5d42fb99080e9d345b504bcc5e123223

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2025-Dec-14 11:35:20
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
Debug artifacts Prestarter.pdb
CompanyName gravitlauncher
FileDescription prestarter
FileVersion 0.1.0
ProductName prestarter
ProductVersion 0.1.0

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • api.bell-sw.com
  • bell-sw.com
  • birthpopuptypesapplyImagebeinguppernoteseveryshowsmeansextramatchtrackknownearlybegansuperpapernorthlearngivennamedendedTermspartsGroupbrandusingwomanfalsereadyaudiotakeswhile.com
  • developer.microsoft.com
  • genretrucklooksValueFrame.net
  • github.com
  • http://www.C
  • http://www.a
  • http://www.css
  • http://www.hortcut
  • http://www.icon
  • http://www.interpretation
  • http://www.language
  • http://www.style
  • http://www.text-decoration
  • http://www.w3.org
  • http://www.w3.org/shortcut
  • http://www.wencodeURIComponent
  • http://www.years
  • https://api.bell-sw.com
  • https://api.bell-sw.com/v1/liberica/releases?version-modifier
  • https://developer.microsoft.com
  • https://developer.microsoft.com/en-us/microsoft-edge/webview2
  • https://github.com
  • https://www.World
  • https://www.recent
  • microsoft.com
  • thing.org
  • www.w3.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to RC5 or RC6
Suspicious The PE is possibly packed. Unusual section name found: .taubndl
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExA
  • LoadLibraryW
  • LoadLibraryA
  • LoadLibraryExW
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegCloseKey
  • RegOpenKeyExW
  • RegQueryValueExW
  • RegGetValueW
Possibly launches other programs:
  • ShellExecuteW
  • CreateProcessW
Uses Windows's Native API:
  • NtCreateNamedPipeFile
  • NtCancelIoFileEx
  • NtDeviceIoControlFile
  • NtCreateFile
  • NtWriteFile
  • NtOpenFile
  • NtReadFile
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Uses functions commonly found in keyloggers:
  • GetForegroundWindow
  • GetAsyncKeyState
  • MapVirtualKeyW
Leverages the raw socket API to access the Internet:
  • shutdown
  • send
  • freeaddrinfo
  • WSACleanup
  • WSAStartup
  • getaddrinfo
  • bind
  • getsockopt
  • connect
  • setsockopt
  • WSASocketW
  • WSASend
  • closesocket
  • recv
  • WSAIoctl
  • getsockname
  • WSAGetLastError
  • ioctlsocket
  • getpeername
Can take screenshots:
  • BitBlt
  • CreateCompatibleDC
  • GetDC
Interacts with the certificate store:
  • CertOpenStore
  • CertAddCertificateContextToStore
Info The PE is digitally signed. Signer: NarutoCraft Code Sign
Issuer: NarutoCraft Root CA
Malicious VirusTotal score: 4/72 (Scanned on 2026-02-06 19:28:47) Bkav: W64.AIDetectMalware
Google: Detected
Ikarus: Trojan.Win64.Agent
Trapmine: suspicious.low.ml.score

Hashes

MD5 5d42fb99080e9d345b504bcc5e123223
SHA1 e306a8e7a46ef22834279be041d3ef6f2c43148d
SHA256 160aefad5e1fce1113934ee940ac24619843cc5573587729a5551bc5873e61ba
SHA3 c5a04e5d10a8f76f5621f7c616eec74f26b9fe31f7b5c901d90c3f9a2e8224e9
SSDeep 196608:UESpsa4kwc0EuJOHjjHsRHsrWW/LXPDq4IDMAt944MZX7:jkw3EuGXqMdru4wMka7
Imports Hash 037a212370acdbb6d413c189b23ad20b

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2025-Dec-14 11:35:20
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x335c00
SizeOfInitializedData 0x174e00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000318588 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x4af000
SizeOfHeaders 0x400
Checksum 0xc9c10a
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 f064ba86b17d38bb1b834a072704c814
SHA1 d58a11a5516726d34fa2b006ade04aadb089b469
SHA256 337951c6a6615bd30368cca9e920366f840ce4db2440291a62ac1c3932503dcd
SHA3 61af08e46e7aab2df1b28f4fc8a584ad7910eb11654122c68be2516439f86a22
VirtualSize 0x335ac0
VirtualAddress 0x1000
SizeOfRawData 0x335c00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.30343

.rdata

MD5 47adf83ef15eb475481bbea8ef62dfc6
SHA1 b5da7ba669dab85af557db5f5c2197323583e91b
SHA256 36b5c3ee5de26ed07f0231eb7e3d0cb0cd6be4e6e39f28c7f9bc12aa4733d6f8
SHA3 ef1a224f7b8c354bdda75e348373ec8c0cc4b56c4d1fa4ab0b3f918809e010b6
VirtualSize 0x150b5a
VirtualAddress 0x337000
SizeOfRawData 0x150c00
PointerToRawData 0x336000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.79814

.data

MD5 31c958679ddfa69bb1de0fd0138f3cb2
SHA1 a1f36db379ccd40d9e89e3e8aa6214f576dfce26
SHA256 d62c151052aa52611e3ea1db59d85c41d44f41a1ec8805c231a0eb2266a66052
SHA3 fbafe992e21545eaa1053a8eb608b529cc7f2c4957be65910a378d5b2b509c00
VirtualSize 0x3378
VirtualAddress 0x488000
SizeOfRawData 0xa00
PointerToRawData 0x486c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 1.45435

.pdata

MD5 22d367ffad936bb14ed366041a9b5eb2
SHA1 a3e1367f3b4b0acedf609647cfd0895da962f20d
SHA256 5386793ec75b2c1c57d8a4b9fd4d51ffa2a8fcd0f2c4ba3c48078c6540b8f275
SHA3 7a485cfc30ab0ee8025c786b83b49b2f0e2551c41104736ac7295e36c7684e89
VirtualSize 0x125d0
VirtualAddress 0x48c000
SizeOfRawData 0x12600
PointerToRawData 0x487600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.24962

.taubndl

MD5 f65c6c3dda7adc71b510db4e566b73e5
SHA1 89651689aea472b07af5601df7b1cd097f742d9d
SHA256 92d3896eb5f1bb2ce13f52c4c69b84e3e7a23a8ae3a749a009258d51413a2fa6
SHA3 e2fd88885072deda0849af380898e40e79133840149f02f20b3aa8ccd12f26d7
VirtualSize 0x10
VirtualAddress 0x49f000
SizeOfRawData 0x200
PointerToRawData 0x499c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.122276

.rsrc

MD5 e57df07d5bcec9d3a255b67e8c272821
SHA1 b47cab09deeb26f96323cccc00ccc184e7c44ec4
SHA256 9dc38bbfc09c5ef386590640d5a7c2970a4bb9ae3b548920bbf985f65e529b89
SHA3 7415deb05b83e78d6a11ab2d571d82c59187d92f5c853d5759b7386a2866926f
VirtualSize 0x97a0
VirtualAddress 0x4a0000
SizeOfRawData 0x9800
PointerToRawData 0x499e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.89445

.reloc

MD5 81c039412f96d0af84ce3e745c9109aa
SHA1 f1e5681a4989e3d7962dbed100649b99e4e9148e
SHA256 d8228e25c160d9741f428e818321bf8b82007fb8fe4de3bbd6ee4a8c9d291187
SHA3 1e1452c9e1099026be6c6c3a48a5ade02f89812f22db09d1f306cea6bf5e6dd7
VirtualSize 0x4c04
VirtualAddress 0x4aa000
SizeOfRawData 0x4e00
PointerToRawData 0x4a3600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.43679

Imports

kernel32.dll DuplicateHandle
GetWindowsDirectoryW
GetSystemDirectoryW
CompareStringOrdinal
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
SetWaitableTimer
TerminateProcess
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleFileNameW
FormatMessageW
ReleaseMutex
SwitchToThread
GetLastError
lstrlenW
GetSystemTimePreciseAsFileTime
HeapReAlloc
GetCurrentThread
SetThreadStackGuarantee
WaitForSingleObject
HeapAlloc
CloseHandle
WideCharToMultiByte
GetCurrentProcessId
SetFileAttributesW
SetFilePointerEx
GetFileAttributesW
CreateHardLinkW
CreateSymbolicLinkW
GetFinalPathNameByHandleW
GetCurrentProcess
DeleteFileW
GetTempPathW
GetFileInformationByHandleEx
GetFileInformationByHandle
CreateFileW
GetFullPathNameW
CreateDirectoryW
WriteConsoleW
GetConsoleOutputCP
GetConsoleMode
GetStdHandle
WaitForSingleObjectEx
RtlLookupFunctionEntry
MultiByteToWideChar
SleepConditionVariableSRW
SetHandleInformation
WakeAllConditionVariable
AcquireSRWLockExclusive
GetCurrentThreadId
LCIDToLocaleName
GetUserDefaultUILanguage
GetModuleHandleW
SetLastError
GetSystemInfo
GetModuleHandleA
Sleep
SetFileInformationByHandle
FindClose
GetProcessHeap
FindNextFileW
FindFirstFileExW
SetFileCompletionNotificationModes
LoadLibraryExA
SetFileTime
LoadLibraryW
LoadLibraryA
OutputDebugStringA
OutputDebugStringW
LoadLibraryExW
HeapFree
FreeLibrary
GetProcAddress
SleepEx
ReleaseSRWLockExclusive
advapi32.dll RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegGetValueW
ntdll.dll NtCreateNamedPipeFile
RtlGetVersion
NtCancelIoFileEx
RtlNtStatusToDosError
NtDeviceIoControlFile
NtCreateFile
NtWriteFile
NtOpenFile
NtReadFile
shell32.dll DragQueryFileW
DragFinish
ILCreateFromPathW
Shell_NotifyIconGetRect
ShellExecuteW
ILFree
Shell_NotifyIconW
SHAppBarMessage
ShellExecuteExW
SHGetKnownFolderPath
SHOpenFolderAndSelectItems
ole32.dll RegisterDragDrop
RevokeDragDrop
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CoCreateFreeThreadedMarshaler
CoInitialize
CoUninitialize
OleInitialize
api-ms-win-core-synch-l1-2-0.dll WakeByAddressSingle
WaitOnAddress
WakeByAddressAll
gdi32.dll CombineRgn
CreateRectRgn
SetTextColor
DeleteObject
BitBlt
CreateSolidBrush
CreateDIBSection
CreateCompatibleDC
GetDeviceCaps
DeleteDC
SelectObject
SetBkMode
comctl32.dll TaskDialogIndirect
RemoveWindowSubclass
SetWindowSubclass
DefSubclassProc
user32.dll GetKeyboardState
IsIconic
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SetWindowDisplayAffinity
MonitorFromRect
ToUnicodeEx
MapVirtualKeyExW
GetKeyboardLayout
ClipCursor
GetSystemMetrics
GetClipCursor
ShowCursor
SystemParametersInfoW
SetPropW
IsWindowEnabled
GetWindowPlacement
SetWindowPlacement
ChangeDisplaySettingsExW
SetWindowLongW
GetSystemMenu
RegisterRawInputDevices
AdjustWindowRectEx
GetMenu
GetWindowLongW
InvalidateRgn
ReleaseCapture
IsWindow
RegisterTouchWindow
EnableWindow
GetParent
GetMonitorInfoW
FlashWindowEx
SetWindowRgn
GetForegroundWindow
FindWindowExW
SetParent
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
CreateAcceleratorTableW
CreateMenu
CreatePopupMenu
DrawMenuBar
KillTimer
SetTimer
SetMenuItemInfoW
CreateIcon
RemoveMenu
LoadCursorW
SetMenu
GetActiveWindow
PostMessageW
SystemParametersInfoA
SetCursor
SetCursorPos
InvalidateRect
DefWindowProcW
RegisterWindowMessageA
UpdateWindow
GetAsyncKeyState
GetKeyState
ScreenToClient
TranslateAcceleratorW
MsgWaitForMultipleObjectsEx
MapVirtualKeyW
GetUpdateRect
PeekMessageW
PostThreadMessageW
ValidateRect
GetRawInputData
RegisterClassW
SetWindowLongPtrW
SetCapture
DispatchMessageW
GetMessageW
DestroyWindow
IsWindowVisible
GetTouchInputInfo
GetWindow
EnumChildWindows
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowPos
CreateWindowExW
RegisterClassExW
SetFocus
GetWindowLongPtrW
CloseTouchInputHandle
RedrawWindow
AdjustWindowRect
EnumDisplayMonitors
MonitorFromPoint
TrackMouseEvent
IsProcessDPIAware
MonitorFromWindow
TrackPopupMenu
SetForegroundWindow
ClientToScreen
GetCursorPos
EnableMenuItem
DrawIconEx
GetDC
AppendMenuW
InsertMenuW
SendInput
CheckMenuItem
ReleaseDC
GetWindowDC
OffsetRect
GetWindowRect
MapWindowPoints
GetClientRect
GetMenuBarInfo
DrawTextW
FillRect
GetMenuItemInfoW
PostQuitMessage
ShowWindow
SendMessageW
oleaut32.dll GetErrorInfo
SysFreeString
SysStringLen
SetErrorInfo
shlwapi.dll SHCreateMemStream
dwmapi.dll DwmGetWindowAttribute
DwmSetWindowAttribute
DwmEnableBlurBehindWindow
bcryptprimitives.dll ProcessPrng
crypt32.dll CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateContext
CertCloseStore
CertDuplicateStore
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertOpenStore
CertAddCertificateContextToStore
CertDuplicateCertificateChain
secur32.dll DecryptMessage
FreeCredentialsHandle
QueryContextAttributesW
EncryptMessage
FreeContextBuffer
AcceptSecurityContext
AcquireCredentialsHandleA
ApplyControlToken
DeleteSecurityContext
InitializeSecurityContextW
ADVAPI32.dll EventWriteTransfer
EventRegister
EventSetInformation
EventUnregister
KERNEL32.dll GetEnvironmentStringsW
CreateProcessW
FreeEnvironmentStringsW
CreateWaitableTimerExW
PostQueuedCompletionStatus
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
AddVectoredExceptionHandler
GetQueuedCompletionStatusEx
RtlUnwindEx
CreateIoCompletionPort
SetEnvironmentVariableW
GetCommandLineW
QueryPerformanceCounter
DeviceIoControl
RtlCaptureContext
RtlVirtualUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
GetCurrentDirectoryW
CreateMutexA
GetEnvironmentVariableW
QueryPerformanceFrequency
CreateThread
WriteFileEx
ReadFileEx
ws2_32.dll shutdown
send
freeaddrinfo
WSACleanup
WSAStartup
getaddrinfo
bind
getsockopt
connect
setsockopt
WSASocketW
WSASend
closesocket
recv
WSAIoctl
getsockname
WSAGetLastError
ioctlsocket
getpeername
api-ms-win-crt-string-l1-1-0.dll wcscmp
strlen
wcslen
_wcsicmp
wcsncmp
strcpy_s
wcsncat
api-ms-win-crt-math-l1-1-0.dll pow
floor
__setusermatherr
roundf
round
trunc
api-ms-win-crt-convert-l1-1-0.dll _ultow_s
_wtoi
wcstol
api-ms-win-crt-heap-l1-1-0.dll _set_new_mode
free
calloc
malloc
_callnewh
api-ms-win-crt-utility-l1-1-0.dll _rotl64
api-ms-win-crt-runtime-l1-1-0.dll __p___argc
_exit
_seh_filter_exe
_set_app_type
abort
__p___argv
terminate
_crt_atexit
_register_onexit_function
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_get_initial_narrow_environment
_initterm
_initterm_e
_cexit
exit
_c_exit
_register_thread_local_exe_atexit_callback
api-ms-win-crt-stdio-l1-1-0.dll _set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x914
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.73603
Detected Filetype PNG graphic file
MD5 d1aa18aeca2d5eb859b27b72b3462d4e
SHA1 1b1053d2f54d3403aedb462c1c9b85542b4d0a54
SHA256 db140a1b1fcf35f03ba1a79b87c86b9e312f91487bd603ebb040b0db4e36199b
SHA3 92399b2a8cad6757a5782f026d0826d2b5f43e9fef737e0a851d20ee6f5cc06c

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x37a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.5747
Detected Filetype PNG graphic file
MD5 7d86f5a5ebc02ad9c0b08efa4df0762a
SHA1 e3ac400787b8141dfdd1589d00e6d928ff42553f
SHA256 b56aef8705f96da5d9b0338a7e3cb2fe08533cb816e944d2a66f84c59aa72348
SHA3 6c5140e24f88444be59a294497100d71891d96876302f1dd1e13de666fbe150b

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x609
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.68833
Detected Filetype PNG graphic file
MD5 5fd2881f62a3eddec21f3a83e60f1c12
SHA1 01e34ae6d960fa7904ddc2c04d9e1cd68de968ea
SHA256 82c8d3a3a2f9fdf02513c3689640cb1b82c409ab1368e9f885cb7bf02626aba9
SHA3 a3cf88966e7d732c0f6dd3c3f51b15e4180a1573d9cc2bceedae0ca562ed23fb

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xf9a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.81864
Detected Filetype PNG graphic file
MD5 46d30bdb072f589928aaf2583e454cd3
SHA1 6752a9076a35d0017ff1794633f84d84dcf1100d
SHA256 e45f277f7b68d403f33fcd632c093552ef5c32da0763cb9ccb51a07962f3d46e
SHA3 f205975c0cda80ef9ba70a6ab80570c84dcc04d7498d0662ffb0d2ae4cb0a31d

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1718
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.82012
Detected Filetype PNG graphic file
MD5 c83a1936ffc77f939b57d29fb65ba186
SHA1 f4708328151310f7077078ff59da686c32ff6152
SHA256 498526879bccd21fab0aec896dd33ef56cf21e62cd73798d52a3b774226270b0
SHA3 7585ce9de3a7c49a5f9c0921b8f6a188b819e1cde793c8829d82899471d974f8

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x587d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.97406
Detected Filetype PNG graphic file
MD5 d404287f8ecdca949230e49b1353a89a
SHA1 3db9b0ebd8056ace287717b146e9cb02400d5f49
SHA256 6f4f29eb9715bfd9d2bedcc81a074d075559e5c0f012791e8230217309ce9fb5
SHA3 14a23a064e43453271a4f9d1749478298a3d7f528cd544d279e84382468f68d9

32512

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.7631
Detected Filetype Icon file
MD5 2701bb73bc11bf4ee05412ed6e438af2
SHA1 e9a974145072f5e459f51ae19ee774cd5243ddb9
SHA256 f9a2dc3299c31daa514df2cfdad0bd985b0f3109bf4e0965aa6816d96c693e1c
SHA3 f30a652ba417b839240e14f150f2bc5aa03003548d375cb826b960e418364f09

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x1f0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.10492
MD5 67eefe9a7ee188e57dcb6bd291ead8b2
SHA1 0574b29016bb0ed28302d46419ac1211db5e103a
SHA256 761c21608cf2adff212adc9ffae3c51b9e54cacb8e62f19b50b414a0773cc356
SHA3 353ee44d36a49e8dcd4030f4dcf6fcdd8f183fcce149830164af2496a10ce6b4

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x14e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.96056
MD5 01e4c8c046a47771f13cd120b53303e7
SHA1 2a4224d31c916a5cff4f2636a3cb47fdd84a5cc9
SHA256 b1cb832f790c153aa0e9a66f76e75460263cf1d41971d2dbcc9a4d87ec18b7d8
SHA3 680120ec819e7ba66519d9a8a3e446973c4cb28aa0146c91cceaa8c8fadc90ae

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 0.1.0.0
ProductVersion 0.1.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
CompanyName gravitlauncher
FileDescription prestarter
FileVersion (#2) 0.1.0
ProductName prestarter
ProductVersion (#2) 0.1.0
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2025-Dec-14 11:35:20
Version 0.0
SizeofData 39
AddressOfRawData 0x47a0f4
PointerToRawData 0x4790f4
Referenced File Prestarter.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2025-Dec-14 11:35:20
Version 0.0
SizeofData 20
AddressOfRawData 0x47a11c
PointerToRawData 0x47911c

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2025-Dec-14 11:35:20
Version 0.0
SizeofData 1068
AddressOfRawData 0x47a130
PointerToRawData 0x479130

TLS Callbacks

StartAddressOfRawData 0x14047a5a8
EndAddressOfRawData 0x14047a744
AddressOfIndex 0x14048ac5c
AddressOfCallbacks 0x140337d48
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks 0x000000014026BD00

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140488780

RICH Header

XOR Key 0x95669cf5
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 16
ASM objects (34918) 9
C objects (34918) 13
C++ objects (34918) 47
Imports (33140) 5
C objects (35207) 8
Total imports 396
Unmarked objects (#2) 55
Resource objects (35207) 1
Linker (35207) 1

Errors