C:\Users\ajayd\OneDrive\Desktop\injector\projects\malware\x64\Release\fatal_cheats_free_version_dev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fatal_cheats_free_version_dev (1).exe
Resource
win11-20240802-en
General
-
Target
fatal_cheats_free_version_dev (1).exe
-
Size
147KB
-
MD5
0f32aea259d9e1de5c0b21bea6798102
-
SHA1
14d6e24b58693fee738f4b8eda8bc4bb266fd66e
-
SHA256
3175c6d6986d2aba880e975c279e1cbc15be60fb289c33a9eea579f288c8dd99
-
SHA512
2cbfef5da94972203755e18d4ddc2ee3a6a639ea6d5f0e21ace6f9e57a3085e947d73691f861f4156fc565775e70be1f704d3f99765063845e02ce6ef31ed382
-
SSDEEP
3072:y+g4BCQwdKqO8D0fnvfssoqG8EaaFOJh6N4oshMnnfKbEj:y6CB6Y0fnvfxlUFO25f6E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fatal_cheats_free_version_dev (1).exe
Files
-
fatal_cheats_free_version_dev (1).exe.exe windows:6 windows x64 arch:x64
f105f969499c1fbd04cb776f16dbdfe8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WriteConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
GetModuleHandleW
DeleteCriticalSection
DecodePointer
GetLastError
Sleep
InitializeCriticalSectionEx
GetFileAttributesW
GetModuleFileNameW
ExpandEnvironmentStringsW
GetCurrentProcess
HeapSize
SetPriorityClass
LCMapStringW
VirtualProtect
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapAlloc
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
CloseHandle
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThreadId
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
EncodePointer
WakeAllConditionVariable
GetStringTypeW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
SetFilePointerEx
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapFree
user32
ReleaseDC
SetWindowsHookExW
BlockInput
GetDC
CallNextHookEx
GetSystemMetrics
gdi32
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
CreateBitmap
BitBlt
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
winmm
PlaySoundW
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fptable Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ