20ce8647e8f58a8545a85daa44c88896536b45bf088763fb7bb495fd3321985b

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Apr-14 03:35:50
Detected languages English - United States
FileDescription My Custom Application
FileVersion 1.0.0.0
CompanyName My Custom Company
LegalCopyright (c) 2026 My Custom Company
ProductName My Custom App
ProductVersion 1.0.0.0

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Info Interesting strings found in the binary: Contains domain names:
  • .exe.bat.com
  • autohotkey.com
  • exe.bat.com
  • https://autohotkey.com
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryExW
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • CreateToolhelp32Snapshot
  • FindWindowW
Code injection capabilities:
  • OpenProcess
  • WriteProcessMemory
  • VirtualAllocEx
Code injection capabilities (PowerLoader):
  • FindWindowW
  • GetWindowLongW
Can access the registry:
  • RegisterHotKey
  • RegDeleteKeyExW
  • RegCreateKeyExW
  • RegSetValueExW
  • RegDeleteValueW
  • RegQueryValueExW
  • RegCloseKey
  • RegQueryInfoKeyW
  • RegEnumKeyExW
  • RegOpenKeyExW
  • RegEnumValueW
  • RegDeleteKeyW
Possibly launches other programs:
  • CreateProcessW
  • CreateProcessWithLogonW
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Uses functions commonly found in keyloggers:
  • MapVirtualKeyW
  • GetForegroundWindow
  • GetAsyncKeyState
  • AttachThreadInput
  • CallNextHookEx
Memory manipulation functions often used by packers:
  • VirtualAllocEx
  • VirtualProtect
Has Internet access capabilities:
  • InternetOpenW
  • InternetReadFile
  • InternetCloseHandle
  • InternetReadFileExA
  • InternetOpenUrlW
Functions related to the privilege level:
  • AdjustTokenPrivileges
  • OpenProcessToken
Interacts with services:
  • OpenSCManagerW
Enumerates local disk drives:
  • GetVolumeInformationW
  • GetDriveTypeW
Manipulates other processes:
  • OpenProcess
  • WriteProcessMemory
  • ReadProcessMemory
  • Process32NextW
  • Process32FirstW
Can take screenshots:
  • FindWindowW
  • GetDC
  • BitBlt
  • CreateCompatibleDC
Reads the contents of the clipboard:
  • GetClipboardData
Can shut the system down or lock the screen:
  • ExitWindowsEx
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 fa04123c5e098fb4941fd35974653436
SHA1 c34f1bad3d73e191b30c249b1b32a073cbad6402
SHA256 20ce8647e8f58a8545a85daa44c88896536b45bf088763fb7bb495fd3321985b
SHA3 d6796168460cccd7b12944ea765ee8ebea1484058155eba549cf0cff74d57218
SSDeep 12288:Fd0v2GwklEJu2xih6ed+1i5wCaws5Q06lK7CGvmXqZg6OV8/gLColj7S+qk:Fd0v1wkmyh6eL5wdiK7D/sogLxOX
Imports Hash 1f07f3efec367356683f03b092e018db

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x110

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 5
TimeDateStamp 2026-Apr-14 03:35:50
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x87c00
SizeOfInitializedData 0x3cc00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000087CAC (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xc8000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
SizeofStackReserve 0x400000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 db185881a140e28b57778350f4c6e537
SHA1 31328331efda1259a7e284e17f9b047390fa317c
SHA256 5b3ef19482fff39c70d19dd810a3d434023b021cf8466824fdaf822774006fbe
SHA3 3aefadfe52bcc602a2d1defad3ea75dcc772bd586aca209e3247804f76b89c17
VirtualSize 0x87b08
VirtualAddress 0x1000
SizeOfRawData 0x87c00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.50974

.rdata

MD5 9f7fac9e45762f032dbf5d257a30ddf8
SHA1 db2b8947c6c9cde5f58bbdeddcccb2895d6ada4b
SHA256 81ff0559e8d385c6219cf5a895828ad007a3b187b91d0c9baf418ba730e4d0a0
SHA3 138458ab8627b03b7d0dc68a64b7531323a48e86e5d801a706abefac59971c30
VirtualSize 0x28d2e
VirtualAddress 0x89000
SizeOfRawData 0x28e00
PointerToRawData 0x88000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.80578

.data

MD5 898d73e61a6b428f7df1d08e20c23959
SHA1 0be773b6d72d8e7b222392295b88349ec0c097fe
SHA256 0bf4226352ea0405c475f2c66274b981a15d20588139377fb58525740d26f319
SHA3 c662fcf8369d0fd0a0d488a5b09fbb9e5d431b1be3a0d2ca8328138fbb604e17
VirtualSize 0xb040
VirtualAddress 0xb2000
SizeOfRawData 0x7a00
PointerToRawData 0xb0e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.30785

.pdata

MD5 9607daae7a6dbbb9568ed42c0f07fa33
SHA1 5ce58e3acdbb4d125e624794b23e1dc01250c5f6
SHA256 adf9244a193c133c2f44ea44832f53fcf82fdca84adafa21e5bf1c98b8c1fa78
SHA3 7c959ad443c088de9272df949360f916b663f94c5896c96f0322e4bd1837410e
VirtualSize 0x4170
VirtualAddress 0xbe000
SizeOfRawData 0x4200
PointerToRawData 0xb8800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.75968

.rsrc

MD5 20b5ea6bf36a863881f7fd581a076490
SHA1 6c507fe6ac37712161be8bfa99d7c2df9ed5ff7b
SHA256 5990adb7e8899fea41e6613cc773ad3741bbf1a4850cc7744b9871464610c723
SHA3 78848a72c95a5d2497008d1feab8f3e018358f62054c6eb26fb1e7826191c8c1
VirtualSize 0x4938
VirtualAddress 0xc3000
SizeOfRawData 0x4a00
PointerToRawData 0xbca00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.80108

Imports

WSOCK32.dll gethostbyname
WSAStartup
WSACleanup
inet_addr
gethostname
WINMM.dll joyGetPosEx
mciSendStringW
joyGetDevCapsW
VERSION.dll GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
COMCTL32.dll ImageList_ReplaceIcon
ImageList_Create
CreateStatusWindowW
ImageList_GetIconSize
ImageList_AddMasked
ImageList_Destroy
PSAPI.DLL GetProcessImageFileNameW
WININET.dll InternetOpenW
InternetReadFile
InternetCloseHandle
InternetReadFileExA
InternetOpenUrlW
SHLWAPI.dll StrCmpLogicalW
UxTheme.dll SetWindowTheme
IsAppThemed
EnableThemeDialogTexture
dwmapi.dll DwmGetWindowAttribute
KERNEL32.dll SetLastError
GetModuleHandleW
WideCharToMultiByte
GetVolumeInformationW
GetDiskFreeSpaceW
DeviceIoControl
CreateFileW
SetVolumeLabelW
GetDiskFreeSpaceExW
GetDriveTypeW
SetEnvironmentVariableW
GetEnvironmentVariableW
CreateDirectoryW
ReadFile
SizeofResource
FindFirstFileW
GetFileSizeEx
GetFullPathNameW
FindNextFileW
WriteFile
SetFileTime
FindClose
GetFileAttributesW
SetFileAttributesW
MultiByteToWideChar
LocalFileTimeToFileTime
LockResource
DeleteFileW
LoadResource
FindResourceW
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
FreeLibrary
QueryDosDeviceW
SetPriorityClass
TerminateProcess
GetProcessId
OpenProcess
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
Beep
GetLocalTime
GetTimeFormatW
GetProcAddress
GetSystemDefaultUILanguage
GetTempPathW
GetDateFormatEx
GetTickCount64
GetCurrentDirectoryW
GetComputerNameW
GetSystemTime
GetSystemWindowsDirectoryW
WaitForSingleObject
GetExitCodeProcess
WriteProcessMemory
ReadProcessMemory
GetVersionExW
GetModuleHandleExW
GetShortPathNameW
GetModuleFileNameW
InitializeCriticalSection
SetCurrentDirectoryW
DeleteCriticalSection
CreateProcessW
SetDllDirectoryW
FormatMessageW
CompareStringW
GetCurrentProcess
RemoveDirectoryW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CopyFileW
WritePrivateProfileStringW
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
WritePrivateProfileSectionW
GetStdHandle
SetEndOfFile
GetACP
SetFilePointerEx
GetFileType
EnumResourceNamesW
FileTimeToSystemTime
VirtualAllocEx
GetFileSize
SystemTimeToFileTime
VirtualFreeEx
IsWow64Process
LoadLibraryExW
GlobalSize
lstrcmpiW
CreateThread
CloseHandle
GetExitCodeThread
CreateMutexW
SetThreadPriority
GetStringTypeExW
GetCurrentThreadId
LoadLibraryW
OutputDebugStringW
GetLastError
IsValidCodePage
GetCPInfo
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
SetErrorMode
MulDiv
GetTickCount
Sleep
RtlCaptureContext
VirtualProtect
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
MoveFileW
GetDateFormatW
USER32.dll WindowFromPoint
keybd_event
MapVirtualKeyW
VkKeyScanExW
GetMonitorInfoW
EnumDisplayMonitors
DestroyIcon
IsCharAlphaW
InvalidateRect
AdjustWindowRect
SendDlgItemMessageW
SetDlgItemTextW
GetWindowTextLengthW
GetIconInfo
MessageBeep
LoadCursorW
ClientToScreen
GetCursorInfo
GetLastInputInfo
EnableWindow
IsIconic
IsZoomed
SetLayeredWindowAttributes
EnumWindows
IsChild
GetLayeredWindowAttributes
SetWindowRgn
EnumChildWindows
SetActiveWindow
SetWindowPos
IsWindowVisible
LoadImageW
SystemParametersInfoW
EnableMenuItem
PostQuitMessage
AddClipboardFormatListener
CheckMenuItem
RemoveClipboardFormatListener
LoadAcceleratorsW
RegisterClassExW
CreateWindowExW
DestroyWindow
GetMenu
SetForegroundWindow
RegisterWindowMessageW
MonitorFromPoint
DefWindowProcW
GetMenuStringW
ExitWindowsEx
GetSubMenu
GetKeyboardLayout
GetMenuItemID
GetSystemMenu
GetAncestor
UpdateWindow
PtInRect
GetClassInfoExW
CreateDialogIndirectParamW
GetSysColorBrush
DrawTextW
GetClassLongW
SetParent
GetUpdateRect
SetPropW
IntersectRect
FlashWindow
CreateAcceleratorTableW
SetMenu
GetSysColor
DestroyAcceleratorTable
RedrawWindow
GetClassLongPtrW
RemovePropW
FillRect
GetPropW
CheckRadioButton
CallWindowProcW
GetKeyboardState
AdjustWindowRectEx
CreateMenu
RemoveMenu
TrackPopupMenuEx
DestroyMenu
SetMenuDefaultItem
SetMenuInfo
SetMenuItemInfoW
CreatePopupMenu
InsertMenuItemW
GetMenuItemInfoW
DrawIconEx
CreateIconIndirect
CopyImage
CreateIconFromResourceEx
EnumClipboardFormats
BringWindowToTop
GetQueueStatus
MessageBoxW
GetWindow
GetShellWindow
GetLastActivePopup
ToUnicodeEx
UnhookWindowsHookEx
IsCharAlphaNumericW
SetWindowsHookExW
PostThreadMessageW
IsCharUpperW
ReleaseDC
GetWindowRect
SetWindowLongPtrW
GetSystemMetrics
SetWindowTextW
GetWindowLongPtrW
DefDlgProcW
MapWindowPoints
MoveWindow
SetFocus
MapDialogRect
GetClientRect
GetDlgItem
ScrollWindow
DialogBoxParamW
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardFormatNameW
GetClipboardData
SetClipboardData
PostMessageW
FindWindowW
GetWindowLongW
GetWindowThreadProcessId
GetMessageW
GetKeyState
GetFocus
ScreenToClient
SendMessageW
EndDialog
ShowWindow
IsWindow
DispatchMessageW
SetTimer
IsDialogMessageW
GetDlgCtrlID
PeekMessageW
CountClipboardFormats
GetForegroundWindow
IsWindowEnabled
TranslateAcceleratorW
TranslateMessage
GetClassNameW
SetWindowLongW
IsClipboardFormatAvailable
KillTimer
GetParent
SetKeyboardState
GetAsyncKeyState
MapVirtualKeyExW
GetKeyboardLayoutNameW
AttachThreadInput
BlockInput
mouse_event
ActivateKeyboardLayout
GetCursorPos
GetGUIThreadInfo
SendInput
GetWindowTextW
UnregisterHotKey
CharUpperW
SendMessageTimeoutW
RegisterHotKey
CharLowerW
IsCharLowerW
GetMessagePos
CallNextHookEx
GetDC
GetMenuItemCount
GDI32.dll CreateRoundRectRgn
CreateRectRgn
CreateFontW
CreateEllipticRgn
CreateDCW
CreateFontIndirectW
CreateSolidBrush
SetBkColor
BitBlt
GetDIBits
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetPixel
GetSystemPaletteEntries
DeleteDC
DeleteObject
CreateDIBSection
EnumFontFamiliesExW
GdiFlush
SetBrushOrgEx
GetStockObject
GetClipBox
GetTextMetricsW
CreatePatternBrush
SetTextColor
CreatePolygonRgn
GetDeviceCaps
GetCharABCWidthsW
GetObjectW
SetBkMode
ADVAPI32.dll RegDeleteKeyExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegQueryValueExW
LookupPrivilegeValueW
CreateProcessWithLogonW
AdjustTokenPrivileges
UnlockServiceDatabase
CloseServiceHandle
GetUserNameW
OpenSCManagerW
LockServiceDatabase
OpenProcessToken
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegConnectRegistryW
RegEnumValueW
RegDeleteKeyW
SHELL32.dll SHFileOperationW
ExtractIconW
DragQueryPoint
SHGetDesktopFolder
SHGetPathFromIDListW
SHEmptyRecycleBinW
SHBrowseForFolderW
DragQueryFileW
SHGetMalloc
SHCreateItemFromParsingName
ShellExecuteExW
SHGetFolderPathW
Shell_NotifyIconW
DragFinish
ole32.dll CoCreateInstance
CoTaskMemFree
CLSIDFromString
OleUninitialize
OleInitialize
OleFlushClipboard
CoInitialize
CoUninitialize
StringFromGUID2
CLSIDFromProgID
CoGetObject
CreateStreamOnHGlobal
OLEAUT32.dll SafeArrayUnlock
VariantClear
VariantChangeType
SafeArrayAccessData
SysAllocStringLen
SafeArrayCreate
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SysStringLen
SafeArrayGetLBound
SafeArrayLock
SafeArrayGetElemsize
SysAllocString
SafeArrayGetDim
SafeArrayDestroy
OleLoadPicture
SafeArrayCopy
SysFreeString
VariantCopyInd
GetActiveObject
SafeArrayGetUBound
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll __RTDynamicCast
memmove
wcsstr
wcschr
_purecall
__C_specific_handler
__std_terminate
memcpy
wcsrchr
memcmp
strchr
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__current_exception
__current_exception_context
memset
api-ms-win-crt-string-l1-1-0.dll wcsncpy
iswxdigit
wcslen
tolower
isalpha
iswspace
strnlen
wcsncmp
towupper
_wcsdup
isalnum
toupper
wcscat
strcat
wcscspn
_wcsupr
isxdigit
wcscmp
_wcsicmp
wcscpy
wcsnlen
_wcsnicmp
iswdigit
api-ms-win-crt-runtime-l1-1-0.dll terminate
_register_thread_local_exe_atexit_callback
_c_exit
_exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_initialize_wide_environment
_seh_filter_exe
_configure_wide_argv
__p___wargv
_set_app_type
_cexit
exit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
__p___argc
api-ms-win-crt-heap-l1-1-0.dll free
_expand
_callnewh
_msize
malloc
realloc
_set_new_mode
api-ms-win-crt-stdio-l1-1-0.dll __stdio_common_vswprintf
_set_fmode
__p__commode
api-ms-win-crt-convert-l1-1-0.dll _wtof
wcstoul
_i64tow
_wtoi
wcstod
wcstol
_itow
_ultow
api-ms-win-crt-utility-l1-1-0.dll qsort
api-ms-win-crt-math-l1-1-0.dll tan
pow
fmod
sqrt
fabs
acos
__setusermatherr
log
asin
exp
floor
cos
atan
sin
log10
ceil
api-ms-win-crt-filesystem-l1-1-0.dll _wsplitpath
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x244
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.33249
Detected Filetype PNG graphic file
MD5 9d07814a27f482c2d7c563ff6868c539
SHA1 bcfd3b11a28ff193373d7dab4ffca072b533c3de
SHA256 8f5cb2266f8445405c75921de831112f60a2262041ed60039e0871bffd6d7203
SHA3 e8c0f6c3cf8716e8c9e004156c373dbfa924237651b3d0306f07367cad85be43

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x197
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.85349
Detected Filetype PNG graphic file
MD5 95eee4f269dc68bf7d0937d648cf38bf
SHA1 f9226a77de6ec90b53720252560cdd466ac244ef
SHA256 efe628398ba9727fe5341b60615e17b10977f05bce50adf6af5d4d1da7c740d2
SHA3 1929d34939e214cf8df483e60d239f7d70d422883bb4f9212f6124742a68b253

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1d1
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.09487
Detected Filetype PNG graphic file
MD5 9a3ea4fc3821f4b35ab512fe156de5df
SHA1 7fe5efea95e344b46d89b258e0235728bb1bf530
SHA256 18fc0f58bc71965f32e49f236adc23ee32155a8d00c805838692a3f98cffb1f9
SHA3 5f1691754db788ca6254c0c5f5d9cc1040a04b87f4eba36956671e52e92f96c8

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x229
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.29607
Detected Filetype PNG graphic file
MD5 defd3602a640726e1335484c2ee9c265
SHA1 04f31f314ace2e0410a2c90c24c0df5cbe0da589
SHA256 53f2680efff7f2fb903f30bf590e8fb8111053f382011deaed2f6f90607d0a5e
SHA3 14e47b005e52020fe7315308c909705be19e9ca3c1ba9b0b9362dea6f5d31121

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x26f
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.36765
Detected Filetype PNG graphic file
MD5 6db39e3193561f607a6020f15fe6c1bd
SHA1 efaa36a2d23a92a8b315c07c27166d17d238cd7c
SHA256 7e4f77e0f5362354999d079e0f27f864c2a277922ce727da05d837c136cc146f
SHA3 c8ba3cb2955e14184b52c97d767f8966a789cbd49b3ba0db387765673139a6a6

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x322
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.53731
Detected Filetype PNG graphic file
MD5 990feace7c4409fae8e239931c5abd5a
SHA1 c75d568990b914bf6a5ff158cffea8ba8c9f9eae
SHA256 48f08d3608f503a2d816727054dd09d8f2f42f079592a63f1de366224ba3af30
SHA3 d0e2060b781480d3753759ddc5e8cd3cfad31326a1cfb9d9ebe9441c242e873a

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x3ab
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.58591
Detected Filetype PNG graphic file
MD5 d3d22e825073cc221f9a9fc53896ec1d
SHA1 14dfa1ce4e91c635f6682c124ac93a9e8a511504
SHA256 66f975428676309833a756c08a8baa591a61e24256e6227b194d42ec660473c4
SHA3 90de716265e2556928e97c414c8f8aa79941235312646d9f1815adca8e7e7f4c

8

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x413
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.61505
Detected Filetype PNG graphic file
MD5 55610ca28a4fef948e52acb26c9f22d0
SHA1 9bf26e1e03ecfb149cbd9efe3e049a1dcb2f78cf
SHA256 74a5a43f25592d2ce093f28b4c0a459a7726f9dbec604832e69ee50805474baa
SHA3 cb49c8bde1f4b67fbbb8200af86afd0dacced6970074ddfb9a7a95ae3a0f0ff3

9

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x26b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.29574
Detected Filetype PNG graphic file
MD5 1ddb64d710c05dafe3256176d12bc3ad
SHA1 4ef7a3714d72ef572a887f10c1c10afbf3ea41ad
SHA256 b6fbf3ceb35024a07fd66ee0824d2cef959ab17a1b68200710f3b0c880f72f32
SHA3 84e3a33e368b978c0672d43045526b49746cc0f58c73538693b0d8ad8a28b41d

10

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x19b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.00148
Detected Filetype PNG graphic file
MD5 6a35ea83990a3d13af252a5022572494
SHA1 abcb7f00e1c673c07ffbc882e47826c208417c3b
SHA256 8d6d8a637a5f657b305fddd9d66596005909bf53d5ab3d518923b1c3dca7652f
SHA3 37c122057bc5cd9719683a37328a4b747a72312067bdc885d3f014ed3d2c0ff2

11

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1d8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.15376
Detected Filetype PNG graphic file
MD5 e79ede524fa56efc003e874587f63206
SHA1 3d4bf14637525979fa60130c418e63e139bf2cfd
SHA256 942cf5c52660c7a527c9517493b60b4f60eb71dcfca736f0f8e8185cb5be2d0f
SHA3 af2673688f8bdf64d70f49b42b633d23b09d39d9c5b3f3b81fe5aca4159094f8

12

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x22a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.28867
Detected Filetype PNG graphic file
MD5 47395a13bc1650a3d82734b132aec81e
SHA1 e7eb5c0c4a184ed4ada61fa26e5e9bcaf6b3eb73
SHA256 7cf0fd6c17edcc198c60512f8421b4c1fe2d9fd28c73c4f4488e8a3be7b0c438
SHA3 53b53782fb4ac322c95967c33a6c565bcfab3bdf4b50106ae9ceedeb6328a221

13

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x252
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.39902
Detected Filetype PNG graphic file
MD5 7b8f4b199f8d141a44c0ba54790fede1
SHA1 060d69286cc4333d983f87c131f50c8a954c038f
SHA256 47669513bb1877096089bb363dcaf8daf877274381e8f6f2e4fb9e89f4b83a44
SHA3 376dc5063489cbd158e8c1482086a28ff5f8eb454ba59339781c2ac82967d66a

14

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x16e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.69583
Detected Filetype PNG graphic file
MD5 fec1048117bb1e558e784c7ba3793e7e
SHA1 b0517af8129fa5e61b6d44695c5e544945b14ba3
SHA256 dc3085cae57efefe7ff1b589740823f72eed1f5d20e6f5958479d8472a31237d
SHA3 aa12c4a92f09e24a803709a698272b1a3e7ce7560c6b7b231d5cf142ff21d8a7

15

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1b0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.08313
Detected Filetype PNG graphic file
MD5 4f9a17a9976d74d6047bc6c067748fba
SHA1 cf0958a9a3bee216684a5b48543441f17c3ebf39
SHA256 625e6ebc94122061e7bae32a778e666694569aa95a37093481c7d8df404bcf8c
SHA3 fe8b139dd869747c178bf9753ab1bd6b1ec13659c1403849c545939488816daa

16

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1ed
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.17673
Detected Filetype PNG graphic file
MD5 fa817e56e99d52835450e687d18e9bfd
SHA1 c3270b47bc88387b649c71da1049ced23e736ec7
SHA256 41db533b488d82833c324b20c9ba4e0ad6b0ce88aea4d80b93db7d017f01242e
SHA3 800598656c8625bd3d6dac5b335d7ef1b22bc40865fd7843db8cd7987e45c730

17

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x22a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.25042
Detected Filetype PNG graphic file
MD5 0cbacd3ff15622acdbcd00098b6ffb5d
SHA1 a4a605284ac1eb1962de2d2ce897ed7da8dc780f
SHA256 8543aca233240bd4b3c2f4f9d334afb94498f17fab05f0d75604bc52d15c6d2c
SHA3 fb7bcde5ef21e7a9476be6bc735abbf0b51720a207a4d7d198e64afd1d046423

18

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x203
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.17458
Detected Filetype PNG graphic file
MD5 df3fd59104aeb107f6a2e14bbaa70767
SHA1 f5857de0e40c8f975772af21229657bbd0828cac
SHA256 0f294cc35adb7f211ba0a6df3883c4df3d1433ddecba1c55ddc2c12bdb12647d
SHA3 8e998c215a0c603479d97e4bbb0c8c282183580fe7b8c2fdf8d05f709ba9c092

19

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x163
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.74336
Detected Filetype PNG graphic file
MD5 03aa5938612807bbac00d4a8610a75c1
SHA1 0b4293a1d0b38e2efacbe6b349a024a8263ac144
SHA256 b027d29c6b1e9ec2576b1e84e116c4142c0a52c28106dbde21184ae4c018d554
SHA3 1666547579c26ea1e309e5500360e1a9080abc2869f1305ffb8e2c8eb6a5c27d

20

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x19f
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.00224
Detected Filetype PNG graphic file
MD5 61fe63e8d5cef481e88d801dc7e951d1
SHA1 d2e78a03ef9a776c4cb78fa6506f2f366a0564dc
SHA256 8f9a3ea6252e894176a5b0c1fe743f00d7c27d659682d3be5ca68bee7962b60c
SHA3 8861dde39d4e41da9ea0c7f45964a8b871afbf225eb615904363aaef3b349ba9

21

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1d6
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.13641
Detected Filetype PNG graphic file
MD5 ae372a3fd458088ab25f071dea4cfcab
SHA1 0a54b45783828f63cd68da4ccef124b6bbb05f87
SHA256 e1022f2f3acdbe70f624fbee8d99b9ced7d97f6761be5fda371e6b2c4ddfbad9
SHA3 5ac0fa63ff019b9387d8761801926187ba0d807dcd9d3889936b935b13865be3

22

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x20f
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.23266
Detected Filetype PNG graphic file
MD5 1e1e54d4fd4eb384c5930bb0e97edfcf
SHA1 b6feddd1e0e9950c4a78fcc934a940a274e7a082
SHA256 cd65509518e02434177b8bb71aa67018fbdfd9f5141cfe9c7c02f85a56086c33
SHA3 cb7845a017c90c16fcd2f38e1a2e20d1d06a1d155753a0772f99809becff90cc

23

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1f0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.06546
Detected Filetype PNG graphic file
MD5 98c9044262916ccd7f52c38ca67a2640
SHA1 b352c3fcac7381e3d5f3b092159d4b6edbbe81e9
SHA256 27322b9ead450123f89ef52e2f8d9738d90b28d423278e9104d9b34d22972c2e
SHA3 5e83f91edede7e303529c40299e929ad260eeade4a30663e04f2fec5c7ca814f

24

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.56056
MD5 9104d9f5acc220ac5a9a1c29a283e42d
SHA1 7e274a143071c4d7801c07669074cd8fa2972047
SHA256 e773c795d1dbb9bf8cd8f73f12c4f02c047f58dc516be4a629fe807610476917
SHA3 8cd4a3f7555bedc4ecddbcb83b34780f450c902a91ddda511b41f9b6f1c21103

211

Type RT_MENU
Language English - United States
Codepage UNKNOWN
Size 0x2c8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.37124
MD5 2cfd05e0e8346abd1be8b6933d0684ad
SHA1 898c4f11bceec1fb399cc9e0f305e09b9a2df803
SHA256 c0306fb5f7462e74df09e5e0627c01a238f291bbdc89c24c0ea1f46e7341ab5a
SHA3 8f3778cee4660e3c85805aa4bce2602547080ca7cfc425029bce1441a5af9a1f

205

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0xe0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.7949
MD5 4b54c50878e900edccf0410ee62936bd
SHA1 e611915c5346058db710121d89c444aa7b5e503a
SHA256 ffa9c8ef0bc17102bd0afd2d82569ec0c1d1bc9b960183c191f5753f5c105703
SHA3 2fbe970575523b53f36fb2d5f9deb2c512807889cc39c4fbc22b133603816d1d

500

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x162
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.01687
MD5 981469bdfb3dc3e4cdcd85cc93b517ca
SHA1 4b7dd38d52851686a0a975e0447f08a869edd487
SHA256 19b434a3fa7585be205e9d57e399609c33468f31e7bd07da75dfd5e5cc095571
SHA3 2fa42e9cd8107e8f8d8ab7e39e4aaecd71f1db072dbc79493323b7848193c13b

212

Type RT_ACCELERATOR
Language English - United States
Codepage UNKNOWN
Size 0x48
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.96144
MD5 7fb94687aa0fe2b18873dba5ac59ab1d
SHA1 e19e8d6b0e33da063de27c83fa0bab4058513332
SHA256 86286a59831ad1d0d84eb411ae6fa236b21bca5d3ebfc93a59cf4b6bf1d466d0
SHA3 33011788d35d1127a1ee6fbdb975c0d4ef6b36d3896e0d27d3f75f0ff68e3aec

1 (#2)

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x32
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.74147
MD5 fff865d1f248d2d7909ae287bd801625
SHA1 9d0293da8d32c449b5df24daf6c4784f41bb8043
SHA256 b760d945e2e4959a646a87672d2e47d571316bd466e828782d76c837098fcddb
SHA3 7cb46bdc162ca797aef7e79ed6c28a3805ac1476a7d7eb46a720a32a955d36a7

159

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x76
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.97241
Detected Filetype Icon file
MD5 9fb9077af1c4b1a2a5b5d0a142cd53fb
SHA1 243b6f0733c5d6eba208ca108238a76119490bbc
SHA256 48523ac82d2330704737c7acba2691a35e6255c2c8f44704a0f76dcbc7aa70f8
SHA3 90c62cc33ea186e7f4a9e7a13b4a57b600c10369d1f22c638aa17bd859a4e007

160

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.02322
Detected Filetype Icon file
MD5 7390835dbde4b519f1bb5d0a43cdecf1
SHA1 ace1db88f5c6a7d770deb33fbd310ffd963fa913
SHA256 ee9a03aed49512f1392e1f994a315ec1234ce773c3eb6fbdb459a5c09182f8a2
SHA3 445c1276c779ae6cc4d1762bc8f459eb3b2c0b890ac3fd8b2f935ee3ed20b2da

206

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.79349
Detected Filetype Icon file
MD5 56bc843c2228363318721c8e48f8089d
SHA1 8a40b1efe5f5663ebf177e5c12e0579027b2e95b
SHA256 2407a1db2e60b58687d2ab4f936205a80833cc1c29331896b678cea298b29b7e
SHA3 898f9dc95fc47db0ed3dfa6a043cbe0d780c82618b06f5d6b4fed958adb6c422

207

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.7339
Detected Filetype Icon file
MD5 917012b14a88fcc79a3a6017cce15ba4
SHA1 4286eba6df373db6b6ebf28a1f5c818a52a5b289
SHA256 0894c6ebf577910dbeafa70b6167b9d39b2e80a1965d96ff8dabfea8799d0f42
SHA3 a67e97a621b81afb024740542b060f885b5cd30e43ad329da5a69ac267712f14

208

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.6985
Detected Filetype Icon file
MD5 81690092de8afae80c3e61469a647a9d
SHA1 9a4a9e8c2fddf362318017d24c4e12389b56c750
SHA256 bbf948d6ecb3a0dc2af289573953839b9a09e04a1cf5b5708ffad5dd2c1e7bbb
SHA3 afd8389134ab6a3e196e05b3b0d65b03d078068de7ae789c8966ef2648ed3263

1 (#3)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x270
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33472
MD5 1d7403159997aab5cac5f35f9dc7aea8
SHA1 1c220fbc0a9f6c9686832a0c927c20f7f62b8d6d
SHA256 0add0cff2b9107f6b6668106b0e53ad88ba01c74b9eca91d3b3f7c3d93b74b5b
SHA3 5573986c6d797e5d7b7c5f2b7df567907a7b4df8e61a4463228c8e69c62bcdff

1 (#4)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x519
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.34899
MD5 ae6cbabd61462b1c75647641e27471e0
SHA1 ab09ac1c8f01cae017456ea50d62dded0f2d8e0a
SHA256 1ac065102b08a083e659f8c0bc22d36e611e9a3fd59af54f3e24a5759ad27e5f
SHA3 cf59127e0acec85cabbe5259628d30a408de2609c40f939b05b633df13caee74

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
FileDescription My Custom Application
FileVersion (#2) 1.0.0.0
CompanyName My Custom Company
LegalCopyright (c) 2026 My Custom Company
ProductName My Custom App
ProductVersion (#2) 1.0.0.0
Resource LangID English - United States

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2026-Apr-14 03:35:50
Version 0.0
SizeofData 780
AddressOfRawData 0xaa86c
PointerToRawData 0xa986c

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2026-Apr-14 03:35:50
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1400b2040

RICH Header

XOR Key 0x56578e66
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 18
Imports (35207) 4
ASM objects (35207) 3
C objects (35207) 9
C++ objects (35207) 27
C objects (33145) 7
C++ objects (33145) 1
C objects (CVTCIL) (33145) 1
Imports (33145) 33
Total imports 535
ASM objects (35225) 2
C++ objects (LTCG) (35225) 66
Resource objects (35225) 1
Linker (35225) 1

Errors

Leave a comment

No comments yet.