation
kernel32
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
FreeLibrary
GetProcAddress
LoadLibraryA
Beep
GetConsoleWindow
RtlLookupFunctionEntry
RtlCaptureContext
IsProcessorFeaturePresent
GetModuleHandleW
Sleep
IsDebuggerPresent
GetCurrentProcessId
GetCurrentThreadId
TerminateProcess
GetSystemTimeAsFileTime
InitializeSListHead
user32
LoadIconA
UpdateWindow
GetSystemMetrics
GetAsyncKeyState
ShowWindow
DestroyWindow
CreateWindowExA
RegisterClassExA
UnregisterClassA
PostQuitMessage
DefWindowProcA
PeekMessageA
DispatchMessageA
TranslateMessage
LoadCursorA
ScreenToClient
ClientToScreen
GetCursorPos
SetCursor
SetCursorPos
GetClientRect
MessageBoxA
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EmptyClipboard
GetActiveWindow
GetKeyState
ReleaseCapture
GetCapture
SetCapture
msvcp140
?width@ios_base@std@@QEBA_JXZ
?width@ios_base@std@@QEAA_J_J@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
_Query_perf_counter
_Query_perf_frequency
_Thrd_join
_Thrd_id
_Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_unlock
_Cnd_do_broadcast_at_thread_exit
?_Throw_Cpp_error@std@@YAXH@Z
?_Xlength_error@std@@YAXPEBD@Z
?setf@ios_base@std@@QEAAHHH@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exceptions@std@@YAHXZ
?good@ios_base@std@@QEBA_NXZ
?flags@ios_base@std@@QEBAHXZ
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
d3d9
Direct3DCreate9Ex
vcruntime140
__std_terminate
memcpy
memset
strstr
memchr
memmove
__current_exception_context
__current_exception
__C_specific_handler
_CxxThrowException
__std_exception_destroy
__std_exception_copy
memcmp
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-heap-l1-1-0
malloc
free
_set_new_mode
_callnewh
api-ms-win-crt-string-l1-1-0
strcmp
strncpy
api-ms-win-crt-stdio-l1-1-0
fclose
_set_fmode
fread
__acrt_iob_func
__p__commode
fseek
ftell
fflush
fwrite
__stdio_common_vsprintf
_wfopen
__stdio_common_vsscanf
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-math-l1-1-0
acosf
ceilf
atan2f
log
logf
sqrtf
pow
powf
fmodf
sinf
cosf
__setusermatherr
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_register_onexit_function
_c_exit
_initialize_onexit_table
__p___argv
_beginthreadex
__p___argc
_crt_atexit
_cexit
_configure_narrow_argv
_seh_filter_exe
_set_app_type
_get_initial_narrow_environment
terminate
_initterm
_initterm_e
_initialize_narrow_environment
_invalid_parameter_noinfo_noreturn
exit
_exit
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 157KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ