E:\rev\fucked panel by hacker\examples\example_win32_directx11\Release\Xbest X!tre External.pdb
Static task
static1
Behavioral task
behavioral1
Sample
PAID AIMBOT PC PANNEL.exe.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
PAID AIMBOT PC PANNEL.exe.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PAID AIMBOT PC PANNEL.exe.zip
Resource
win11-20241007-en
General
-
Target
PAID AIMBOT PC PANNEL.exe.zip
-
Size
631KB
-
MD5
0ccf0dd08e7ceca2a9ba77c0e61fbe87
-
SHA1
bce3f16b9fc73860e566e2b5d459ec12944b927e
-
SHA256
2edbe4c79247e2a723d676007129c4d6562408aba33b3d615bbb2bcf05843049
-
SHA512
5c90762b1c80f86627ab52035e7818405232767ca7f22d9a7ab5ea899b00388536c44f3a463cb44273af84d71cf7faf7275a164c9b6a45e8a528599dc0dada26
-
SSDEEP
12288:yppiYSDUHZL7bYIMhBxqIVTao2iJGg6c8sUpcVmwG+5imRVCGMdwssFMvjIVq7B:1YSy/bYIuBfB8MGfsUpcVpRimRXFTeIy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/PAID AIMBOT PC PANNEL.exe
Files
-
PAID AIMBOT PC PANNEL.exe.zip.zip
-
PAID AIMBOT PC PANNEL.exe.exe windows:6 windows x64 arch:x64
747ca9b5a6d6b22ae4ad616cf7ff38fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_43
D3DCompile
ole32
CoCreateInstance
CoUninitialize
CoInitialize
kernel32
SetFileInformationByHandle
GetFileInformationByHandleEx
ReleaseSRWLockExclusive
GetFileAttributesExW
AcquireSRWLockExclusive
SleepConditionVariableSRW
GetCurrentThreadId
FindFirstFileW
WakeAllConditionVariable
UnhandledExceptionFilter
FindClose
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
CheckRemoteDebuggerPresent
VirtualQueryEx
IsDebuggerPresent
AllocConsole
GetTickCount
VirtualFreeEx
CreateRemoteThread
WinExec
ReadProcessMemory
VirtualAllocEx
Beep
GetThreadContext
VirtualProtectEx
CreateThread
GetSystemInfo
CloseHandle
Process32Next
GetCurrentThread
GetLastError
GetLocaleInfoEx
GetFileSizeEx
CreateFileA
WaitForMultipleObjects
PeekNamedPipe
ReadFile
GetFileType
GetStdHandle
GetEnvironmentVariableA
WaitForSingleObjectEx
MoveFileExA
VerifyVersionInfoA
GetSystemDirectoryA
SleepEx
LeaveCriticalSection
EnterCriticalSection
LocalFree
FormatMessageA
SetLastError
QueryFullProcessImageNameW
GetModuleHandleW
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
VirtualProtect
DeleteCriticalSection
InitializeCriticalSectionEx
Sleep
CreateToolhelp32Snapshot
OpenProcess
ReleaseMutex
WaitForSingleObject
CreateMutexA
TerminateProcess
VirtualAlloc
OutputDebugStringA
GetCurrentProcess
WriteProcessMemory
Process32First
QueryPerformanceCounter
FreeLibrary
VerSetConditionMask
GetProcAddress
CreateFileW
QueryPerformanceFrequency
LoadLibraryA
GetModuleHandleA
GlobalUnlock
WideCharToMultiByte
GetProcessHeap
GlobalLock
GlobalFree
GlobalAlloc
MultiByteToWideChar
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
OutputDebugStringW
AreFileApisANSI
user32
IsWindowUnicode
GetClientRect
SetCursor
SetCapture
ReleaseCapture
TrackMouseEvent
ClientToScreen
CloseClipboard
EmptyClipboard
GetClipboardData
SetCursorPos
GetCapture
OpenClipboard
GetCursorPos
LoadCursorA
DispatchMessageA
SetClipboardData
GetForegroundWindow
GetKeyState
UpdateWindow
ScreenToClient
FindWindowA
PostQuitMessage
PeekMessageA
LoadIconA
TranslateMessage
SetLayeredWindowAttributes
DefWindowProcA
MoveWindow
MessageBoxA
SetWindowDisplayAffinity
GetWindowLongA
SetWindowLongA
GetAsyncKeyState
ShowWindow
GetActiveWindow
RegisterClassExW
GetWindowRect
DestroyWindow
SetWindowRgn
CreateWindowExW
GetSystemMetrics
UnregisterClassW
gdi32
CreateRoundRectRgn
advapi32
CryptGetHashParam
CryptGenRandom
GetLengthSid
GetTokenInformation
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
InitializeAcl
IsValidSid
SetSecurityInfo
CryptReleaseContext
CryptAcquireContextA
ConvertSidToStringSidA
CopySid
OpenProcessToken
AddAccessAllowedAce
shell32
ShellExecuteA
msvcp140
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Xlength_error@std@@YAXPEBD@Z
_Query_perf_frequency
?_Throw_Cpp_error@std@@YAXH@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?_Xout_of_range@std@@YAXPEBD@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Winerror_map@std@@YAHH@Z
?_Syserror_map@std@@YAPEBDH@Z
_Cnd_do_broadcast_at_thread_exit
_Query_perf_counter
_Thrd_detach
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?_Xbad_function_call@std@@YAXXZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?good@ios_base@std@@QEBA_NXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@J@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
imm32
ImmSetCandidateWindow
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
dwmapi
DwmExtendFrameIntoClientArea
ntdll
NtRaiseHardError
RtlVirtualUnwind
RtlAdjustPrivilege
RtlCaptureContext
RtlLookupFunctionEntry
urlmon
URLDownloadToFileA
winmm
sndPlaySoundA
shlwapi
PathFileExistsA
normaliz
IdnToAscii
wldap32
ord46
ord211
ord60
ord45
ord50
ord217
ord143
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord41
ord301
crypt32
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertFindCertificateInStore
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertCreateCertificateChainEngine
ws2_32
WSACleanup
closesocket
recv
send
WSAGetLastError
bind
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
socket
WSASetLastError
WSAIoctl
WSAStartup
getaddrinfo
accept
htonl
ntohl
gethostname
sendto
recvfrom
freeaddrinfo
listen
select
__WSAFDIsSet
ioctlsocket
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception_context
__current_exception
strrchr
memset
memmove
memcpy
memchr
strchr
strstr
__std_terminate
__std_exception_copy
__std_exception_destroy
__C_specific_handler
memcmp
_CxxThrowException
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
_set_fmode
_lseeki64
fread
fclose
__stdio_common_vsscanf
__p__commode
feof
fflush
fputs
fopen
_wfopen
__acrt_iob_func
_read
_write
_close
_open
_popen
_pclose
fgets
__stdio_common_vfprintf
ftell
fseek
fputc
fwrite
api-ms-win-crt-utility-l1-1-0
rand
qsort
api-ms-win-crt-string-l1-1-0
_stricmp
_strdup
strncmp
strncpy
tolower
strpbrk
strcmp
strcspn
strspn
isupper
api-ms-win-crt-heap-l1-1-0
_callnewh
free
realloc
calloc
malloc
_msize
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_beginthreadex
terminate
__sys_nerr
_errno
strerror
exit
_invalid_parameter_noinfo
_resetstkoflw
_invalid_parameter_noinfo_noreturn
_wassert
_register_thread_local_exe_atexit_callback
_c_exit
_getpid
_exit
_initterm_e
_initterm
_get_narrow_winmain_command_line
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
abort
system
api-ms-win-crt-convert-l1-1-0
atoi
strtoull
strtoll
strtol
strtod
strtoul
api-ms-win-crt-multibyte-l1-1-0
_mbsicmp
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
___lc_codepage_func
localeconv
api-ms-win-crt-math-l1-1-0
_dclass
sqrtf
acosf
ceilf
cosf
fmodf
powf
sinf
__setusermatherr
api-ms-win-crt-time-l1-1-0
_gmtime64
_time64
api-ms-win-crt-filesystem-l1-1-0
_stat64
_access
_fstat64
_unlink
Sections
.text Size: 725KB - Virtual size: 724KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 183KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 311KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ