9e277d4ded05b0b8c0aa71afe08a9ed7d08b97486061cfd477069bc38553b2e6

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2024-Nov-24 09:07:02
Detected languages English - United States
Debug artifacts C:\Git Repositories\GWToolboxpp2\bin\RelWithDebInfo\GWToolbox.pdb
CompanyName gwdevhub
FileDescription Launcher for GWToolbox
FileVersion 
InternalName GWToolbox
LegalCopyright Guild Wars and all associated logos and designs are trademarks or registered trademarks of NCsoft Corporation. All other trademarks are the property of their respective owners.
OriginalFilename GWToolbox.exe
ProductName GWToolbox++ Launcher
ProductVersion 4.2

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
MASM/TASM - sig1(h)
Info Interesting strings found in the binary: Contains domain names:
  • api.github.com
  • example.com
  • github.com
  • https://api.github.com
  • https://api.github.com/repos/gwdevhub/GWToolboxpp/releases/latest
  • https://curl.se
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to AES
Uses known Diffie-Helman primes
Microsoft's Cryptography API
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryW
Code injection capabilities:
  • CreateRemoteThreadEx
  • VirtualAllocEx
  • OpenProcess
  • WriteProcessMemory
Can access the registry:
  • RegCreateKeyExW
  • RegDeleteKeyW
  • RegSetValueExW
  • RegGetValueW
  • RegCloseKey
Uses Microsoft's cryptographic API:
  • CryptAcquireContextW
  • CryptReleaseContext
  • CryptGetHashParam
  • CryptCreateHash
  • CryptHashData
  • CryptDestroyHash
  • CryptAcquireContextA
  • CryptGenRandom
  • CryptStringToBinaryW
  • CryptDecodeObjectEx
  • CryptQueryObject
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Leverages the raw socket API to access the Internet:
  • gethostname
  • ioctlsocket
  • sendto
  • recvfrom
  • freeaddrinfo
  • getaddrinfo
  • listen
  • htonl
  • select
  • __WSAFDIsSet
  • WSAIoctl
  • socket
  • setsockopt
  • recv
  • htons
  • getsockname
  • getpeername
  • connect
  • bind
  • accept
  • WSACleanup
  • WSAStartup
  • inet_ntop
  • WSASetLastError
  • ntohs
  • inet_pton
  • WSAGetLastError
  • closesocket
  • WSAWaitForMultipleEvents
  • WSASetEvent
  • WSAResetEvent
  • WSAEventSelect
  • WSAEnumNetworkEvents
  • WSACreateEvent
  • WSACloseEvent
  • send
  • getsockopt
  • gethostbyname
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
  • CheckTokenMembership
Enumerates local disk drives:
  • GetDriveTypeW
Manipulates other processes:
  • OpenProcess
  • ReadProcessMemory
  • WriteProcessMemory
Interacts with the certificate store:
  • CertOpenStore
  • CertAddCertificateContextToStore
  • CertOpenSystemStoreA
Suspicious VirusTotal score: 1/72 (Scanned on 2025-04-16 04:32:40) MaxSecure: Trojan.Malware.300983.susgen

Hashes

MD5 c5f342630e888b3e10dc76e308b9a2d0
SHA1 4302ea8f980c399e8a38c83a101d97fa5a86840b
SHA256 9e277d4ded05b0b8c0aa71afe08a9ed7d08b97486061cfd477069bc38553b2e6
SHA3 b3e9deb7b900e58051c911f78b3507a2406f0d30510f4270f884eadd7ef8d2cf
SSDeep 49152:p0g5AkdFUzImY1YzKHdYed6uY/g7IyPu1PkCDqwAedjRtK23lB4WEjN+S:2gtFUzo2zKWuY/g7IyPu1PB3lBM
Imports Hash 8e1205269caf8a1245e2f1c76b00dd6f

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x118

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 7
TimeDateStamp 2024-Nov-24 09:07:02
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 14.0
SizeOfCode 0x2eee00
SizeOfInitializedData 0xae800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000011EF (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x2f0000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x3a2000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 05ef2526e1b76dbcaf5c708937f22d60
SHA1 289aeac7a4b306dd4ece8f944a734c77f322ff20
SHA256 7b7b180350afe2068099abafe04e60ed0f9429780b95e28a286839e565fcc195
SHA3 e24c122f43f235791b205c62e618ea5f6d4ce33257247247422ea4686dcae16e
VirtualSize 0x2eecd7
VirtualAddress 0x1000
SizeOfRawData 0x2eee00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.86824

.rdata

MD5 ef3cdcb4ba1faced5346bedee2b90c2e
SHA1 ddc4da2afae42bfebdd468c516a951eb7553a2ae
SHA256 88d8ae41badff8ded68f4ed0f7a5f19e0308c9860866ff3ea3cf11f320b70f30
SHA3 483bb3c62068270fcfe0c03bfa3e61532842c1e2470fb5b5ec50a4093333eef9
VirtualSize 0x51fc2
VirtualAddress 0x2f0000
SizeOfRawData 0x52000
PointerToRawData 0x2ef200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.01335

.data

MD5 eff96b68a812473c8cc6baf1618a0e4e
SHA1 ae3967092c8eb607eb8366ff73a39a28c2886b30
SHA256 3b0f84a1bbefe6eda64a46cc8c86913a6611ac845a638662bfb6c07626c9c932
SHA3 015cc907650c65d2339e34a74c7763981ef8c5c94a30b04858162a34f480b7e1
VirtualSize 0x1075c
VirtualAddress 0x342000
SizeOfRawData 0x4400
PointerToRawData 0x341200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.49546

.idata

MD5 3a14cb0915777b9eb09e57fedca6b82b
SHA1 ba9260c9db3a6214ca589bee2b1f5beec68e3dff
SHA256 a87290233b69daf61f7bdd28056d8403bb9916e031cdbc492f3db3c6b486e29f
SHA3 8df12b6dd52661581de09292e69f4cd8b1bea28e0b0a28e41f20f37edd5e093e
VirtualSize 0x25b1
VirtualAddress 0x353000
SizeOfRawData 0x2600
PointerToRawData 0x345600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.82974

.00cfg

MD5 2133b2adf4a0ac9c9ec418e6c8b71dca
SHA1 094db2976dc1bf0a2fc529a2169312139d9e41b7
SHA256 30b9bc708f738a471853a9961017bc299598a29842e607f7b46a2b78d438d726
SHA3 75a57ecb6d555da8e579e72cba72ef02cb71f2511b237750c96cae95315a471b
VirtualSize 0x10e
VirtualAddress 0x356000
SizeOfRawData 0x200
PointerToRawData 0x347c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.110557

.rsrc

MD5 b46197f1a4b2d4c0cff40cdf259fbcc9
SHA1 e6c169f528729df32ace47b5c5a31b6fad9a0ed4
SHA256 9915a96f9ba34ca6cd4644ffd7798e1da95ef87f4e73bb26db7d88022db0ae8e
SHA3 f3fb3c3a28f86ba3b27b61659dc25183ccc70bc3b1268145c7ed363af3c92b61
VirtualSize 0x35453
VirtualAddress 0x357000
SizeOfRawData 0x35600
PointerToRawData 0x347e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.47811

.reloc

MD5 73bc2e5695aed1d10e9a4e97e0f3a4f8
SHA1 8f3f05bc2a8bfc6b321e87258110538ea8ef2053
SHA256 0388b38f6d451d1ce9972dfc74e4bdc8c9f2329fa789787e814301e785472222
SHA3 d28be4ba2617030c72ebf5c3be052b56bf3c74fb681807c7051bfd4ab638d6f8
VirtualSize 0x140b6
VirtualAddress 0x38d000
SizeOfRawData 0x14200
PointerToRawData 0x37d400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.19136

Imports

VERSION.dll GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
WS2_32.dll gethostname
ioctlsocket
sendto
recvfrom
freeaddrinfo
getaddrinfo
listen
htonl
select
__WSAFDIsSet
WSAIoctl
socket
setsockopt
recv
htons
getsockname
getpeername
connect
bind
accept
WSACleanup
WSAStartup
inet_ntop
WSASetLastError
ntohs
inet_pton
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSASetEvent
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
gethostbyname
bcrypt.dll BCryptGenRandom
ADVAPI32.dll RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegGetValueW
OpenProcessToken
AdjustTokenPrivileges
CheckTokenMembership
FreeSid
LookupPrivilegeValueW
RegCloseKey
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptAcquireContextA
CryptGenRandom
AllocateAndInitializeSid
CRYPT32.dll CertCloseStore
CertOpenStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CryptStringToBinaryW
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringW
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertOpenSystemStoreA
CertFreeCertificateContext
KERNEL32.dll LoadLibraryExW
GetModuleHandleExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateThread
ExitThread
ResumeThread
FreeLibraryAndExitThread
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
GetCurrentThread
HeapFree
HeapReAlloc
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
SetEndOfFile
GetTimeZoneInformation
SetConsoleCtrlHandler
OutputDebugStringW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
CloseHandle
GetLastError
WaitForSingleObject
GetExitCodeThread
CreateRemoteThreadEx
VirtualAllocEx
DeleteFileW
VirtualFreeEx
GetModuleHandleW
GetProcAddress
CreateFileW
GetFileSizeEx
GetProcessId
OpenProcess
ReadProcessMemory
QueryFullProcessImageNameW
K32EnumProcesses
K32EnumProcessModules
K32GetModuleBaseNameW
K32GetModuleInformation
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
ExitProcess
GetModuleFileNameW
SetEvent
CreateEventW
WriteFile
GetComputerNameW
Sleep
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SetLastError
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceFrequency
GetSystemDirectoryW
FreeLibrary
LoadLibraryW
SleepEx
QueryPerformanceCounter
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
MoveFileExW
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetCurrentProcessId
VerSetConditionMask
GetModuleHandleA
VerifyVersionInfoW
FindClose
FindFirstFileA
FindNextFileA
InitializeCriticalSection
PulseEvent
FormatMessageA
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
CloseThreadpoolWait
SetThreadpoolWait
CreateThreadpoolWait
CloseThreadpoolTimer
WaitForThreadpoolTimerCallbacks
SetThreadpoolTimer
CreateThreadpoolTimer
FreeLibraryWhenCallbackReturns
GetTickCount64
WriteConsoleW
HeapSize
ResetEvent
WriteProcessMemory
CreateEventA
GetSystemTimeAsFileTime
GetCurrentProcessorNumber
FlushProcessWriteBuffers
CreateSemaphoreExW
CreateEventExW
InitOnceExecuteOnce
LocalFree
GetLocaleInfoEx
SetCurrentDirectoryW
CreateDirectoryW
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetFileAttributesW
SetFileInformationByHandle
SetFileTime
GetTempPathW
AreFileApisANSI
DeviceIoControl
CreateDirectoryExW
CopyFileW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
TryAcquireSRWLockExclusive
GetCurrentThreadId
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
LCMapStringEx
USER32.dll SendMessageW
SetForegroundWindow
SystemParametersInfoW
LoadIconW
SetWindowLongW
GetWindowLongW
GetSysColorBrush
MsgWaitForMultipleObjects
ShowWindow
RegisterClassW
PeekMessageW
DefWindowProcW
TranslateMessage
GetClassNameW
EnumWindows
MessageBoxW
GetWindow
GetWindowThreadProcessId
GetTopWindow
SendMessageA
MessageBoxA
DestroyWindow
CreateWindowExW
DispatchMessageW
GDI32.dll GetStockObject
SetBkMode
CreateFontIndirectW
DeleteObject
SHELL32.dll SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
SHFileOperationW

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x2bcc8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.83242
MD5 b49938e97ecb4ea5ea47ce4cd51a213e
SHA1 7feb9a858e7d89cfc33661e1a41403234405ab50
SHA256 b56197cb666168e1217856493f36418740a8c15e19ac6410d075441eab9b91e4
SHA3 c6e263c1e40efebf42559905fc92388b4d74c82177a324bfad375e8589ef4952

101

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.26096
Detected Filetype Icon file
MD5 9482f8ad452cabf1a78967099c27e36b
SHA1 45cfc66fe32f604bb5bd5154c1448031ff6eb955
SHA256 3ca27a2afa2d6a06ffdc4fe9951c0198dc1e0a8b5de96cccdfee9df0acd66ae5
SHA3 eb1ca051c729c5b22ab214e36c733ee938c69c7550564c9cb1acc185185706e9

1 (#2)

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x408
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.32975
MD5 986e20864a13903e110c6093243fa4d8
SHA1 45bc5028607d9759952983bceeffe5b271d86f79
SHA256 0984186cdfbdef051c3e0bef57425eb01e1ac830af887c3e715f1b8585ac6be9
SHA3 a1572399cc33b5a76cb8a8718302f60852a2364eb05ccf8c814344d002ad3e54

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x27e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.06467
MD5 d875a3e09bd74a8f760449a19a351827
SHA1 870df3cd183e92816fb4f92427cafa686f946a33
SHA256 a148bb733a7a6233501d6e615bcd37bedb995c29670798088e6c9c325b4429c8
SHA3 782f36c3fdf8521b0f1ebd9c721ce82161d3bd77c965734f3fd2714a3113db23

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 4.2.0.0
ProductVersion 4.2.0.0
FileFlags (EMPTY)
FileOs (EMPTY)
FileType VFT_UNKNOWN
Language English - United States
CompanyName gwdevhub
FileDescription Launcher for GWToolbox
FileVersion (#2) 
InternalName GWToolbox
LegalCopyright Guild Wars and all associated logos and designs are trademarks or registered trademarks of NCsoft Corporation. All other trademarks are the property of their respective owners.
OriginalFilename GWToolbox.exe
ProductName GWToolbox++ Launcher
ProductVersion (#2) 4.2
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2024-Nov-24 09:07:02
Version 0.0
SizeofData 90
AddressOfRawData 0x3398e8
PointerToRawData 0x338ae8
Referenced File C:\Git Repositories\GWToolboxpp2\bin\RelWithDebInfo\GWToolbox.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2024-Nov-24 09:07:02
Version 0.0
SizeofData 20
AddressOfRawData 0x339944
PointerToRawData 0x338b44

TLS Callbacks

Load Configuration

Size 0xc0
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x743cc0
SEHandlerTable 0x7390ac
SEHandlerCount 386

RICH Header

XOR Key 0xba955a75
Unmarked objects 0
ASM objects (30795) 20
C++ objects (30795) 197
C objects (30795) 23
253 (34321) 7
ASM objects (34321) 25
C objects (34321) 19
C++ objects (34321) 82
C objects (34433) 167
Imports (30795) 19
Total imports 282
C++ objects (34433) 19
Resource objects (34433) 1
151 1
Linker (34433) 1

Errors

Leave a comment

No comments yet.