| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2024-Jul-26 21:23:15 |
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to CRC32
Uses constants related to MD5 |
| Suspicious | The PE is possibly packed. | Unusual section name found: .fptable |
| Info | The PE contains common functions which appear in legitimate applications. |
[!] The program may be hiding some of its imports:
|
| Suspicious | No VirusTotal score. | This file has never been scanned on VirusTotal. |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xf8 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 6 |
| TimeDateStamp | 2024-Jul-26 21:23:15 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x302a00 |
| SizeOfInitializedData | 0x99e00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00000000002A1DF0 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x180000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x3b2000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| VMProtectSDK64.dll |
VMProtectDecryptStringW
|
|---|---|
| ntdll.dll |
RtlPcToFileHeader
RtlUnwindEx RtlVirtualUnwind RtlLookupFunctionEntry RtlCaptureContext VerSetConditionMask RtlUnwind |
| USER32.dll |
LoadCursorA
MonitorFromWindow ReleaseDC GetDC SetProcessDPIAware GetKeyboardLayout GetKeyState GetMessageExtraInfo IsWindowUnicode ReleaseCapture SetCapture GetCapture OpenClipboard TrackMouseEvent SetCursor ScreenToClient GetCursorPos SetCursorPos ClientToScreen GetForegroundWindow GetClientRect SetClipboardData EmptyClipboard CloseClipboard GetClipboardData |
| KERNEL32.dll |
SetEndOfFile
HeapSize CreateFileW GetTimeZoneInformation HeapReAlloc GetProcessHeap GetCommandLineW GetCommandLineA GetOEMCP GetACP IsValidCodePage FindNextFileW FindFirstFileExW FindClose OutputDebugStringW FlushFileBuffers ReadConsoleW SetFilePointerEx GetFileSizeEx GetConsoleMode GetConsoleOutputCP WriteFile EnumSystemLocalesW GetUserDefaultLCID IsValidLocale GetLocaleInfoW LCMapStringW CompareStringW GetTimeFormatW GetDateFormatW VirtualProtect GetCurrentProcessId MultiByteToWideChar GlobalLock WideCharToMultiByte GlobalUnlock GlobalAlloc GlobalFree QueryPerformanceFrequency QueryPerformanceCounter LoadLibraryA GetProcAddress FreeLibrary GetLocaleInfoA GetModuleHandleA AllocConsole CreateFileA SetStdHandle ReleaseSRWLockExclusive AcquireSRWLockExclusive WakeAllConditionVariable SleepConditionVariableSRW IsDebuggerPresent UnhandledExceptionFilter SetUnhandledExceptionFilter GetStartupInfoW IsProcessorFeaturePresent GetModuleHandleW GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead TryAcquireSRWLockExclusive CloseHandle WaitForSingleObjectEx GetExitCodeThread EncodePointer DecodePointer EnterCriticalSection LeaveCriticalSection InitializeCriticalSectionEx DeleteCriticalSection GetLocaleInfoEx LCMapStringEx GetStringTypeW CompareStringEx GetCPInfo FlsFree SetEnvironmentVariableW FreeEnvironmentStringsW RaiseException InterlockedFlushSList GetLastError SetLastError InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree LoadLibraryExW GetCurrentProcess TerminateProcess CreateThread ExitThread FreeLibraryAndExitThread GetModuleHandleExW GetStdHandle GetFileType GetModuleFileNameW WriteConsoleW ReadFile ExitProcess HeapAlloc HeapFree FlsAlloc FlsGetValue FlsSetValue GetEnvironmentStringsW |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2024-Jul-26 21:23:15 |
| Version | 0.0 |
| SizeofData | 968 |
| AddressOfRawData | 0x340f14 |
| PointerToRawData | 0x33fd14 |
| StartAddressOfRawData | 0x180341328 |
|---|---|
| EndAddressOfRawData | 0x180341330 |
| AddressOfIndex | 0x18039310c |
| AddressOfCallbacks | 0x180304650 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_4BYTES
|
| Callbacks | (EMPTY) |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x180381700 |
| XOR Key | 0x45b97426 |
|---|---|
| Unmarked objects | 0 |
| C++ objects (33136) | 182 |
| C objects (33136) | 32 |
| ASM objects (33136) | 23 |
| Imports (33136) | 6 |
| ASM objects (33731) | 10 |
| C objects (33731) | 15 |
| C++ objects (33731) | 90 |
| Imports (VS2015 UPD3.1 build 24215) | 3 |
| Total imports | 169 |
| Unmarked objects (#2) | 14 |
| Linker (33812) | 1 |
No comments yet.