PUP.Gamehack.SE

Analysis Report

General information

Family Name: PUP.Gamehack.SE
Signature status: No Signature

Known Samples

MD5: df7e80730535fc3714f33d2be890c881
SHA1: 7c9fd85c956509c542c88fc6b632b9be4b7a14bd
SHA256: 5F761443BFD71A8B4830122DEFF4EFE630428FF44C25AECCF7A807FBB8C738F8
File Size: 958.98 KB, 958976 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name MARCELO TAKETA
File Description MARCELO TAKETA - BRAZIL
File Version 0. 0. 0. 0
Product Name TX510-TX515FN MARCELO TAKETA
Product Version 0. 0. 0. 0

File Traits

  • HighEntropy
  • x86

Block Information

Total Blocks: 317
Potentially Malicious Blocks: 14
Whitelisted Blocks: 301
Unknown Blocks: 2

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 0 x x 0 0 0 x 0 x x x 0 0 0 0 x x x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 ? ? 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\adjprog.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\apdadrv.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\strgene.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\strprn.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\a22640.bat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\a22640.bat Synchronize,Write Attributes
c:\users\user\downloads\null Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

cmd.exe /c C:\Users\Loruzgsq\AppData\Local\Temp\a22640.bat "c:\users\user\downloads\7c9fd85c956509c542c88fc6b632b9be4b7a14bd_0000958976"

Trending

Most Viewed

Loading...