614ec4c94c62b9b415def9fccfe73d2829fb69e7ba339c2a5f88ce9e95c79783

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2025-Mar-25 13:29:55
Detected languages English - United States
Debug artifacts C:\program1\repos\projects\TestGenCode\x64\Debug\TestGenCode.pdb

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Info Interesting strings found in the binary: Contains domain names:
  • RetroUSB.com
  • github.com
  • raylib.com
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to RC5 or RC6
Suspicious The PE is possibly packed. Unusual section name found: .nv_fatb
Unusual section name found: .nvFatBi
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • LoadLibraryExW
  • LoadLibraryExA
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Possibly launches other programs:
  • CreateProcessA
  • CreateProcessW
  • system
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Reads the contents of the clipboard:
  • GetClipboardData
Safe VirusTotal score: 0/65 (Scanned on 2025-06-09 05:01:34) All the AVs think this file is safe.

Hashes

MD5 b5ce415b7eb421740011f0e978f99ae2
SHA1 8da834f023ab64d930c7a3c1d9731bbc48109b70
SHA256 614ec4c94c62b9b415def9fccfe73d2829fb69e7ba339c2a5f88ce9e95c79783
SHA3 515a10c85516c9c25012c81eeef886501d241608a5257d4e96edf629d68c5aa0
SSDeep 24576:6ZL/3Jr4YBQOnbKeGVKoWxoo4Q/gteOKogx8WnvAOcQ3w8X:GQe/G1Wx6hKogjvAODg8
Imports Hash 84970243a6872dcab3e1e5bd4db83e1f

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x118

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 11
TimeDateStamp 2025-Mar-25 13:29:55
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x158c00
SizeOfInitializedData 0xa0a00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000003512 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x200000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 1ed486ac8a356914392d73ecd937be46
SHA1 731386d8696be5286a5fc01e0de313ab958162ff
SHA256 34f065c7ade9674757a3afd92f341c332bd7b188eb560e90ee36b85ee0f7bcd9
SHA3 f8b5e5702912b0f8f18eff766c4fcbee62a9f2646807f571f50aa77436787012
VirtualSize 0x158b3e
VirtualAddress 0x1000
SizeOfRawData 0x158c00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.67027

.rdata

MD5 f1b535f4b8e4066d1390053c14080db8
SHA1 dc9cecefe7a00dbdd92804d4585c549b3258ed07
SHA256 d0a14977a86261a48c62f9106409095fb5224ef2865ff3088716d67375d88550
SHA3 047a7ec3a45f7582687037a5bcf662072e255fbc940201803230717a8c2c607d
VirtualSize 0x60f6c
VirtualAddress 0x15a000
SizeOfRawData 0x61000
PointerToRawData 0x159000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.98026

.data

MD5 6f0431d73a026d76d6642fc86a6b66cc
SHA1 15a624cf84c7065f39395a3f138e5e424fe80f7a
SHA256 d87073ca9cb615dd58a06f97d6604327069d90ea5d5317bb61f84f723a105e6e
SHA3 73b5ff97a839b3cbfee7bd09e6e17629be4b9a678489368f1ac07ff8ebf05cf6
VirtualSize 0x18931
VirtualAddress 0x1bb000
SizeOfRawData 0x3e00
PointerToRawData 0x1ba000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.59209

.pdata

MD5 7033a965967bf8fd999d2c7c44fed491
SHA1 f8b8c863d4d6b752bafe18ad82535e1d21f84fcb
SHA256 d1903823c837c3cc0fd24a0b22165e36c24c66d87d7b3f29c12b99a69fc193ef
SHA3 a1ff90974a07465cdbddfddc38bee8037f2893c69bd7df91ed68a8d32c7b0a09
VirtualSize 0xd428
VirtualAddress 0x1d4000
SizeOfRawData 0xd600
PointerToRawData 0x1bde00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.76214

.idata

MD5 1b34515262fb5461c56650228fc8d90e
SHA1 52562001d567b83bb2ead82914a1071af726340e
SHA256 306a4e201fef867581a97d760475a6e7d8b986daebca41a190b28e972d951259
SHA3 f72d6940fb666020ee9bde6bb74da76c2311e5fa5c2d0415a68718fbbdc267d1
VirtualSize 0x3f5d
VirtualAddress 0x1e2000
SizeOfRawData 0x4000
PointerToRawData 0x1cb400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.97852

.nv_fatb

MD5 d9d2807e8188ec348d3a484e0a9dc26d
SHA1 4e8486c2d74a5384bcb5cae4be392ae4e76099bc
SHA256 ad0f52c01c2bfd41e9c10fb7650bbb0ff9ae6163454d8c738212c8917ad7b7b4
SHA3 d6071dee333bd198914ac9f3ebb55d4b3b12797cb5afb1d1b5b9cc0874141372
VirtualSize 0x102a0
VirtualAddress 0x1e6000
SizeOfRawData 0x10400
PointerToRawData 0x1cf400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.76985

.nvFatBi

MD5 a63885d53f704810915b311800161b32
SHA1 0281d19e7f180565971ff3e37833dd69d7664ca9
SHA256 d37cfa1c2dfc30d2ff3f9a904194c1fffc6504d700920592ade22a7b34bd1f44
SHA3 708abfa9bee0860ec4076dce83c406d7a5bb1911b43af4022ad4329202c4f1b9
VirtualSize 0x11c
VirtualAddress 0x1f7000
SizeOfRawData 0x200
PointerToRawData 0x1df800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.179433

.tls

MD5 a162f87d777e2631927c2ead8ba75cf1
SHA1 56db47a26a1651682e783a02e5123f76d6effd92
SHA256 e319082c23faa07865238e06844382d181ad3cdab44bcfaea7836fd601dba857
SHA3 c5cf29fb7789893f026878acc951f9121f1e0e2cc6f6ca2788a0eb5e01a527f6
VirtualSize 0x2534
VirtualAddress 0x1f8000
SizeOfRawData 0x2600
PointerToRawData 0x1dfa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0

.00cfg

MD5 16a0779d0ed77a7e80a8a5e3cba958fa
SHA1 5d60895b1d5869513e898564b579bdf8b7ed315a
SHA256 79eee32ced21599d83fa2934e761f75ae26b600f85035a726edc8263de3d3f4a
SHA3 72616bdf570088f7d556ae270ee22e1fbc7d2eae0f9a4f3b0864c41afb348dbc
VirtualSize 0x175
VirtualAddress 0x1fb000
SizeOfRawData 0x200
PointerToRawData 0x1e2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.431939

.rsrc

MD5 068b978de063fc9df8b0cade3eaead76
SHA1 1a97b5f89b535fb607a18946a189f5f48f121b72
SHA256 37dac2363ea81738070a306174967bd8d274d31eca70270378cbe353ca5dd30f
SHA3 1b274677746136a3d1e67f8493cf99e18c77ad752f51f74b785ee49e168e844c
VirtualSize 0x43c
VirtualAddress 0x1fc000
SizeOfRawData 0x600
PointerToRawData 0x1e2200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.14297

.reloc

MD5 8debec373fd03838fcc2c4193befde93
SHA1 e919f17a72887e1a0df357d364ceb3ef4c295c78
SHA256 3e70caef0236a82aa12b37885169e741fa57aa0cdb8d6a060554201e965e0e66
SHA3 e055cc2ec60566a68ed452a78a54d27deb3bc2da573f270ced2d60c4f0502c80
VirtualSize 0x2402
VirtualAddress 0x1fd000
SizeOfRawData 0x2600
PointerToRawData 0x1e2800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 2.68178

Imports

KERNEL32.dll UnlockFileEx
CloseHandle
GetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventA
Sleep
WaitForMultipleObjects
GetCurrentProcess
GetCurrentProcessId
SwitchToThread
GetCurrentThread
GetCurrentThreadId
TlsAlloc
TlsGetValue
LockFileEx
TlsFree
GlobalMemoryStatusEx
GetSystemInfo
GetLocalTime
GetNativeSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
VirtualQuery
GetLargePageMinimum
FreeLibraryAndExitThread
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleExA
LoadLibraryA
GetProcessAffinityMask
SetThreadAffinityMask
CreateSemaphoreA
CreateFileMappingA
CreateFileMappingNumaA
GetComputerNameA
GetNumaNodeProcessorMask
VerSetConditionMask
CreateFileW
GetFileAttributesW
GetFullPathNameW
SetLastError
CreateProcessA
CreateProcessW
GetSystemDirectoryW
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
LocalAlloc
LocalFree
VerifyVersionInfoW
GlobalSize
GlobalLock
GlobalUnlock
GetStartupInfoW
GetModuleHandleExW
RemoveDirectoryA
GetFileAttributesExA
FindNextFileA
FindFirstFileA
FindClose
DeleteFileA
CreateDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetEnvironmentVariableA
LoadLibraryExA
GetProcAddress
TlsSetValue
FreeLibrary
GetProcessHeap
InitializeSListHead
GetSystemTimeAsFileTime
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
MultiByteToWideChar
FormatMessageW
SetThreadExecutionState
GlobalFree
GlobalAlloc
WideCharToMultiByte
WINMM.dll timeEndPeriod
timeBeginPeriod
VCRUNTIME140D.dll strstr
__vcrt_GetModuleFileNameW
__std_type_info_destroy_list
__C_specific_handler_noexcept
__current_exception_context
__current_exception
__C_specific_handler
memmove
__vcrt_LoadLibraryExW
strrchr
strchr
wcsstr
wcsrchr
memset
memcmp
memcpy
__vcrt_GetModuleHandleW
ucrtbased.dll acos
ceil
fmod
exit
strcspn
strspn
strtok
strtol
strtoul
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_cexit
_CrtDbgReport
_CrtDbgReportW
_seh_filter_exe
_set_app_type
__setusermatherr
_get_initial_narrow_environment
_initterm
_initterm_e
_exit
_set_fmode
__p___argc
__p___argv
qsort
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
terminate
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
wcscpy_s
pow
log2f
expm1f
exp2f
sqrt
cos
sin
fmaxf
fmin
fminf
fabs
_time64
strlen
atoi
rand
srand
llabs
labs
abs
free
calloc
__stdio_common_vfprintf
ungetc
fopen_s
__acrt_iob_func
hypot
fmax
tan
strcmp
log
floor
_mkdir
_chdir
_getcwd
_findnext64i32
_findfirst64i32
_findclose
_access
_stat64i32
round
strpbrk
__stdio_common_vsscanf
fgets
system
_errno
_strnicmp
_wcsnicmp
_wcsicmp
wcstok
isdigit
isalpha
_beginthreadex
realloc
log1pf
strncat
ftell
_fileno
fgetc
fflush
ferror
feof
_get_osfhandle
strncpy
strncmp
__stdio_common_vsprintf
fwrite
fseek
fread
fopen
fclose
_hypotf
_fdsign
_ldsign
_dsign
fmodf
floorf
ceilf
sqrtf
powf
modff
log10f
logf
expf
tanhf
sinhf
coshf
tanf
sinf
cosf
atan2f
atanf
asinf
acosf
fmaf
nextafterf
copysignf
tgammaf
lgammaf
erfcf
erff
remquof
remainderf
cbrtf
cbrt
fdimf
truncf
nearbyintf
llrintf
lrintf
rintf
llroundf
lroundf
roundf
frexp
scalblnf
ilogbf
logbf
ldexp
atanhf
asinhf
_c_exit
acoshf
malloc
USER32.dll RemovePropW
OpenClipboard
CloseClipboard
GetClipboardData
TrackMouseEvent
TranslateMessage
DispatchMessageW
PeekMessageW
GetMessageTime
SendMessageW
RegisterDeviceNotificationW
UnregisterDeviceNotification
PostMessageW
WaitMessage
DefWindowProcW
UnregisterClassW
RegisterClassExW
GetRawInputDeviceList
RegisterRawInputDevices
GetRawInputDeviceInfoA
GetRawInputData
EnumDisplayMonitors
GetMonitorInfoW
MonitorFromWindow
SystemParametersInfoW
EnumDisplayDevicesW
EnumDisplaySettingsExW
EnumDisplaySettingsW
ChangeDisplaySettingsExW
CreateIconIndirect
LoadImageW
DestroyIcon
LoadCursorW
GetClassLongPtrW
SetWindowLongW
GetWindowLongW
PtInRect
OffsetRect
SetRect
ClipCursor
WindowFromPoint
ScreenToClient
ClientToScreen
GetCursorPos
SetCursor
SetCursorPos
AdjustWindowRectEx
GetWindowRect
GetClientRect
SetWindowTextW
CreateWindowExW
GetPropW
SetPropW
ReleaseDC
GetDC
SetForegroundWindow
GetSystemMetrics
MsgWaitForMultipleObjects
ReleaseCapture
SetCapture
MapVirtualKeyW
ToUnicode
GetKeyState
GetActiveWindow
SetFocus
EmptyClipboard
SetClipboardData
IsZoomed
BringWindowToTop
IsIconic
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
SetWindowPos
MoveWindow
FlashWindow
SetLayeredWindowAttributes
GetLayeredWindowAttributes
ShowWindow
DestroyWindow
GDI32.dll ChoosePixelFormat
CreateDCW
CreateRectRgn
DeleteDC
DeleteObject
DescribePixelFormat
GetDeviceCaps
SetPixelFormat
CreateDIBSection
GetDeviceGammaRamp
SetDeviceGammaRamp
SwapBuffers
CreateBitmap
SHELL32.dll DragAcceptFiles
DragFinish
DragQueryPoint
DragQueryFileW

Delayed Imports

NvOptimusEnablementCuda

Ordinal 1
Address 0x1bb02c

1

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2025-Mar-24 12:55:53
Version 0.0
SizeofData 89
AddressOfRawData 0x1a35d0
PointerToRawData 0x1a25d0
Referenced File C:\program1\repos\projects\TestGenCode\x64\Debug\TestGenCode.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2025-Mar-24 12:55:53
Version 0.0
SizeofData 20
AddressOfRawData 0x1a362c
PointerToRawData 0x1a262c

TLS Callbacks

StartAddressOfRawData 0x1401f8000
EndAddressOfRawData 0x1401fa433
AddressOfIndex 0x1401d31e8
AddressOfCallbacks 0x14015ac90
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4096BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1401beac0

RICH Header

XOR Key 0x29f71d9f
Unmarked objects 0
Imports (34321) 2
ASM objects (34321) 4
C objects (34321) 10
C++ objects (34321) 26
C objects (34433) 6
Imports (33140) 13
Total imports 395
C objects (VS2015 build 23026) 1
C++ objects (VS2015 build 23026) 17
C++ objects (34808) 1
Exports (34808) 1
Resource objects (34808) 1
Linker (34808) 1

Errors

Leave a comment

No comments yet.