31fabc69d5e397b3b290a8f0b0329497

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2092-Jul-03 21:44:46
Debug artifacts C:\Java\Projects\Project WALLED\GTTrainer\obj\x64\Debug\Project WALLED.pdb
Comments
CompanyName
FileDescription Project WALLED
FileVersion 1.0.0.4
InternalName Project WALLED.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename Project WALLED.exe
ProductName Growtopia Trainer
ProductVersion 1.0.0.4
Assembly Version 1.0.0.0

Plugin Output

Info Matching compiler(s): .NET executable -> Microsoft
Malicious VirusTotal score: 10/70 (Scanned on 2021-02-09 21:30:55) Malwarebytes: Malware.AI.3655145039
Sangfor: Trojan.Win32.Save.a
APEX: Malicious
Sophos: Generic ML PUA (PUA)
FireEye: Generic.mg.31fabc69d5e397b3
Ikarus: Trojan.Diztakun
Microsoft: Program:Win32/Wacapew.C!ml
Cynet: Malicious (score: 100)
Cylance: Unsafe
SentinelOne: Static AI - Malicious PE

Hashes

MD5 31fabc69d5e397b3b290a8f0b0329497
SHA1 79b8b3b1760ea33c7cde893641f16442acec1589
SHA256 bd666bf675154ef576b144f02c0cfd471c590802cee9c9082967a1911767f888
SHA3 d22b9dd7f75d76597877458700fb524c6f8f326433dca7b5992cce1b712a0822
SSDeep 196608:YVSV8ld98BlON2jnbNswvBXvowJgzl7GSZn7ftm:Yh90jVvBXvoww77rc
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 3
TimeDateStamp 2092-Jul-03 21:44:46
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 48.0
SizeOfCode 0x665400
SizeOfInitializedData 0x668c00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000667262 (Section: .text)
BaseOfCode 0x2000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x66e000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 4b68fc10656416c74898eec3d73dfb51
SHA1 b138bb096728f11fa2f51d7fef3633a7b2e25cd0
SHA256 ef324f6f73a8a33da5f9ef719e317935b28ba7059b8c79f4d72c3c97e9ab2504
SHA3 036ea52302affd9fc5af5145ef1aeebfd9dac32f05b4a2b69b3cefbaddb90986
VirtualSize 0x6652f4
VirtualAddress 0x2000
SizeOfRawData 0x665400
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.98934

.rsrc

MD5 03bf8c383a0ea72e7e593f3b87d426b3
SHA1 a1dd39e8e2d660f22cd6a92c2fb16f0b7f2598ac
SHA256 55594a26b598144d28e749b68ed2dfd2d5c7e40b22af3ba2e0bd8a7d6debbd83
SHA3 7fc7d593986d6e61faa9d61e2cede675f409a4261895187f1ed7a567c7269955
VirtualSize 0x369c
VirtualAddress 0x668000
SizeOfRawData 0x3800
PointerToRawData 0x665600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.91218

.reloc

MD5 ea2ddb7760791b01111bbd16df4dd6d0
SHA1 b5785c4c58b4dd472d4cbffb19bc6c8879307759
SHA256 e6e8188447d7f91d55008ac73f07c56dd5546e747a4829647d1318345be0764f
SHA3 850e427b57a246c8b2f5e22f6560213b84af7d95163c8b0a5532baecbd95bf7f
VirtualSize 0xc
VirtualAddress 0x66c000
SizeOfRawData 0x200
PointerToRawData 0x668e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.10191

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.73724
MD5 93e0060a2931fde4282be101928fc033
SHA1 2e1f906d2f375591e10ea6ee49faef90a6243c19
SHA256 816753feb363253fb587d2260592cdd739c5f13db2add0751554de6ccb48c588
SHA3 2f7ffbb722a74c3b77f86f8cad05226c128796a4cd6d35f6838e2dd228f7766c

32512

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.91924
Detected Filetype Icon file
MD5 6da8e7d5ae1d5d15e0230a67a7c16c6d
SHA1 678db52cbe5d617c33c6269bfd4b6d8d1a17f956
SHA256 6eb54801f91b6d8effccbfaefe6b2d7705a274a75940e6226e24e0d4ec58c396
SHA3 994fc217c7b8bc8008ac262ff58044403206de6eceafd424d4640ecad395eb2f

1 (#2)

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x350
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.32539
MD5 4092fe152e7d26101d1fea5f16855351
SHA1 fed8631adbc6e135621d56d1ee732b8ee379c34c
SHA256 68fefc25b7150ac0456f9f11d0a1ccacc0a1b21fcbfa8b6d32d4582a62ec6e00
SHA3 3383accab8338b3e35a92067d76087f53dbe102641334e26af09d5584d1a1ff9

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0xc60
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00772
MD5 e0e4a019be8bfcf48b646ce2f98b627c
SHA1 c96a62055bcf99d90ad8e85f180ff98a2a8e9f72
SHA256 5cad9422b30296dc60ad088d66bda7fb0b5ce7bd57f780a5e044b68300e7bbd9
SHA3 9f3e1fce8557212d37bf9305fc64610b65b608f5b18749642ae8b550a31aba28

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.4
ProductVersion 1.0.0.4
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription Project WALLED
FileVersion (#2) 1.0.0.4
InternalName Project WALLED.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename Project WALLED.exe
ProductName Growtopia Trainer
ProductVersion (#2) 1.0.0.4
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2039-Apr-27 16:11:40
Version 0.0
SizeofData 99
AddressOfRawData 0x667290
PointerToRawData 0x665490
Referenced File C:\Java\Projects\Project WALLED\GTTrainer\obj\x64\Debug\Project WALLED.pdb

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->