d74f426daadd86a4654be8e1faa6e975

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2016-Jun-14 01:20:01
Detected languages English - United States
Debug artifacts D:\A\_work\38\s\bin\obj\Windows_NT.x64.Release\src\jit\standalone\Release\clrjit.pdb
CompanyName Microsoft Corporation
FileDescription Microsoft .NET Runtime Just-In-Time Compiler
FileVersion 1.0.24214.01 built by: dlab-DDVSOWINAGE002. Commit Hash: abbb8f685929c7aeaa087dae46fedc1bc2af4b17
InternalName clrjit.dll
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename clrjit.dll
ProductName Microsoft® .NET Core
ProductVersion 1.0.24214.01 built by: dlab-DDVSOWINAGE002. Commit Hash: abbb8f685929c7aeaa087dae46fedc1bc2af4b17
Comments Flavor=Retail
PrivateBuild FX_VER_PRIVATEBUILD_STR

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryExW
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Info The PE is digitally signed. Signer: Microsoft Corporation
Issuer: Microsoft Code Signing PCA
Safe VirusTotal score: 0/65 (Scanned on 2019-03-27 17:20:50) All the AVs think this file is safe.

Hashes

MD5 d74f426daadd86a4654be8e1faa6e975
SHA1 5a2dcc6e22c41fa41fa20a9ec4e19741e17cb4ec
SHA256 309232ad3f20a813529c77cfc251ff96538b9e3c693b576d2dd7731709c87a36
SHA3 c69accf20027c18a430e8867b5504c28a23c186fe2975348b178816955109be5
SSDeep 24576:RuQ4s7NW2qjl/nVirp0c8+8ptx2k9mrNJZkM6qQ0aLX:EQZNWbl/Virp78+8ptx2kArbyM6qQ0aL
Imports Hash 1044803d99526fa42a04be5306dbdfbb

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x108

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2016-Jun-14 01:20:01
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xade00
SizeOfInitializedData 0x17600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000000AA040 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x180000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xca000
SizeOfHeaders 0x400
Checksum 0xd3a50
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 35a8d42b3bae813ec3ec3229fe0df873
SHA1 3f25b521bed2cc41f7528ea490a7f09f915b3517
SHA256 39a2e15e599ef41d6c43656f7c6d6b0d64353b7fc355dddf25f277bcfcb1fab4
SHA3 e9bce9dd158fc635178b5b667d13e00488acd5b5390c7b8ad47641c4e3e1356a
VirtualSize 0xaddea
VirtualAddress 0x1000
SizeOfRawData 0xade00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.57952

.rdata

MD5 f9a1979673a2e5f78746e1e30ae14ea9
SHA1 7c7cf531d24e567711c99cdbd950da1259a524bf
SHA256 88dff160da59efe0ff584a09ac06968e92bd6ac3529d5a5d9997c1a2893ffdb2
SHA3 ef4fe092de8e83f9bda95fad2a2a82697c0427b65d62bec7d385cc2e8b477ffd
VirtualSize 0x104b6
VirtualAddress 0xaf000
SizeOfRawData 0x10600
PointerToRawData 0xae200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.98003

.data

MD5 4c029a0a8f0aed54b1295360b3ebf107
SHA1 3db6d4474259b086292f569185fad80d2ef66368
SHA256 b95723b95fd4fef854f681d13b48b77fe2ffb72cf0af9583618fffc0b648ee24
SHA3 df0d4b3a246d9aa10dc086ebf3d0ed9f4bb3b3bac4b785302b7fca73f7b65e5f
VirtualSize 0x1c68
VirtualAddress 0xc0000
SizeOfRawData 0x400
PointerToRawData 0xbe800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.61988

.pdata

MD5 a1be611a2cde76a707d6b21d25a8c326
SHA1 a3c1ce74a49356aed56a538eac8ac79f21a1811b
SHA256 c8a96399c4ea80c4d193636d6feb845ea2297f279f91f34f19af8008ece7a23e
SHA3 d60ac3c4eb2f6f17153aee54280567cc68a1cd39badaa88fcb5f9c3c6079de9b
VirtualSize 0x43c8
VirtualAddress 0xc2000
SizeOfRawData 0x4400
PointerToRawData 0xbec00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.86743

.tls

MD5 bf619eac0cdf3f68d496ea9344137e8b
SHA1 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5
SHA256 076a27c79e5ace2a3d47f9dd2e83e4ff6ea8872b3c2218f66c92b89b55f36560
SHA3 622de1e1568ddef36c4b89b706b05201c13481c3575d0fc804ff8224787fcb59
VirtualSize 0x11
VirtualAddress 0xc7000
SizeOfRawData 0x200
PointerToRawData 0xc3000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0

.rsrc

MD5 ccd0b019cd164565a1486e1d1d710cf5
SHA1 d8f770c05515f06230afeee84d09da5553bf3b1e
SHA256 e8ecbfdc7e9fc9a3e1ddc4317658c2cc2477ac4ec9c104091e8f777f2bae1fa6
SHA3 84039ce7709d8781cae265095e4757e1edbdd7a1d41149016bbc31f5a18b196c
VirtualSize 0x5a8
VirtualAddress 0xc8000
SizeOfRawData 0x600
PointerToRawData 0xc3200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.37988

.reloc

MD5 34e4ce75c88215511d68ed98954edd9f
SHA1 1eae7bb150f58e737f847773ed07fa3d1b964859
SHA256 356d9713c2c0b59e0cfb0905c9aab2e13a17631fab1c82f720d7da5586ddff92
SHA3 d4d87be7f8c80729206ae7af9eb40b90e439b315c883f78f8e865e291e7c2a1b
VirtualSize 0x534
VirtualAddress 0xc9000
SizeOfRawData 0x600
PointerToRawData 0xc3800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.0887

Imports

KERNEL32.dll CreateSemaphoreExW
ReleaseSemaphore
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
CloseHandle
WaitForSingleObjectEx
CreateMutexW
ReleaseMutex
SleepEx
VirtualAlloc
VirtualFree
VirtualQuery
VirtualProtect
HeapCreate
HeapDestroy
HeapValidate
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
ResetEvent
GetCurrentProcess
LoadLibraryExW
GetModuleFileNameW
TerminateProcess
IsDebuggerPresent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
SetEvent
CreateEventW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
HeapFree
HeapAlloc
GetProcessHeap
WideCharToMultiByte
OutputDebugStringA
DebugBreak
RaiseException
DisableThreadLibraryCalls
EncodePointer
RtlPcToFileHeader
ADVAPI32.dll SystemFunction036
api-ms-win-crt-math-l1-1-0.dll _finite
sqrt
sin
floor
_isnan
_copysign
fmod
_fdopen
cos
api-ms-win-crt-stdio-l1-1-0.dll __stdio_common_vfprintf
_wfsopen
fclose
__acrt_iob_func
_setmode
_fileno
_dup
fflush
api-ms-win-crt-convert-l1-1-0.dll _wtoi
api-ms-win-crt-utility-l1-1-0.dll qsort
api-ms-win-crt-string-l1-1-0.dll strcpy_s
wcsncmp
strcmp
api-ms-win-crt-runtime-l1-1-0.dll _execute_onexit_table
_invalid_parameter_noinfo
_errno
abort
terminate
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_initterm_e
_initterm
api-ms-win-crt-heap-l1-1-0.dll free
_free_base
_calloc_base
malloc

Delayed Imports

getJit

Ordinal 1
Address 0x13740

jitStartup

Ordinal 2
Address 0x135c0

sxsJitStartup

Ordinal 3
Address 0x18f0

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x544
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.63423
MD5 7349a9dbf717af35fb0d5a72a196e0fb
SHA1 e140b8cac353e9810fbee9a761c1682392e6e632
SHA256 f89c862c2c0306de1db4999c85a42cd5a77bcb9fd665c860e2f5e96af55a164b
SHA3 4d7aefc24542967a9c7993e6eaa75878a182de04caa966522de559ff7216ddf1

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.24214.1
ProductVersion 1.0.24214.1
FileFlags VS_FF_PRIVATEBUILD
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United States
CompanyName Microsoft Corporation
FileDescription Microsoft .NET Runtime Just-In-Time Compiler
FileVersion (#2) 1.0.24214.01 built by: dlab-DDVSOWINAGE002. Commit Hash: abbb8f685929c7aeaa087dae46fedc1bc2af4b17
InternalName clrjit.dll
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename clrjit.dll
ProductName Microsoft® .NET Core
ProductVersion (#2) 1.0.24214.01 built by: dlab-DDVSOWINAGE002. Commit Hash: abbb8f685929c7aeaa087dae46fedc1bc2af4b17
Comments Flavor=Retail
PrivateBuild FX_VER_PRIVATEBUILD_STR
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2016-Jun-14 01:20:01
Version 0.0
SizeofData 109
AddressOfRawData 0xba174
PointerToRawData 0xb9374
Referenced File D:\A\_work\38\s\bin\obj\Windows_NT.x64.Release\src\jit\standalone\Release\clrjit.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2016-Jun-14 01:20:01
Version 0.0
SizeofData 20
AddressOfRawData 0xba1e4
PointerToRawData 0xb93e4

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2016-Jun-14 01:20:01
Version 0.0
SizeofData 916
AddressOfRawData 0xba1f8
PointerToRawData 0xb93f8

TLS Callbacks

StartAddressOfRawData 0x1800c7000
EndAddressOfRawData 0x1800c7010
AddressOfIndex 0x1800c1c50
AddressOfCallbacks 0x1800af3c0
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x94
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1800c0000
GuardCFCheckFunctionPointer 6443168608
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

XOR Key 0x4e1ff7e5
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 14
C objects (65501) 1
Imports (65501) 9
Total imports 202
ASM objects (23907) 8
C++ objects (23907) 27
C objects (23907) 17
265 (VS2015 UPD2 build 23918) 88
Exports (VS2015 UPD2 build 23918) 1
Resource objects (VS2015 UPD2 build 23918) 1
Linker (VS2015 UPD2 build 23918) 1

Errors

<-- -->