b19bcf79c1504f2717430a93b961448b

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2025-Dec-12 07:28:52
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
Debug artifacts instant_delay.pdb
CompanyName instantdelay
FileDescription InstantDelay
FileVersion 1.0.2
ProductName InstantDelay
ProductVersion 1.0.2

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: May have dropper capabilities:
  • CurrentVersion\Run
Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • 0www.entrust.net
  • GoDaddy.com
  • api.lemonsqueezy.com
  • birthpopuptypesapplyImagebeinguppernoteseveryshowsmeansextramatchtrackknownearlybegansuperpapernorthlearngivennamedendedTermspartsGroupbrandusingwomanfalsereadyaudiotakeswhile.com
  • developer.microsoft.com
  • entrust.net
  • fonts.googleapis.com
  • genretrucklooksValueFrame.net
  • github.com
  • googleapis.com
  • http://127.0.0.1
  • http://www.C
  • http://www.a
  • http://www.css
  • http://www.hortcut
  • http://www.icon
  • http://www.interpretation
  • http://www.language
  • http://www.style
  • http://www.text-decoration
  • http://www.w3.org
  • http://www.w3.org/2000/svg
  • http://www.w3.org/shortcut
  • http://www.wencodeURIComponent
  • http://www.years
  • https://api.lemonsqueezy.com
  • https://api.lemonsqueezy.com/v1/licenses/activateAcceptContent-Typesrc\license.rs
  • https://api.lemonsqueezy.com/v1/licenses/validate
  • https://developer.microsoft.com
  • https://developer.microsoft.com/en-us/microsoft-edge/webview2
  • https://docs.rs
  • https://fonts.googleapis.com
  • https://fonts.googleapis.com/css2?family
  • https://github.com
  • https://instantdelay.lemonsqueezy.com
  • https://instantdelay.lemonsqueezy.com/buy/b73e1b4d-d4bc-4a65-a913-b075d31f4cb5
  • https://www.World
  • https://www.recent
  • instantdelay.com
  • instantdelay.lemonsqueezy.com
  • lemonsqueezy.com
  • microsoft.com
  • openssl.org
  • thing.org
  • www.entrust.net
  • www.w3.org
Info Cryptographic algorithms detected in the binary: Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to RC5 or RC6
Suspicious The PE is possibly packed. Unusual section name found: .taubndl
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryExA
  • LoadLibraryW
  • LoadLibraryExW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
  • FindWindowW
Code injection capabilities (PowerLoader):
  • GetWindowLongW
  • FindWindowW
Can access the registry:
  • RegGetValueW
  • RegCreateKeyExW
  • RegDeleteValueW
  • RegSetValueExW
  • RegCloseKey
  • RegQueryValueExW
  • RegOpenKeyExW
Possibly launches other programs:
  • CreateProcessW
  • ShellExecuteW
Uses Windows's Native API:
  • NtCreateFile
  • NtOpenFile
  • NtDeviceIoControlFile
  • NtWriteFile
  • NtCancelIoFileEx
  • NtCreateNamedPipeFile
  • NtReadFile
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Uses functions commonly found in keyloggers:
  • GetAsyncKeyState
  • GetForegroundWindow
  • MapVirtualKeyW
Leverages the raw socket API to access the Internet:
  • shutdown
  • send
  • recv
  • freeaddrinfo
  • WSACleanup
  • WSAStartup
  • getaddrinfo
  • accept
  • socket
  • getsockopt
  • WSASend
  • listen
  • getsockname
  • WSAGetLastError
  • getpeername
  • bind
  • WSAIoctl
  • setsockopt
  • ioctlsocket
  • WSASocketW
  • closesocket
  • connect
Can take screenshots:
  • GetDC
  • FindWindowW
  • BitBlt
  • CreateCompatibleDC
Suspicious VirusTotal score: 2/70 (Scanned on 2026-01-25 11:42:08) Bkav: W64.AIDetectMalware
Trapmine: malicious.moderate.ml.score

Hashes

MD5 b19bcf79c1504f2717430a93b961448b
SHA1 19a7886303ee53e68f36a846c05c5d71f69ffb6a
SHA256 39334434c0ef4507c1d485b3127b78e311430f0d21ec50d940223b907eeaf719
SHA3 919cdd887ee05efe7b0b94f49b2f74c38722445d586a97fa89a30a98042c56fc
SSDeep 98304:DYeuWEX9k5axHlfbHNgiKOH3+jjN80l2K4XZBPGd8Z2t+b7pxrD1N+kR:Dnax7g2XJ/mVtMx6
Imports Hash e06244025b771d6974e7657a9283dbe7

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2025-Dec-12 07:28:52
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xa28e00
SizeOfInitializedData 0x423200
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000009F9820 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xe51000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 ab3514b6f20fa245f5022b17d4ff03a7
SHA1 5479b7186bb5cb00296aa53504990143485b747e
SHA256 16a1dc984e39bd39e51a2fca5b93ce051ce249d0e97533ba10b62691f0252f7f
SHA3 e28adca8c4bf2cfa72c6cab6b45c1b50c2045f10a2796661e119174645b58dcc
VirtualSize 0xa28d70
VirtualAddress 0x1000
SizeOfRawData 0xa28e00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.22076

.rdata

MD5 2d239441cc74978d894a7a155679ba1d
SHA1 53361ace63276f46a0179aa419054135095c75de
SHA256 53407c909ce63b3e657f4f221e5d6f55a00880d6a19681c793a4bbe062207e5c
SHA3 b0cef02bf21b1ad192322291fba675d5a22335e343595bc604c89542828e5e54
VirtualSize 0x39c024
VirtualAddress 0xa2a000
SizeOfRawData 0x39c200
PointerToRawData 0xa29200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.01533

.data

MD5 325f8c47eb630e3e6181cd1ed88bdc7c
SHA1 5525fdc7fb14e70d2d81afe216789c8189d719ed
SHA256 bf6ae12ea7c4a3fc5f7af16385be7bd3a80cb4967538cb9e592d5af0bbfc5a1e
SHA3 cc1e367bee4c53bbbff5acf5c028c4fc28a52eb7b5d30692ee0cf51a6e2365d2
VirtualSize 0x4318
VirtualAddress 0xdc7000
SizeOfRawData 0x1800
PointerToRawData 0xdc5400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 1.58284

.pdata

MD5 ba30888796bc7ba4a91f492a2a2f1f78
SHA1 7ae5cd42e929536201e2d6de50076e8fee0e69e3
SHA256 800ef4aa9f2301e7273f907abf1c790a5ed4f7bf0e8f308a375a89d5ae86af68
SHA3 e6961c5e02eea2f20b2315a6e853436afaa524ae69698802c18ea4cb78bf8faf
VirtualSize 0x74d0c
VirtualAddress 0xdcc000
SizeOfRawData 0x74e00
PointerToRawData 0xdc6c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.56806

.taubndl

MD5 d413d46cc086fa23ec275c5fd0b38bb4
SHA1 7a6ab081e408086ef9f722f751f9cf16d2901507
SHA256 564c25c22245b423683bf36813f6c433de2ec92a2faa7a327b3497c736575f29
SHA3 535fbf4f9f0f1955aba3ed9f6ff831c7a95c70bca5106ff6c45c5c25caafdc8c
VirtualSize 0x10
VirtualAddress 0xe41000
SizeOfRawData 0x200
PointerToRawData 0xe3ba00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.122276

.rsrc

MD5 496b79e21050e245b1e63d892084033b
SHA1 8386f2c896fd27b1b17b3ad14d2e3ef0e8f3820b
SHA256 af9929111e96a3dc3d4effc561a7a53d1b4ff79ce7596caa3e82566cba63401a
SHA3 8937d022414de30ee6d25c3f9edb1d14952da337db60e46fb685ba8dc1db07f9
VirtualSize 0x30a8
VirtualAddress 0xe42000
SizeOfRawData 0x3200
PointerToRawData 0xe3bc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.48339

.reloc

MD5 c47a50ce41c37c97e7506988ee0d1107
SHA1 bedc0c5a4cdeddda93a51d50fd9597e5e34e5f29
SHA256 b6d75e770cbfd6301f0340c658aa9116f31f4dd142a8bfcb22edd6656f5ce49c
SHA3 e5da12c6be86ee9ba2e004cf779a81dbb0d4b0b89c1bdf56f22fb0ced43e0910
VirtualSize 0xa900
VirtualAddress 0xe46000
SizeOfRawData 0xaa00
PointerToRawData 0xe3ee00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.44687

Imports

kernel32.dll TlsFree
CompareStringOrdinal
InitializeSListHead
GetExitCodeProcess
WaitForMultipleObjects
SwitchToThread
WaitForSingleObject
SetWaitableTimer
Sleep
GetSystemTimePreciseAsFileTime
TlsSetValue
SetLastError
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
AcquireSRWLockExclusive
GetCurrentThreadId
ReleaseSRWLockExclusive
ReleaseMutex
GetUserDefaultUILanguage
LCIDToLocaleName
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceFrequency
GetCommandLineW
GetEnvironmentVariableW
GetCurrentDirectoryW
RtlVirtualUnwind
GetProcessId
LoadLibraryA
GetProcAddress
GetCurrentProcess
IsWow64Process
RtlCaptureContext
AddVectoredExceptionHandler
TlsGetValue
SetEnvironmentVariableW
TlsAlloc
QueryPerformanceCounter
EncodePointer
LoadLibraryExA
WakeAllConditionVariable
RtlUnwindEx
GetModuleHandleW
GetLastError
RaiseException
GetCurrentThread
DeleteCriticalSection
HeapAlloc
RtlPcToFileHeader
CloseHandle
GetFileAttributesW
CreateProcessW
ReadFile
CancelIo
CreateEventW
ReadFileEx
WriteFileEx
CreateThread
IsProcessorFeaturePresent
GetFinalPathNameByHandleW
GetTempPathW
GetFileInformationByHandleEx
LoadLibraryW
GetModuleHandleA
MultiByteToWideChar
RtlLookupFunctionEntry
WaitForSingleObjectEx
GetCurrentProcessId
WideCharToMultiByte
HeapFree
GetModuleFileNameW
SetHandleInformation
SleepEx
ExitProcess
GetSystemDirectoryW
GetWindowsDirectoryW
DuplicateHandle
GetFileInformationByHandle
CreateFileW
GetFullPathNameW
CreateDirectoryW
CreateMutexA
WriteConsoleW
GetConsoleOutputCP
GetConsoleMode
GetStdHandle
SetFileCompletionNotificationModes
CreateIoCompletionPort
GetQueuedCompletionStatusEx
CreatePipe
FindClose
FindNextFileW
FindFirstFileExW
InitializeCriticalSectionAndSpinCount
SetFileInformationByHandle
DeleteFileW
CreateMutexW
PostQueuedCompletionStatus
TerminateProcess
GetOverlappedResult
CreateWaitableTimerExW
IsDebuggerPresent
GetSystemTimeAsFileTime
lstrlenW
SetThreadStackGuarantee
SleepConditionVariableSRW
GetSystemInfo
FormatMessageW
GetProcessHeap
FreeLibrary
LoadLibraryExW
OutputDebugStringW
OutputDebugStringA
advapi32.dll RegGetValueW
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
oleaut32.dll GetErrorInfo
SysStringLen
SysFreeString
SetErrorInfo
bcryptprimitives.dll ProcessPrng
ntdll.dll NtCreateFile
RtlNtStatusToDosError
RtlGetVersion
NtOpenFile
NtDeviceIoControlFile
NtWriteFile
NtCancelIoFileEx
NtCreateNamedPipeFile
NtReadFile
api-ms-win-core-synch-l1-2-0.dll WakeByAddressAll
WaitOnAddress
WakeByAddressSingle
shell32.dll SHGetKnownFolderPath
SHAppBarMessage
Shell_NotifyIconW
ShellExecuteW
Shell_NotifyIconGetRect
DragFinish
ShellExecuteExW
DragQueryFileW
ole32.dll CoInitializeEx
CoInitialize
RegisterDragDrop
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
RevokeDragDrop
CoCreateFreeThreadedMarshaler
OleInitialize
CoUninitialize
user32.dll GetWindowTextW
SetWindowTextW
ClipCursor
RedrawWindow
GetClipCursor
ShowCursor
ScreenToClient
MonitorFromRect
SetPropW
GetMenu
ToUnicodeEx
FindWindowExW
GetKeyboardLayout
RegisterWindowMessageA
GetClientRect
FillRect
ReleaseCapture
MapVirtualKeyExW
GetKeyState
GetAsyncKeyState
GetKeyboardState
DestroyIcon
CreateIcon
DrawTextW
GetWindowDC
OffsetRect
MapWindowPoints
GetMenuBarInfo
SetWindowLongW
EnableMenuItem
RemoveMenu
CreatePopupMenu
GetParent
SystemParametersInfoW
SetCapture
TrackMouseEvent
DestroyWindow
GetWindowLongW
CreateMenu
GetSystemMenu
IsProcessDPIAware
TrackPopupMenu
SetMenu
CheckMenuItem
PostQuitMessage
ShowWindow
SystemParametersInfoA
CreateAcceleratorTableW
DestroyAcceleratorTable
DrawMenuBar
SetMenuItemInfoW
DrawIconEx
ReleaseDC
GetDC
AppendMenuW
InsertMenuW
GetMenuItemInfoW
SetWindowRgn
RegisterClassW
DestroyMenu
EnumChildWindows
DispatchMessageA
GetMessageA
KillTimer
GetWindowTextLengthW
AdjustWindowRect
SetTimer
GetWindow
SetWindowDisplayAffinity
RegisterTouchWindow
IsWindow
AdjustWindowRectEx
UpdateWindow
InvalidateRect
SetParent
SetCursorPos
SendInput
SetForegroundWindow
GetForegroundWindow
GetWindowRect
GetActiveWindow
IsWindowEnabled
MonitorFromPoint
EnumDisplayMonitors
IsIconic
IsWindowVisible
EnableWindow
InvalidateRgn
GetWindowPlacement
SetWindowPlacement
ChangeDisplaySettingsExW
LoadCursorW
FlashWindowEx
MsgWaitForMultipleObjectsEx
DispatchMessageW
TranslateMessage
GetMessageW
GetUpdateRect
PeekMessageW
PostThreadMessageW
MapVirtualKeyW
ValidateRect
GetRawInputData
DefWindowProcW
GetWindowLongPtrW
SendMessageW
SetWindowLongPtrW
CreateWindowExW
RegisterClassExW
FindWindowW
TranslateAcceleratorW
RegisterRawInputDevices
SetWindowPos
PostMessageW
SetCursor
ClientToScreen
GetMonitorInfoW
MonitorFromWindow
GetCursorPos
GetSystemMetrics
CloseTouchInputHandle
GetTouchInputInfo
SetFocus
comctl32.dll TaskDialogIndirect
DefSubclassProc
SetWindowSubclass
RemoveWindowSubclass
gdi32.dll SetBkMode
CreateSolidBrush
CombineRgn
DeleteObject
SetTextColor
BitBlt
DeleteDC
SelectObject
CreateDIBSection
CreateCompatibleDC
GetDeviceCaps
CreateRectRgn
dwmapi.dll DwmGetWindowAttribute
DwmSetWindowAttribute
DwmEnableBlurBehindWindow
shlwapi.dll SHCreateMemStream
ws2_32.dll shutdown
send
recv
freeaddrinfo
WSACleanup
WSAStartup
getaddrinfo
accept
socket
getsockopt
WSASend
listen
getsockname
WSAGetLastError
getpeername
bind
WSAIoctl
setsockopt
ioctlsocket
WSASocketW
closesocket
connect
SHELL32.dll #155
SHOpenFolderAndSelectItems
#190
bcrypt.dll BCryptGenRandom
ADVAPI32.dll EventUnregister
EventWriteTransfer
EventSetInformation
EventRegister
SystemFunction036
api-ms-win-crt-math-l1-1-0.dll __setusermatherr
roundf
trunc
round
floor
pow
api-ms-win-crt-string-l1-1-0.dll strcmp
strcpy_s
wcsncmp
wcscmp
wcsncat
_wcsicmp
wcslen
strlen
api-ms-win-crt-convert-l1-1-0.dll _ultow_s
wcstol
_wtoi
api-ms-win-crt-runtime-l1-1-0.dll _initterm
exit
_exit
abort
__p___argc
__p___argv
_cexit
_c_exit
terminate
_get_initial_narrow_environment
_initialize_narrow_environment
_crt_atexit
_initialize_onexit_table
_configure_narrow_argv
_set_app_type
_seh_filter_exe
_register_onexit_function
_initterm_e
_register_thread_local_exe_atexit_callback
api-ms-win-crt-stdio-l1-1-0.dll __p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll _callnewh
_set_new_mode
free
calloc
malloc

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1c6
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.31557
Detected Filetype PNG graphic file
MD5 c5096656a1f8f16616ed526ab76bb40f
SHA1 f642d28f94a844068f70f54f4579d63d7a308fc1
SHA256 e3b272e6cc1a09c5b8bb8e71c43378267a32de228850ce26b7228be1cdd9494c
SHA3 dcea5da8a206d3679a7501a02036ea68675b43b3972a56508f035a7f37fdc12f

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x2ef
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.60929
Detected Filetype PNG graphic file
MD5 d2a58577104017ef3236fbaaa4876a6d
SHA1 0430e9f0873bd712f70d9177a91c2668db596972
SHA256 06a06f9073b8de6f63c42fd7f39522bdc8d84fefec86ff49901994f244303627
SHA3 a73131268af42d1b35173c673811515919e0c6bd96cf4b18bff89920d806e93c

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x3f7
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.69763
Detected Filetype PNG graphic file
MD5 c43c0bbf01101cc60fc31267b12f2ce4
SHA1 036c16fb5593c7c4b1af74821b89b9ebc97c300c
SHA256 71b392b29dbed06087a7ed9098c7db51ebdeb2d839b65b29965856d6216d1c90
SHA3 b840c4efe58fded2c911e65fcaac94c848505ef9ef0eb6e6f7f0e6247b88498e

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4ef
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.75942
Detected Filetype PNG graphic file
MD5 39da97c59f5aad32b049399358c6c7b5
SHA1 5e06bbf934ed1058228e6764bba58ded7320603e
SHA256 f152b0bcc9981884b14aced10c800d456527fc06ba8f625fffb57cd0cb370134
SHA3 7ea7d821c54b3034e2e806ecd76959e9590af4d6c5ac8bec651ab46f431aac6b

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x96e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.78169
Detected Filetype PNG graphic file
MD5 d49a28ee691c2b3402355851b876773d
SHA1 6631847cfc75a6b7900e021f71257ab8eeaea34f
SHA256 e2eb5728fbe6760ebbd93a06982cc05a20377239a3fb955d0d9fec1f5cb792e7
SHA3 8e20af424637a38d90f5cba2194bb63f283c2ef729dece7c1844df2375a41deb

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x13cf
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.75595
Detected Filetype PNG graphic file
MD5 640ebccb757f4eb293bc228611b63c84
SHA1 cbb8d4bba95429a8f7d7366d92a689c4141fd7af
SHA256 fe25c03280945c113778796ab37b61f2b5fb1b1909e10805bedb98e317af002f
SHA3 6dc10c519bafe7ac2dc48690c135cbeac929b8bda1a4c6c128363ca00a29f993

32512

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.72955
Detected Filetype Icon file
MD5 1c5c68f26155d8df72be7e526041d53a
SHA1 19b6fd33619cee31952a0949460688d7057bc7f7
SHA256 ac2c19d464a9575611b1eb997a8c49e87a8c04d752d57d984ffa2cd2b59f2349
SHA3 b9821a67bb502be71647ffb8c234f373e120dbcc62ffbf0277c90e6cad865ae6

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x1f4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.1397
MD5 000a7f5b3dc11f581aba179175064699
SHA1 155a54498d0e9362f349494f45bd1e00823245b4
SHA256 fea94a2c5c120c82a85d4a57b634b5d844132725e4a92cac8c307f2552780dbd
SHA3 6df63edcbb704c87b144ec2b1d14f49c006935adbc7a114b739deefc549659ae

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x14e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.96056
MD5 01e4c8c046a47771f13cd120b53303e7
SHA1 2a4224d31c916a5cff4f2636a3cb47fdd84a5cc9
SHA256 b1cb832f790c153aa0e9a66f76e75460263cf1d41971d2dbcc9a4d87ec18b7d8
SHA3 680120ec819e7ba66519d9a8a3e446973c4cb28aa0146c91cceaa8c8fadc90ae

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.2.0
ProductVersion 1.0.2.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
CompanyName instantdelay
FileDescription InstantDelay
FileVersion (#2) 1.0.2
ProductName InstantDelay
ProductVersion (#2) 1.0.2
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2025-Dec-12 07:28:52
Version 0.0
SizeofData 42
AddressOfRawData 0xbef974
PointerToRawData 0xbeeb74
Referenced File instant_delay.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2025-Dec-12 07:28:52
Version 0.0
SizeofData 20
AddressOfRawData 0xbef9a0
PointerToRawData 0xbeeba0

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2025-Dec-12 07:28:52
Version 0.0
SizeofData 1068
AddressOfRawData 0xbef9b4
PointerToRawData 0xbeebb4

TLS Callbacks

StartAddressOfRawData 0x140befe28
EndAddressOfRawData 0x140bf009c
AddressOfIndex 0x140dcabfc
AddressOfCallbacks 0x140a2acf8
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks 0x0000000140870190

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140dc8640

RICH Header

XOR Key 0x90b68ed1
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 14
ASM objects (35207) 9
C objects (35207) 13
C++ objects (35207) 47
Imports (30795) 7
Total imports 386
C objects (35222) 12
Unmarked objects (#2) 63
Resource objects (35222) 1
Linker (35222) 1

Errors