6ec063f19205e61cec74f50596d15aa429ab3b92d3531e83f63984ced64d466a

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2025-Oct-07 14:04:13
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
Debug artifacts discord_quest_completer.pdb
FileVersion 25.10.7
ProductVersion 25.10.7
FileDescription Discord Quest Completer
ProductName Discord Quest Completer

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • .github.com
  • 0www.entrust.net
  • 7www.entrust.net
  • Entrust.net
  • GoDaddy.com
  • birthpopuptypesapplyImagebeinguppernoteseveryshowsmeansextramatchtrackknownearlybegansuperpapernorthlearngivennamedendedTermspartsGroupbrandusingwomanfalsereadyaudiotakeswhile.com
  • discord.com
  • entrust.net
  • genretrucklooksValueFrame.net
  • github.com
  • http://asset.localhost
  • http://dummy.testC
  • http://ipc.localhost
  • http://json-schema.org
  • http://no.url.provided.local
  • http://tauri.localhost
  • http://www.C
  • http://www.a
  • http://www.css
  • http://www.hortcut
  • http://www.icon
  • http://www.interpretation
  • http://www.language
  • http://www.style
  • http://www.text-decoration
  • http://www.w3.org
  • http://www.w3.org/shortcut
  • http://www.wencodeURIComponent
  • http://www.years
  • https://discord.com
  • https://discord.comhttp
  • https://docs.rs
  • https://github.com
  • https://markterence.github.io
  • https://markterence.github.io/discord-quest-completer/detectable.json
  • https://markterence.github.iohttps
  • https://myapi.service.com
  • https://myapi.service.com/users/
  • https://tauri.localhost
  • https://urlpattern.spec.whatwg.org
  • https://urlpattern.spec.whatwg.org/
  • https://www.World
  • https://www.recent
  • json-schema.org
  • myapi.service.com
  • openssl.org
  • schema.org
  • service.com
  • spec.whatwg.org
  • thing.org
  • urlpattern.spec.whatwg.org
  • whatwg.org
  • www.entrust.net
  • www.w3.org
Info Cryptographic algorithms detected in the binary: Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to RC5 or RC6
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryW
  • LoadLibraryExW
  • LoadLibraryExA
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegCreateKeyExW
  • RegSetValueExW
  • RegQueryValueExW
  • RegOpenKeyExW
  • RegGetValueW
  • RegCloseKey
Possibly launches other programs:
  • CreateProcessW
Uses Windows's Native API:
  • NtWriteFile
  • NtCreateFile
  • NtReadFile
  • NtCreateNamedPipeFile
  • NtOpenFile
  • NtCancelIoFileEx
  • NtDeviceIoControlFile
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Uses functions commonly found in keyloggers:
  • GetAsyncKeyState
  • GetForegroundWindow
  • MapVirtualKeyW
Leverages the raw socket API to access the Internet:
  • WSACleanup
  • getaddrinfo
  • freeaddrinfo
  • getsockopt
  • WSAStartup
  • getpeername
  • getsockname
  • WSASocketW
  • bind
  • connect
  • ioctlsocket
  • shutdown
  • recv
  • send
  • WSASend
  • setsockopt
  • WSAIoctl
  • WSAGetLastError
  • closesocket
Can take screenshots:
  • GetDC
  • CreateCompatibleDC
  • BitBlt
Suspicious VirusTotal score: 1/71 (Scanned on 2026-05-23 10:46:38) Trapmine: malicious.moderate.ml.score

Hashes

MD5 a3b6f91a30892bbfb90093bda3f64131
SHA1 e7bbbfd2b76222e8deb24a3acfc4f7272d3c13eb
SHA256 6ec063f19205e61cec74f50596d15aa429ab3b92d3531e83f63984ced64d466a
SHA3 a3afb274f45b5182bd4590d79d6b5a550088b01e42135ad20da94ad882a2593c
SSDeep 98304:J+a26rUc3ES+BiuWlVlSjEuGqOIcgWGWb1dyktRaN4yOIrdgjmu+PEvfGnfqk1y:J+orUc3EcHuGIcIkVm4fmfrnPEj
Imports Hash 3ebc9072499789c2ad62dc630bf5d20d

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2025-Oct-07 14:04:13
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xab0600
SizeOfInitializedData 0x5c8200
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000A7D470 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x107c000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 ef68938eecf2757c50135d1e5c4cc7a9
SHA1 c7599b0888e9df145f81d01ba005d6410fd09475
SHA256 fde2e3d4e26a519d6c78c4943ac64dc3c956316bb326845d4d002607524a4838
SHA3 c5bf2d92151b71684a9daf24f45cc1ee6640db0145c55b29f7fb244bf0f83a05
VirtualSize 0xab0480
VirtualAddress 0x1000
SizeOfRawData 0xab0600
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.19895

.rdata

MD5 19f6feee25baffe0cdf92098663f364d
SHA1 f83708f4a4e0e9bc331c36b70256cafbbe5d1de6
SHA256 37d717d9e0108c8645de20e9f7b34b6e0e0c8563f4a577ed954267014541bcde
SHA3 adc9c65800f11b05a185750f46c9d320e7b3ce1a3d387bfef06bff88c1443cde
VirtualSize 0x516f38
VirtualAddress 0xab2000
SizeOfRawData 0x517000
PointerToRawData 0xab0a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.1399

.data

MD5 c7adc92898850a67d4c38bdeb8730947
SHA1 ba985b6c2f787ff46d929882defd4ec0eb68cb08
SHA256 c6dd5e17be6a25cee5e25e5ecb20da0c583bb0dc9a26a630ceb34fd5f2553dd0
SHA3 48258e9d4d1361a37a047cb2addf1c51383f66cd656aebb0a4c012523709ee8c
VirtualSize 0x5ae8
VirtualAddress 0xfc9000
SizeOfRawData 0x3000
PointerToRawData 0xfc7a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.33628

.pdata

MD5 2f053e2975c83abfa0dbcc904b7bee62
SHA1 40125626e7149159ad8e909965c4ff2669957d5b
SHA256 539083a059d8bc01b4637d8f8312e893822601a380b0fd8c11a9255836ec380d
SHA3 e9b61d0ad0a9d86ed8f1d02ba4f70a1a7e5eadc5aee2ab33b11756b22b5fac93
VirtualSize 0x933d8
VirtualAddress 0xfcf000
SizeOfRawData 0x93400
PointerToRawData 0xfcaa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.58704

.rsrc

MD5 ad008fd331049ccc6cf1830955fb61c8
SHA1 db29ebae162c824e539e601f360a425cd4ee2b93
SHA256 52b2bbafbfe4b8988d7278f59f982ca4c780ab66535dc5a22cd72c23a79f54d0
SHA3 2df66688841af1432cda244f96f933dd2d8d547648abc9bf23d9afea2e980caa
VirtualSize 0x8208
VirtualAddress 0x1063000
SizeOfRawData 0x8400
PointerToRawData 0x105de00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.8527

.reloc

MD5 918c3acd8aa2da490951948336c4d1da
SHA1 2ea7a6ca250735035634e1266000025652d5f9b6
SHA256 0b8e72099be2733b5decea34c3cef368f573eaaa8f22f9b33b9d8d319d44f09e
SHA3 266f3757a1d54784e54e0eefc912c341e5a4a8e83cfc4e04261f093c787e19c7
VirtualSize 0xfcc4
VirtualAddress 0x106c000
SizeOfRawData 0xfe00
PointerToRawData 0x1066200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.46344

Imports

kernel32.dll RtlVirtualUnwind
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
CreateFileW
SetNamedPipeHandleState
lstrlenW
LoadLibraryA
HeapAlloc
IsProcessorFeaturePresent
GetProcessHeap
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
InitializeSListHead
GetProcAddress
SleepConditionVariableSRW
WakeAllConditionVariable
CreateMutexA
WaitForSingleObjectEx
LoadLibraryW
AcquireSRWLockExclusive
WideCharToMultiByte
ReleaseSRWLockExclusive
MultiByteToWideChar
GetConsoleOutputCP
CreateProcessW
GetWindowsDirectoryW
GetSystemDirectoryW
GetFinalPathNameByHandleW
DeviceIoControl
CreateDirectoryW
GetFileInformationByHandleEx
FindNextFileW
SetEnvironmentVariableW
GetTempPathW
GetFullPathNameW
SetWaitableTimer
CreateWaitableTimerExW
CreateThread
WaitForMultipleObjects
ReadFileEx
ExitProcess
CancelIo
LCIDToLocaleName
GetSystemTimeAsFileTime
GetCurrentThreadId
ReleaseMutex
HeapReAlloc
CopyFileExW
FindClose
FindFirstFileExW
GetFileAttributesW
OutputDebugStringA
OutputDebugStringW
GetModuleFileNameW
GetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
LoadLibraryExW
GetModuleHandleW
FreeLibrary
GetEnvironmentVariableW
GetSystemTimePreciseAsFileTime
QueryPerformanceFrequency
TerminateProcess
GetUserDefaultUILanguage
WriteConsoleW
GetExitCodeProcess
SleepEx
WriteFileEx
TlsFree
GetCurrentProcessId
GetStdHandle
SetFilePointerEx
DuplicateHandle
GetCurrentProcess
SetFileInformationByHandle
GetCommandLineW
GetEnvironmentStringsW
GetCurrentDirectoryW
SetLastError
RtlLookupFunctionEntry
RtlCaptureContext
GetSystemInfo
QueryPerformanceCounter
SwitchToThread
SetHandleInformation
GetCurrentThread
SetThreadStackGuarantee
AddVectoredExceptionHandler
CompareStringOrdinal
FreeEnvironmentStringsW
GetModuleHandleA
Sleep
GetConsoleMode
CreateIoCompletionPort
CancelIoEx
ReadFile
GetOverlappedResult
WriteFile
PostQueuedCompletionStatus
GetQueuedCompletionStatusEx
GetFileInformationByHandle
CloseHandle
FormatMessageW
WaitForSingleObject
SetFileCompletionNotificationModes
CreateEventW
LoadLibraryExA
advapi32.dll RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
SystemFunction036
EventRegister
EventSetInformation
EventWriteTransfer
EventUnregister
RegGetValueW
RegCloseKey
api-ms-win-core-synch-l1-2-0.dll WakeByAddressAll
WaitOnAddress
WakeByAddressSingle
bcryptprimitives.dll ProcessPrng
SHELL32.dll #190
#155
ShellExecuteExW
SHCreateItemFromParsingName
SHGetKnownFolderPath
DragQueryFileW
DragFinish
SHOpenFolderAndSelectItems
SHAppBarMessage
ole32.dll CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitializeEx
RevokeDragDrop
RegisterDragDrop
CoTaskMemAlloc
CoInitialize
OleInitialize
user32.dll DestroyAcceleratorTable
CreateMenu
DestroyMenu
RemoveMenu
DrawMenuBar
SetMenu
DrawTextW
GetWindowDC
OffsetRect
GetMenuBarInfo
GetMenuItemInfoW
TranslateAcceleratorW
DestroyWindow
ToUnicodeEx
InsertMenuW
GetKeyState
GetAsyncKeyState
GetKeyboardState
SendInput
SetForegroundWindow
GetWindowTextW
AppendMenuW
GetWindowTextLengthW
SetWindowTextW
SetMenuItemInfoW
MonitorFromPoint
EnumDisplayMonitors
SystemParametersInfoA
SetPropW
IsWindowVisible
GetMenu
GetKeyboardLayout
GetRawInputData
CreateIcon
SetWindowDisplayAffinity
ClipCursor
GetClipCursor
ShowCursor
SetWindowLongW
EnableMenuItem
GetSystemMenu
ScreenToClient
GetWindowLongW
ClientToScreen
DestroyIcon
SystemParametersInfoW
ReleaseCapture
SetCapture
SetWindowLongPtrW
MsgWaitForMultipleObjectsEx
RegisterRawInputDevices
IsProcessDPIAware
SetParent
MapWindowPoints
MonitorFromRect
RegisterWindowMessageA
ShowWindow
CreateAcceleratorTableW
TrackMouseEvent
ReleaseDC
GetDC
CheckMenuItem
DrawIconEx
TrackPopupMenu
IsWindowEnabled
RedrawWindow
PostQuitMessage
EnableWindow
GetWindowLongPtrW
GetParent
SetWindowRgn
FindWindowExW
GetTouchInputInfo
AdjustWindowRect
MapVirtualKeyExW
GetForegroundWindow
RegisterTouchWindow
IsWindow
AdjustWindowRectEx
FlashWindowEx
GetActiveWindow
UpdateWindow
InvalidateRect
SetCursorPos
InvalidateRgn
GetWindowPlacement
SetWindowPlacement
ChangeDisplaySettingsExW
DefWindowProcW
GetMessageW
MapVirtualKeyW
IsIconic
EnumChildWindows
DispatchMessageA
GetMessageA
CreateWindowExW
RegisterClassExW
GetWindowRect
GetClientRect
SetWindowPos
PostMessageW
LoadCursorW
DispatchMessageW
TranslateMessage
SendMessageW
GetUpdateRect
PeekMessageW
PostThreadMessageW
ValidateRect
GetMonitorInfoW
MonitorFromWindow
GetCursorPos
SetCursor
FillRect
GetSystemMetrics
CloseTouchInputHandle
CreatePopupMenu
comctl32.dll SetWindowSubclass
DefSubclassProc
TaskDialogIndirect
RemoveWindowSubclass
gdi32.dll DeleteObject
CombineRgn
SetBkMode
GetDeviceCaps
SetTextColor
CreateRectRgn
CreateSolidBrush
CreateCompatibleDC
DeleteDC
SelectObject
CreateDIBSection
BitBlt
dwmapi.dll DwmGetWindowAttribute
DwmSetWindowAttribute
DwmEnableBlurBehindWindow
shlwapi.dll SHCreateMemStream
ws2_32.dll WSACleanup
getaddrinfo
freeaddrinfo
getsockopt
WSAStartup
getpeername
getsockname
WSASocketW
bind
connect
ioctlsocket
shutdown
recv
send
WSASend
setsockopt
WSAIoctl
WSAGetLastError
closesocket
bcrypt.dll BCryptGenRandom
ntdll.dll NtWriteFile
NtCreateFile
NtReadFile
RtlGetVersion
NtCreateNamedPipeFile
NtOpenFile
NtCancelIoFileEx
NtDeviceIoControlFile
RtlNtStatusToDosError
oleaut32.dll SysFreeString
SetErrorInfo
SysStringLen
GetErrorInfo
api-ms-win-crt-math-l1-1-0.dll trunc
round
__setusermatherr
floor
pow
api-ms-win-crt-string-l1-1-0.dll strcpy_s
wcsncmp
strcmp
wcslen
_wcsicmp
strlen
wcscmp
api-ms-win-crt-convert-l1-1-0.dll wcstol
_wtoi
_ultow_s
api-ms-win-crt-heap-l1-1-0.dll free
_set_new_mode
_callnewh
malloc
calloc
api-ms-win-crt-runtime-l1-1-0.dll _set_app_type
_configure_narrow_argv
_initialize_narrow_environment
_seh_filter_exe
_initterm
_initterm_e
exit
_exit
_get_initial_narrow_environment
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
abort
_initialize_onexit_table
terminate
_register_onexit_function
_crt_atexit
api-ms-win-crt-stdio-l1-1-0.dll _set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x7e5
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.82371
Detected Filetype PNG graphic file
MD5 a830a17a6f40461eaa76a775df6fd4a5
SHA1 9421d0caae14f9c69d553dd9f733b0673cd86ce5
SHA256 4f15cabdb7b3bf8c0c28b802fc5c51b993067eea030e86e05c57408eef5eec9f
SHA3 5e77c56f6f22630ae5b9f1c076542f7e200133b3e80ebe9237c82c00bf23f24c

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x32c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.54376
Detected Filetype PNG graphic file
MD5 68eb77d2159809bd8010042d041a9885
SHA1 90571a7dd2e6344c2734728b32ec8879f690d4d0
SHA256 4f207c68580a5f5ebc92f682da3851262ccd6d3947eb90c5e023787f7ddac1ff
SHA3 7df3faa412a7538c49a717feff78fd496753ab3ab8e2b47ec843e88b6014b81f

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x57a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.75989
Detected Filetype PNG graphic file
MD5 0baaf0aad76547bf9a6957ea20aef3c9
SHA1 3e000c0f8df23bc732aa959787ee3a8cd9940f4b
SHA256 b7e94ed89ae28a254527cfed107844a6132708381a7893f42832bd589b130484
SHA3 1a6aca976a0fcbd21d080ccca7440332b275dce70bf5cbe37fa8259e1f31db1a

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xcff
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.86492
Detected Filetype PNG graphic file
MD5 954897b405d47b188b6a1314955f6bed
SHA1 3a49c5bf60e30e77a4d2903b7aec7ba15c903c87
SHA256 e1e08954bda36ca3befa85501588af5e43d4784ea05641cc85dc819368e8c266
SHA3 1949dc2f6a8fb48d56c026f638457d06f34eee5a7d8b9907985fb1c8b03417ac

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x12ab
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.89539
Detected Filetype PNG graphic file
MD5 fbf55aaf65a49b6f5f1a59b7f4ac1905
SHA1 255beb58eb2b8f683bfe636f9d4fc66f950372e7
SHA256 5363f1df249ed207394076ec102b05d1a41548ab99b25720c99ad0c45a2d8602
SHA3 df56719d1b2029f4b80a28ebbfe1d3fb6ba7a6a8c90eb7a1eb6f8d4cd6dbe372

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4c07
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.96575
Detected Filetype PNG graphic file
MD5 31991e700c04cfb020ec3e6aa37d2b67
SHA1 16074b693a721ada41ccd6a396cef6c5ef3df13c
SHA256 6f2d9ab1faddf929f0129e8196ce62c7efe37c241f7d12b5466a7a38804f3870
SHA3 6fea05a0f911350671dfcbf2fcceb3c7428959d0d7de26f884472914f91afc9e

32512

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.8021
Detected Filetype Icon file
MD5 96661e9afe4cd4ebeb0f9d7fda2c6f6c
SHA1 ed7ee22cc94e37a67ba53715d100ac271b2b1b24
SHA256 d2f645951fb89f58a2ef395c9ba59dacdbc2b8cd08fbd5dbd36dbee5c765bf99
SHA3 f413e55b2e809eda60b4883460ff18948e0971d6627357b419c628d10cbdb737

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x1e8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28514
MD5 b0dd2fa382e25ab088221456d93b5f05
SHA1 4afe047ad9b6c9d13cbee9e5bf4dd5cdfa85bc7a
SHA256 a27a3dc8f934b5e187ea3eb5299d11ac9b5fbd033a0077bfd3c2ee0d82ee8839
SHA3 236fe130eb5b71719f2e742b666f4393285ca9fb1debf7bbe968cbaa92e66846

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x14e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.96056
MD5 01e4c8c046a47771f13cd120b53303e7
SHA1 2a4224d31c916a5cff4f2636a3cb47fdd84a5cc9
SHA256 b1cb832f790c153aa0e9a66f76e75460263cf1d41971d2dbcc9a4d87ec18b7d8
SHA3 680120ec819e7ba66519d9a8a3e446973c4cb28aa0146c91cceaa8c8fadc90ae

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 25.4.18.0
ProductVersion 25.4.18.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
FileVersion (#2) 25.10.7
ProductVersion (#2) 25.10.7
FileDescription Discord Quest Completer
ProductName Discord Quest Completer
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2025-Oct-07 14:04:13
Version 0.0
SizeofData 52
AddressOfRawData 0xd7f974
PointerToRawData 0xd7e374
Referenced File discord_quest_completer.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2025-Oct-07 14:04:13
Version 0.0
SizeofData 20
AddressOfRawData 0xd7f9a8
PointerToRawData 0xd7e3a8

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2025-Oct-07 14:04:13
Version 0.0
SizeofData 1048
AddressOfRawData 0xd7f9bc
PointerToRawData 0xd7e3bc

TLS Callbacks

StartAddressOfRawData 0x140d7fe20
EndAddressOfRawData 0x140d7ffec
AddressOfIndex 0x140fce3d0
AddressOfCallbacks 0x140ab2c78
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks 0x0000000140A59990

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140fcbd40

RICH Header

XOR Key 0x302687bd
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 14
ASM objects (35207) 9
C objects (35207) 13
C++ objects (35207) 47
Imports (33140) 5
C objects (35217) 12
Total imports 478
Unmarked objects (#2) 888
Resource objects (35217) 1
Linker (35217) 1

Errors

Leave a comment

No comments yet.