PUP.MSIL.Gamehack.BB

Analysis Report

General information

Family Name: PUP.MSIL.Gamehack.BB
Signature status: No Signature

Known Samples

MD5: d7575dbcd004fedcb7edf55adf212e8c
SHA1: 505d541b5df6324e1d46e93ebf7b63cd36f897b4
SHA256: 6293578FF60F6EF881151FF6801B6970AA40005F9C9F9CE68DF55AED3B69AA5D
File Size: 51.71 KB, 51712 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description DMOLauncher
File Version 1.0.0.0
Internal Name DMOLauncher.exe
Legal Copyright Copyright © 2022
Original Filename DMOLauncher.exe
Product Name DMOLauncher
Product Version 1.0.0.0

File Traits

  • .NET
  • ntdll
  • VirtualQueryEx
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 78
Potentially Malicious Blocks: 29
Whitelisted Blocks: 9
Unknown Blocks: 40

Visual Map

? ? x ? ? 0 x 0 0 x ? x x x ? x ? x ? ? ? x x 0 x x x x 0 x ? x ? ? x x x x 0 ? x ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? x ? x 0 0 ? x x x x 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Network Winsock2
  • WSASocket
  • WSAStartup
Network Winsock
  • closesocket
  • setsockopt
Process Shell Execute
  • ShellExecuteEx
Encryption Used
  • BCryptOpenAlgorithmProvider

Shell Command Execution

(NULL) GDMO.exe DiMaOAuthKey.value

Related Posts

Trending

Most Viewed

Loading...