| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2021-Mar-31 15:55:27 |
| Detected languages |
English - United States
|
| Debug artifacts |
c:\totalcmd\tcrun64.pdb
|
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Malicious | VirusTotal score: 14/72 (Scanned on 2026-04-09 04:34:49) |
CrowdStrike:
win/grayware_confidence_100% (W)
DeepInstinct: MALICIOUS ESET-NOD32: Win32/HackTool.Crack.OA potentially unsafe application Gridinsoft: Trojan.Win64.Downloader.sa K7AntiVirus: Unwanted-Program ( 006d59631 ) K7GW: Unwanted-Program ( 006d59631 ) Kingsoft: Win32.Riskware.Crack.f Malwarebytes: Generic.Malware/Suspicious MaxSecure: Trojan.Malware.8328611.susgen Sophos: Generic Reputation PUA (PUA) Trapmine: malicious.moderate.ml.score TrellixENS: Artemis!184854FF2A18 Zillya: Trojan.Inject.Win32.321098 alibabacloud: HackTool:Win/Crack.OM |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x108 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 7 |
| TimeDateStamp | 2021-Mar-31 15:55:27 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0xda00 |
| SizeOfInitializedData | 0x14a00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x000000000000177C (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x26000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.dll |
WriteProcessMemory
GetModuleFileNameW GetEnvironmentVariableW ResumeThread CloseHandle GetProcAddress VirtualAllocEx CreateProcessW GetModuleHandleW CreateRemoteThread WriteConsoleW SetEndOfFile RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind UnhandledExceptionFilter SetUnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent QueryPerformanceCounter GetCurrentProcessId GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead IsDebuggerPresent GetStartupInfoW RtlUnwindEx GetLastError SetLastError EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree FreeLibrary LoadLibraryExW RaiseException ReadFile GetFileAttributesExW GetStdHandle WriteFile ExitProcess GetModuleHandleExW SetFilePointerEx GetConsoleMode ReadConsoleW GetFileType HeapFree HeapAlloc FindClose FindFirstFileExW FindNextFileW IsValidCodePage GetACP GetOEMCP GetCPInfo GetCommandLineA GetCommandLineW MultiByteToWideChar WideCharToMultiByte GetEnvironmentStringsW FreeEnvironmentStringsW SetStdHandle GetStringTypeW LCMapStringW GetProcessHeap FlushFileBuffers GetConsoleCP CreateFileW HeapSize HeapReAlloc |
|---|---|
| USER32.dll |
MessageBoxW
|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2021-Mar-31 15:55:27 |
| Version | 0.0 |
| SizeofData | 48 |
| AddressOfRawData | 0x16b00 |
| PointerToRawData | 0x15900 |
| Referenced File | c:\totalcmd\tcrun64.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2021-Mar-31 15:55:27 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0x16b30 |
| PointerToRawData | 0x15930 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2021-Mar-31 15:55:27 |
| Version | 0.0 |
| SizeofData | 696 |
| AddressOfRawData | 0x16b44 |
| PointerToRawData | 0x15944 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2021-Mar-31 15:55:27 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| Size | 0x138 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x140019008 |
| XOR Key | 0x2fb54470 |
|---|---|
| Unmarked objects | 0 |
| C objects (VS2017 v14.15 compiler 26715) | 10 |
| ASM objects (VS2017 v14.15 compiler 26715) | 5 |
| C++ objects (VS2017 v14.15 compiler 26715) | 147 |
| C++ objects (VS 2015/2017/2019 runtime 29118) | 37 |
| C objects (VS 2015/2017/2019 runtime 29118) | 17 |
| ASM objects (VS 2015/2017/2019 runtime 29118) | 9 |
| Imports (VS2017 v14.15 compiler 26715) | 5 |
| Total imports | 93 |
| C++ objects (LTCG) (VS2019 Update 8 (16.8.5-6) compiler 29337) | 1 |
| Resource objects (VS2019 Update 8 (16.8.5-6) compiler 29337) | 1 |
| 151 | 1 |
| Linker (VS2019 Update 8 (16.8.5-6) compiler 29337) | 1 |
No comments yet.