f94604263d0ae896a53df079c79aee51

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 1970-Jan-01 00:00:00

Plugin Output

Suspicious PEiD Signature: HQR data file
Info Interesting strings found in the binary: Contains domain names:
  • .eq.github.com
  • .hash.net
  • cdn.discordapp.com
  • discord.com
  • discordapp.com
  • eq.github.com
  • github.com
  • golang.org
  • https://cdn.discordapp.com
  • https://cdn.discordapp.com/insufficient
  • https://discord.com
  • https://discordapp.com
  • https://status.discord.com
  • https://status.discord.com/api/v2/illegal
  • status.discord.com
  • type..eq.github.com
  • type..eq.net
  • type..hash.net
Info Cryptographic algorithms detected in the binary: Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to AES
Suspicious The PE is possibly packed. Unusual section name found: .symtab
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • LoadLibraryW
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 f94604263d0ae896a53df079c79aee51
SHA1 7ae20ed08917928fc39c8f4cf7f6c5523dfae8f7
SHA256 25fcfe219cc4125b3968180b6f89d1da29c50196e756dbe570e82449e702c2f2
SHA3 b7a252492fc75aa0401b3e6e118f5dc7a7087534414dded5c13bb1259066b691
SSDeep 49152:Ssrfxr/TAprb/T/vO90dL3BmAFd4A64nsfJijT7YZ02iGmhMZ3XC7Zyvyds4jR2:VaJDKibGX2ZygIyaxSEfhE
Imports Hash c7269d59926fa4252270f407e4dab043

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0x4
e_cparhdr 0
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0x8b
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 1970-Jan-01 00:00:00
PointerToSymbolTable 0x514400
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 3.0
SizeOfCode 0x255a00
SizeOfInitializedData 0x52200
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000059200 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.1
ImageVersion 1.0
SubsystemVersion 6.1
Win32VersionValue 0
SizeOfImage 0x579000
SizeOfHeaders 0x600
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x200000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 6a34cba4ba29565044e596a1c7f38ea1
SHA1 dcfb731f236bb980c937d1689cb43b59db3a1639
SHA256 365381023d7328736a46bf2c05b0e0b2589cfce82fc7f9375b3b25b2f3fa8f24
SHA3 cd601487029f4935a4042ef9a6e69d2de53bf3169939f9bbd44e67a74850c275
VirtualSize 0x255954
VirtualAddress 0x1000
SizeOfRawData 0x255a00
PointerToRawData 0x600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.16805

.rdata

MD5 391eca37364dda64dd4cbc13d1ef6694
SHA1 1958b082b9b00d98e34eb2c74724062c65c3ea02
SHA256 c791033d6a0179cf7dee3ae02337e647beb09080dd5fd9edc99d15ef7467b616
SHA3 dd5e52e803bef2c78e014a67d7b77897192f7043b89e1f606054937481d8b418
VirtualSize 0x252200
VirtualAddress 0x257000
SizeOfRawData 0x252200
PointerToRawData 0x256000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.1733

.data

MD5 11121b5f2e1e3dadec2a5cb821f04574
SHA1 9b991b50abe8e86ff0a7eeff70987c0fcd63f322
SHA256 8eaf6292a666ae55c42942d151ef9a09f5ceb989fd87815b48f7d7b3bbd76602
SHA3 c9f326e74876c998cc9c8f45f5fb116e5d933b6106cdc8eef07f74d99a9c07e3
VirtualSize 0xb2280
VirtualAddress 0x4aa000
SizeOfRawData 0x52200
PointerToRawData 0x4a8200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 6.23218

.idata

MD5 144768bd3898c5abcf8ed1333d3087f7
SHA1 240c6121b67ee597fccfda239812223ff1bde984
SHA256 a609e7a0ff49266d93f9e5ba7e082764aea16b072e0216775e4355850d9e01b1
SHA3 d28f4e0948fce7bfa9725de4164aee2e0c9f86b343fed675d6ec1a3e293af8f5
VirtualSize 0x48c
VirtualAddress 0x55d000
SizeOfRawData 0x600
PointerToRawData 0x4fa400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.60362

.reloc

MD5 55aa250ebc1cfa6b149831e270af9d1f
SHA1 b65b3e3fb34ebf530da74e9a42943ae0bac881ec
SHA256 807034cd9bd7486230b4def9096c67a5bcc9e316af6cbb437b73a84ac1dca007
SHA3 6292fe1517598d1a1de3648ddc9b79e4e529552ee740861ce5afb24771e39237
VirtualSize 0x198c2
VirtualAddress 0x55e000
SizeOfRawData 0x19a00
PointerToRawData 0x4faa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.45904

.symtab

MD5 07b5472d347d42780469fb2654b7fc54
SHA1 943ae54f4818e52409fbbaf60ffd71318d966b0d
SHA256 3e67f4a7d14b832ff2a2433e9cf0f6f5720821f67148a87c0ee2595a20c96c68
SHA3 a70a3e18515c06557b62676f2a8eb6d7d41962d8c9c7c49f4641c429cc65b977
VirtualSize 0x4
VirtualAddress 0x578000
SizeOfRawData 0x200
PointerToRawData 0x514400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0203931

Imports

kernel32.dll WriteFile
WriteConsoleW
WaitForMultipleObjects
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
SwitchToThread
SuspendThread
Sleep
SetWaitableTimer
SetUnhandledExceptionFilter
SetProcessPriorityBoost
SetEvent
SetErrorMode
SetConsoleCtrlHandler
ResumeThread
PostQueuedCompletionStatus
LoadLibraryA
LoadLibraryW
SetThreadContext
GetThreadContext
GetSystemInfo
GetSystemDirectoryA
GetStdHandle
GetQueuedCompletionStatusEx
GetProcessAffinityMask
GetProcAddress
GetEnvironmentStringsW
GetConsoleMode
FreeEnvironmentStringsW
ExitProcess
DuplicateHandle
CreateWaitableTimerExW
CreateThread
CreateIoCompletionPort
CreateFileA
CreateEventA
CloseHandle
AddVectoredExceptionHandler

Delayed Imports

Version Info

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->