8090aa6400865b20d601ae2ee2eaf514

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 1970-Jan-01 00:00:00

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: <h1>xss\x13
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 8090aa6400865b20d601ae2ee2eaf514
SHA1 8821ca3e740965400fe6cf5adeb04638c5d40f09
SHA256 92811db242fe609558398e4ac695e094ff95f2665497b07b584a4ebdc3bb498e
SHA3 7e22d41f3bd68a39269955763547d032605782aa871d0f534145ecefdb819c20
SSDeep 48:63wtF+AtWF8QCbIX/dBwnqlW6GmFrluPjvGVhTVh/mZ9uP:rtEAtK5tAOW3mFrl46b+ZcP
Imports Hash 23d85bea7aeda0891655ddb187ab0d45

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 3
TimeDateStamp 1970-Jan-01 00:00:00
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32+
LinkerVersion 6.0
SizeOfCode 0
SizeOfInitializedData 0
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000001440 (Section: <h1>xss\x13)
BaseOfCode 0x1000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x4000
SizeOfHeaders 0x200
Checksum 0x1a32
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

<h1>xss\x13

MD5 7ad344702f4cbea6ea086b15ee3e3b9c
SHA1 c52b14f3b87e9fbe0a2c4c67ebacbd976b1b95a4
SHA256 e1a4bd86641e48728d1336f2df6fc34effd251844e3d854bcb5ca99e2e2141d2
SHA3 f7eac5c4a7f46caec8037d35932b9a3dba8fbb3127f0c78f278faef41b982d7b
VirtualSize 0x798
VirtualAddress 0x1000
SizeOfRawData 0x800
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 4.54897

.data

MD5 5e1b75e14c83085c391a89f46bec724f
SHA1 de27516aace7549d307f6669ff949888455e7829
SHA256 86ade5f7dcda83d250f55b2674eec06e818e3af33939467b33177e0281ffa9e8
SHA3 bf99ee909428ed6e4ddc68152cfa41df742e4ffbb4715c09bad4d100f6668ff8
VirtualSize 0x4e0
VirtualAddress 0x2000
SizeOfRawData 0x600
PointerToRawData 0xa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.93684

.pdata

MD5 12cb4ca77ccdfdd953e8e189dd06895d
SHA1 550693b5af50c442e6fa57e7b224bbda59e4af08
SHA256 f40f937e697a33b0a331e583040b761776c1693e2433928aa082ac9dd1b3bcff
SHA3 36d5dd0e6b3be0f3b5ea21ab4463f461c05a3ff261fd0440b651e01cda80f0da
VirtualSize 0x3c
VirtualAddress 0x3000
SizeOfRawData 0x200
PointerToRawData 0x1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.538326

Imports

user32.dll PostQuitMessage
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
GetParent
GetDesktopWindow
GetWindowRect
SetWindowPos
gdi32.dll SetTextColor
SetBkMode
GetStockObject
msvcrt.dll memset
__set_app_type
_controlfp
exit
strstr
kernel32.dll GetCommandLineA
GetStartupInfoA
GetModuleHandleA

Delayed Imports

Version Info

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->