5e27cf43733f9784b4c0ca73135e562f630269bf725dc740cf55d70ca288f24d

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-May-08 13:20:13
Detected languages English - United States
Debug artifacts c:\Users\bos\Desktop\PROJECT X MENU\examples\example_win32_directx11\Release\example_win32_directx11.pdb

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • procexp.exe
  • procmon.exe
  • wireshark.exe
Contains references to debugging or reversing tools:
  • ida.exe
  • ida64.exe
  • ollydbg.exe
  • windbg.exe
  • x32dbg.exe
  • x64dbg.exe
Looks for VMWare presence:
  • VMware
  • vmmouse
  • vmtools
  • vmware
Looks for VirtualBox presence:
  • SOFTWARE\Oracle\VirtualBox Guest Additions
  • VBoxGuest
  • vboxservice
  • vboxtray
Looks for Qemu presence:
  • qemu
May have dropper capabilities:
  • CurrentControlSet\Services
Contains domain names:
  • example.com
  • github.com
  • http://www.swisstypefaces.com
  • http://www.swisstypefaces.com/licensing/#retail-font-software-licence
  • http://www.swisstypefaces.com/retail-license.html
  • https://curl.se
  • https://github.com
  • swisstypefaces.com
  • www.swisstypefaces.com
Info Libraries used to perform cryptographic operations: Microsoft's Cryptography API
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • CreateToolhelp32Snapshot
  • CheckRemoteDebuggerPresent
Can access the registry:
  • RegOpenKeyExA
  • RegQueryValueExA
  • RegCloseKey
Possibly launches other programs:
  • CreateProcessA
  • ShellExecuteW
  • ShellExecuteA
Uses Microsoft's cryptographic API:
  • CryptStringToBinaryA
  • CryptQueryObject
  • CryptDecodeObjectEx
  • CryptDestroyKey
  • CryptReleaseContext
  • CryptGetHashParam
  • CryptDestroyHash
  • CryptHashData
  • CryptCreateHash
  • CryptAcquireContextW
  • CryptAcquireContextA
  • CryptGenRandom
  • CryptImportKey
  • CryptEncrypt
Can create temporary files:
  • GetTempPathA
  • CreateFileA
  • CreateFileW
Leverages the raw socket API to access the Internet:
  • gethostname
  • ioctlsocket
  • sendto
  • recvfrom
  • freeaddrinfo
  • getaddrinfo
  • listen
  • htonl
  • accept
  • select
  • __WSAFDIsSet
  • WSACleanup
  • WSAStartup
  • WSAIoctl
  • WSASetLastError
  • socket
  • setsockopt
  • ntohs
  • htons
  • getsockopt
  • getsockname
  • getpeername
  • connect
  • bind
  • recv
  • WSAGetLastError
  • closesocket
  • WSAWaitForMultipleEvents
  • WSAResetEvent
  • WSAEventSelect
  • WSAEnumNetworkEvents
  • WSACreateEvent
  • WSACloseEvent
  • send
Manipulates other processes:
  • Process32NextW
  • Process32FirstW
Reads the contents of the clipboard:
  • GetClipboardData
Interacts with the certificate store:
  • CertOpenStore
  • CertAddCertificateContextToStore
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 024d7ea5ee4ed4bff120f8e02795bc54
SHA1 a7b9af61782a0d743affa969b4555eee0f7df639
SHA256 5e27cf43733f9784b4c0ca73135e562f630269bf725dc740cf55d70ca288f24d
SHA3 321b535eda701c1a96e28d98c89b83cfd8d7d78fcd4497d22aa6bc93030ccb7d
SSDeep 98304:M28dqkZ8kxZedVVx14p2THizlb0FGAtI90Sm4JTcufC78l8ddr1hFIsBg8O:M28dqkim8VQ2DmQFGAqggq75V1vI6g
Imports Hash a5efd8b6091d06791a7609fb191bbbf2

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x110

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2026-May-08 13:20:13
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xd6600
SizeOfInitializedData 0x5f0800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000000D472C (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x6ca000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 5cab1a353ef7dca4436a87d135e4d071
SHA1 57f430998596cf413e3d312ffced47928f721138
SHA256 5657d29f67340ea886226ec10c14ec1e43cedac367481de94d81b39ca37e4277
SHA3 947789eaf8670e1a55bc6b6083b84781dea8e89d9349be0b447697be04dac322
VirtualSize 0xd658b
VirtualAddress 0x1000
SizeOfRawData 0xd6600
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.49609

.rdata

MD5 3387e5972f2d88675e8b8537c730f839
SHA1 989e8d397f65555029cabe03a24de6a8a96e730c
SHA256 8e535f1e3976b0266d9c761cf727cff3080f310eaa7f4d3ce54b6ce2f9589d03
SHA3 b4c111a41540941fe43971ba48acd3d161e4c90b5833b01420b5670dbacbc226
VirtualSize 0x35d62
VirtualAddress 0xd8000
SizeOfRawData 0x35e00
PointerToRawData 0xd6a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.62555

.data

MD5 03a747106b793c711e4ecb0227573d95
SHA1 bba9be5ec8299cda55a21e157edc37f2df7590cd
SHA256 066042d0ec26932460dedf12a3ee23efbdf980316c55a535d35056905334396c
SHA3 847430859eb979f995aa178a5f2d71add254a841d41de9a298905dc248c2ee80
VirtualSize 0x5b0e08
VirtualAddress 0x10e000
SizeOfRawData 0x5b0000
PointerToRawData 0x10c800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.98928

.pdata

MD5 672956a1c6cbfd4cbe80447444994ca9
SHA1 33a1de3fd49e4d6506fd87985db9f677197c715d
SHA256 8d6d40e97194dea440f57f50ec21145e7aec83b5f417b3f336c8475e7f520d21
SHA3 40e7fd6ac509f099bfb8c93cfade54ee7295742470cce28c63025b5d39c4a77f
VirtualSize 0x8ce8
VirtualAddress 0x6bf000
SizeOfRawData 0x8e00
PointerToRawData 0x6bc800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.05497

.rsrc

MD5 45ec008f27c53627f92f3a3f9559c2a6
SHA1 2aab56ca8a0c2ce07362514b824dba798e2f3c54
SHA256 a0bdfb6bbaf067c161b5fd653db3ca51fda2502043a62f007f773f705bed601c
SHA3 7eee4d646ea2b95ede272230aa252226f940f1f001ec64f8125f658875380a37
VirtualSize 0x1e0
VirtualAddress 0x6c8000
SizeOfRawData 0x200
PointerToRawData 0x6c5600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.70236

.reloc

MD5 78b4656a1488ee4e1a0ab7582eeb4d19
SHA1 57666b213ac02a919df72254200db1d81f3d9a84
SHA256 b364c41ddd35a597e0b2acece383933d03459941be98e443941bb4e34bcba5b2
SHA3 822265d79908f32e0a5530d32a09a2f7e2b303eaa278247e4743ed05b45edd0d
VirtualSize 0x850
VirtualAddress 0x6c9000
SizeOfRawData 0xa00
PointerToRawData 0x6c5800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 4.9332

Imports

WS2_32.dll gethostname
ioctlsocket
sendto
recvfrom
freeaddrinfo
getaddrinfo
listen
htonl
accept
select
__WSAFDIsSet
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
recv
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
WLDAP32.dll #26
#27
#32
#33
#22
#79
#30
#200
#301
#143
#35
#46
#50
#45
#60
#211
#41
#217
CRYPT32.dll CertGetNameStringA
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertOpenStore
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
Normaliz.dll IdnToAscii
d3d11.dll D3D11CreateDeviceAndSwapChain
D3DCOMPILER_47.dll D3DCompile
KERNEL32.dll RtlVirtualUnwind
RtlCaptureContext
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
RtlLookupFunctionEntry
WakeAllConditionVariable
GetCurrentThreadId
UnhandledExceptionFilter
InitializeSListHead
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetFileInformationByHandleEx
GetModuleHandleW
AreFileApisANSI
GetFileAttributesExW
GetSystemTimeAsFileTime
GetStartupInfoW
SetFileInformationByHandle
MultiByteToWideChar
GlobalAlloc
GlobalLock
WideCharToMultiByte
GlobalUnlock
GetModuleHandleA
GetLocaleInfoA
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
VerSetConditionMask
FreeLibrary
QueryPerformanceCounter
WaitForSingleObject
Sleep
GetTempPathA
CloseHandle
CreateProcessA
GetComputerNameA
ReadFile
GetModuleFileNameA
GetCurrentProcess
CreateToolhelp32Snapshot
Process32NextW
CreateFileA
GetCurrentThread
Process32FirstW
Module32FirstW
GetThreadContext
GetCurrentProcessId
GetProcessHeap
Module32NextW
IsDebuggerPresent
CheckRemoteDebuggerPresent
GetLastError
SetLastError
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
SleepEx
GetSystemDirectoryA
GetTickCount
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
VerifyVersionInfoA
GetFileSizeEx
FindNextFileW
FindFirstFileExW
FindFirstFileW
FindClose
CreateFileW
CreateDirectoryW
GetLocaleInfoEx
FormatMessageA
SleepConditionVariableSRW
GlobalFree
LocalFree
USER32.dll DestroyWindow
CreateWindowExW
GetSystemMetrics
UnregisterClassW
RegisterClassExW
ShowWindow
DispatchMessageW
SetWindowLongA
MoveWindow
SetLayeredWindowAttributes
TranslateMessage
LoadIconW
PostQuitMessage
UpdateWindow
GetKeyState
GetWindowRect
GetMessageExtraInfo
DefWindowProcW
ScreenToClient
GetCapture
ClientToScreen
TrackMouseEvent
GetKeyboardLayout
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
IsWindowUnicode
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetWindowLongW
PeekMessageW
ADVAPI32.dll CryptDestroyKey
CryptReleaseContext
CryptGetHashParam
RegOpenKeyExA
CryptDestroyHash
CryptHashData
CryptCreateHash
RegQueryValueExA
CryptAcquireContextW
RegCloseKey
CryptAcquireContextA
CryptGenRandom
CryptImportKey
CryptEncrypt
SHELL32.dll ShellExecuteW
ShellExecuteA
MSVCP140.dll ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
_Cnd_broadcast
_Thrd_join
_Thrd_id
_Mtx_lock
?_Syserror_map@std@@YAPEBDH@Z
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Winerror_map@std@@YAHH@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
_Mtx_unlock
_Query_perf_frequency
?_Xbad_function_call@std@@YAXXZ
_Query_perf_counter
?_Xout_of_range@std@@YAXPEBD@Z
?_Id_cnt@id@locale@std@@0HA
?_Xbad_alloc@std@@YAXXZ
?_Xlength_error@std@@YAXPEBD@Z
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Throw_Cpp_error@std@@YAXH@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
IMM32.dll ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ImmSetCandidateWindow
dwmapi.dll DwmExtendFrameIntoClientArea
IPHLPAPI.DLL GetAdaptersInfo
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll _CxxThrowException
__current_exception_context
__current_exception
__C_specific_handler
memchr
memcmp
memmove
strrchr
memset
memcpy
__std_terminate
__std_exception_destroy
__std_exception_copy
strstr
strchr
api-ms-win-crt-stdio-l1-1-0.dll fputs
_set_fmode
fgets
ftell
__acrt_iob_func
feof
__p__commode
fflush
_get_stream_buffer_pointers
_fseeki64
fsetpos
ungetc
setvbuf
fgetpos
fclose
_close
_write
fgetc
__stdio_common_vsprintf_s
_lseeki64
fputc
_read
fseek
__stdio_common_vfprintf
fopen
fwrite
__stdio_common_vsscanf
fread
_wfopen
__stdio_common_vsprintf
_open
api-ms-win-crt-runtime-l1-1-0.dll _seh_filter_exe
_get_narrow_winmain_command_line
_initterm
_initterm_e
exit
_exit
__sys_nerr
_c_exit
_register_thread_local_exe_atexit_callback
_cexit
_invoke_watson
_wassert
_crt_atexit
_beginthreadex
terminate
_getpid
__sys_errlist
abort
_errno
_register_onexit_function
_initialize_onexit_table
_configure_narrow_argv
_set_app_type
_initialize_narrow_environment
api-ms-win-crt-utility-l1-1-0.dll qsort
api-ms-win-crt-string-l1-1-0.dll strncpy
strcmp
toupper
strncmp
_strdup
strpbrk
strspn
tolower
isupper
strcspn
api-ms-win-crt-heap-l1-1-0.dll calloc
malloc
_callnewh
free
_set_new_mode
realloc
api-ms-win-crt-convert-l1-1-0.dll wcstombs
strtoll
strtod
strtoull
strtol
strtoul
atoi
api-ms-win-crt-filesystem-l1-1-0.dll _unlock_file
_access
_unlink
_stat64
_fstat64
_lock_file
api-ms-win-crt-time-l1-1-0.dll _time64
strftime
clock
_gmtime64
api-ms-win-crt-math-l1-1-0.dll ceilf
cosf
acosf
sqrtf
fmodf
_dclass
powf
sinf
_dsign
__setusermatherr
api-ms-win-crt-locale-l1-1-0.dll ___lc_codepage_func
localeconv
_configthreadlocale

Delayed Imports

1

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-May-08 13:20:13
Version 0.0
SizeofData 129
AddressOfRawData 0xfd20c
PointerToRawData 0xfbc0c
Referenced File c:\Users\bos\Desktop\PROJECT X MENU\examples\example_win32_directx11\Release\example_win32_directx11.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2026-May-08 13:20:13
Version 0.0
SizeofData 20
AddressOfRawData 0xfd290
PointerToRawData 0xfbc90

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2026-May-08 13:20:13
Version 0.0
SizeofData 912
AddressOfRawData 0xfd2a4
PointerToRawData 0xfbca4

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2026-May-08 13:20:13
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

StartAddressOfRawData 0x1400fd658
EndAddressOfRawData 0x1400fd660
AddressOfIndex 0x1406be598
AddressOfCallbacks 0x1400d8d10
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x14010e080

RICH Header

XOR Key 0xf342cb2b
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 20
253 (35207) 5
ASM objects (35207) 4
C objects (35207) 10
C++ objects (35207) 34
Imports (35207) 6
Total imports 427
Imports (33145) 29
C objects (VS2019 Update 11 (16.11.0-3) compiler 30133) 113
C++ objects (LTCG) (35225) 11
Resource objects (35225) 1
Linker (35225) 1

Errors

Leave a comment

No comments yet.