| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| Compilation Date | 2025-May-19 17:38:37 |
| Detected languages |
English - United States
|
| Debug artifacts |
D:\C++\ÐоÑно_\x64\Debug\ÐоÑно_.pdb
|
| Info | Matching compiler(s): | MASM/TASM - sig1(h) |
| Info | Interesting strings found in the binary: |
Contains domain names:
|
| Suspicious | The PE is possibly packed. |
Section .textbss is both writable and executable.
Unusual section name found: .msvcjmc |
| Info | The PE contains common functions which appear in legitimate applications. |
Possibly launches other programs:
|
| Suspicious | VirusTotal score: 2/70 (Scanned on 2026-03-22 13:12:46) |
Bkav:
W64.AIDetectMalware
MaxSecure: Trojan.Malware.300983.susgen |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xe8 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 10 |
| TimeDateStamp | 2025-May-19 17:38:37 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x7c00 |
| SizeOfInitializedData | 0x7600 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x000000000001125D (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x25000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| SHELL32.dll |
ShellExecuteA
|
|---|---|
| VCRUNTIME140D.dll |
__C_specific_handler_noexcept
__vcrt_LoadLibraryExW __current_exception __std_type_info_destroy_list __C_specific_handler __vcrt_GetModuleFileNameW __vcrt_GetModuleHandleW __current_exception_context memcpy |
| ucrtbased.dll |
strcat_s
__stdio_common_vsprintf_s _wmakepath_s _wsplitpath_s wcscpy_s strcpy_s terminate _crt_atexit _execute_onexit_table _register_onexit_function _initialize_onexit_table _seh_filter_dll __p__commode _set_new_mode _configthreadlocale _register_thread_local_exe_atexit_callback _c_exit _cexit __p___argv __p___argc _set_fmode _exit exit _initterm_e _initterm _get_initial_narrow_environment _initialize_narrow_environment _configure_narrow_argv __setusermatherr _set_app_type _seh_filter_exe _CrtDbgReportW _CrtDbgReport _crt_at_quick_exit |
| KERNEL32.dll |
HeapAlloc
QueryPerformanceCounter GetCurrentProcessId GetSystemTimeAsFileTime InitializeSListHead RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind IsDebuggerPresent UnhandledExceptionFilter SetUnhandledExceptionFilter TerminateProcess GetCurrentProcess GetProcAddress FreeLibrary VirtualQuery GetProcessHeap HeapFree GetCurrentThreadId GetLastError WideCharToMultiByte MultiByteToWideChar RaiseException GetModuleHandleW IsProcessorFeaturePresent GetStartupInfoW |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2025-May-19 17:38:37 |
| Version | 0.0 |
| SizeofData | 69 |
| AddressOfRawData | 0x1ad1c |
| PointerToRawData | 0x9d1c |
| Referenced File | D:\C++\ÐоÑно_\x64\Debug\ÐоÑно_.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2025-May-19 17:38:37 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0x1ad64 |
| PointerToRawData | 0x9d64 |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x14001c040 |
| XOR Key | 0xc2852169 |
|---|---|
| Unmarked objects | 0 |
| Imports (VS 2015-2022 runtime 33030) | 2 |
| C++ objects (VS 2015-2022 runtime 33030) | 23 |
| C objects (VS 2015-2022 runtime 33030) | 11 |
| ASM objects (VS 2015-2022 runtime 33030) | 3 |
| Imports (30795) | 7 |
| Total imports | 70 |
| C++ objects (33140) | 1 |
| Resource objects (33140) | 1 |
| Linker (33140) | 1 |
No comments yet.