| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2026-Apr-14 03:36:43 |
| Detected languages |
English - United States
|
| FileDescription | My Custom Application |
| FileVersion | 1.0.0.0 |
| CompanyName | My Custom Company |
| LegalCopyright | (c) 2026 My Custom Company |
| ProductName | My Custom App |
| ProductVersion | 1.0.0.0 |
| Info | Matching compiler(s): | MASM/TASM - sig1(h) |
| Info | Interesting strings found in the binary: |
Contains domain names:
|
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Suspicious | No VirusTotal score. | This file has never been scanned on VirusTotal. |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x118 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 5 |
| TimeDateStamp | 2026-Apr-14 03:36:43 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_RELOCS_STRIPPED
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x89a00 |
| SizeOfInitializedData | 0x3de00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000000089A10 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0xcb000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
|
| SizeofStackReserve | 0x400000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.dll |
Sleep
GetTickCount MulDiv SetErrorMode GlobalAlloc GlobalFree GlobalLock GlobalUnlock GetCPInfo IsValidCodePage GetLastError OutputDebugStringW LoadLibraryW GetCurrentThreadId GetStringTypeExW SetThreadPriority CreateMutexW GetExitCodeThread CloseHandle CreateThread lstrcmpiW GetProcAddress FreeLibrary VirtualProtect SetLastError GetModuleHandleW WideCharToMultiByte GetVolumeInformationW GetDiskFreeSpaceW DeviceIoControl CreateFileW SetVolumeLabelW GetDiskFreeSpaceExW GetDriveTypeW SetEnvironmentVariableW GetEnvironmentVariableW CreateDirectoryW ReadFile SizeofResource FindFirstFileW GetFileSizeEx GetFullPathNameW FindNextFileW WriteFile SetFileTime FindClose GetFileAttributesW SetFileAttributesW MultiByteToWideChar LocalFileTimeToFileTime LockResource DeleteFileW LoadResource FindResourceW FileTimeToLocalFileTime GetSystemTimeAsFileTime MoveFileW QueryDosDeviceW SetPriorityClass TerminateProcess GetProcessId OpenProcess GetCurrentProcessId EnterCriticalSection LeaveCriticalSection Beep GetLocalTime GetTimeFormatW GetDateFormatW GetSystemDefaultUILanguage GetTempPathW GetDateFormatEx GetTickCount64 GetCurrentDirectoryW GetComputerNameW GetSystemTime GetSystemWindowsDirectoryW WaitForSingleObject GetExitCodeProcess WriteProcessMemory ReadProcessMemory GetVersionExW GetModuleHandleExW GetShortPathNameW GetModuleFileNameW InitializeCriticalSection SetCurrentDirectoryW DeleteCriticalSection CreateProcessW SetDllDirectoryW FormatMessageW CompareStringW GetCurrentProcess RemoveDirectoryW CreateToolhelp32Snapshot Process32NextW Process32FirstW CopyFileW WritePrivateProfileStringW GetPrivateProfileSectionW GetPrivateProfileSectionNamesW GetPrivateProfileStringW WritePrivateProfileSectionW GetStdHandle SetEndOfFile GetACP SetFilePointerEx GetFileType EnumResourceNamesW FileTimeToSystemTime VirtualAllocEx GetFileSize SystemTimeToFileTime VirtualFreeEx IsWow64Process LoadLibraryExW GlobalSize GetSystemInfo InitializeSListHead VirtualQuery LoadLibraryExA RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind IsDebuggerPresent UnhandledExceptionFilter SetUnhandledExceptionFilter GetStartupInfoW IsProcessorFeaturePresent QueryPerformanceCounter RaiseException |
|---|---|
| VCRUNTIME140_1.dll |
__CxxFrameHandler4
|
| VCRUNTIME140.dll |
_CxxThrowException
__current_exception __current_exception_context strchr memcmp wcsrchr __std_exception_destroy memmove _purecall wcschr __C_specific_handler __std_terminate memset memcpy wcsstr __std_exception_copy __RTDynamicCast |
| api-ms-win-crt-string-l1-1-0.dll |
wcsncpy
iswxdigit _wcsdup wcscspn tolower iswdigit isalpha strcat iswspace wcsncmp towupper isalnum _wcsnicmp wcslen strnlen toupper wcscpy wcsnlen wcscat isxdigit wcscmp _wcsicmp _wcsupr |
| api-ms-win-crt-runtime-l1-1-0.dll |
_register_thread_local_exe_atexit_callback
__p___argc __p___wargv _c_exit exit terminate _exit _initialize_onexit_table _register_onexit_function _cexit _seh_filter_exe _set_app_type _crt_atexit _configure_wide_argv _initialize_wide_environment _get_wide_winmain_command_line _initterm _initterm_e |
| api-ms-win-crt-heap-l1-1-0.dll |
_msize
free realloc _set_new_mode malloc _expand _callnewh |
| api-ms-win-crt-stdio-l1-1-0.dll |
__p__commode
_set_fmode __stdio_common_vswprintf |
| api-ms-win-crt-convert-l1-1-0.dll |
_wtoi
wcstol _ultow _itow wcstoul wcstod _i64tow _wtof |
| api-ms-win-crt-utility-l1-1-0.dll |
qsort
|
| api-ms-win-crt-math-l1-1-0.dll |
acos
ceil fmod tan floor exp pow sqrt asin log10 log sin atan cos fabs __setusermatherr |
| api-ms-win-crt-filesystem-l1-1-0.dll |
_wsplitpath
|
| api-ms-win-crt-locale-l1-1-0.dll |
_configthreadlocale
|
| WSOCK32.dll (delay-loaded) |
gethostbyname
WSAStartup inet_addr gethostname WSACleanup |
| Attributes | 0x1 |
|---|---|
| Name | WSOCK32.dll |
| ModuleHandle | 0xbd370 |
| DelayImportAddressTable | 0xbd2c8 |
| DelayImportNameTable | 0xb0920 |
| BoundDelayImportTable | 0xb1d78 |
| UnloadDelayImportTable | 0 |
| TimeStamp | 1970-Jan-01 00:00:00 |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.0 |
| ProductVersion | 1.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | English - United States |
| FileDescription | My Custom Application |
| FileVersion (#2) | 1.0.0.0 |
| CompanyName | My Custom Company |
| LegalCopyright | (c) 2026 My Custom Company |
| ProductName | My Custom App |
| ProductVersion (#2) | 1.0.0.0 |
| Resource LangID | English - United States |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-14 03:36:43 |
| Version | 0.0 |
| SizeofData | 900 |
| AddressOfRawData | 0xabfa0 |
| PointerToRawData | 0xaada0 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-14 03:36:43 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x1400b5040 |
| XOR Key | 0xa4db3733 |
|---|---|
| Unmarked objects | 0 |
| Imports (VS2008 SP1 build 30729) | 18 |
| Imports (35207) | 4 |
| ASM objects (35207) | 3 |
| C objects (35207) | 9 |
| C++ objects (35207) | 31 |
| C objects (33145) | 7 |
| C++ objects (33145) | 1 |
| C objects (CVTCIL) (33145) | 1 |
| Imports (33145) | 3 |
| Total imports | 539 |
| ASM objects (35225) | 2 |
| C++ objects (LTCG) (35225) | 66 |
| Resource objects (35225) | 1 |
| Linker (35225) | 1 |
No comments yet.