85bf6412175c6f57c85325453355ff3d

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Feb-14 16:01:42
Detected languages English - United States

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Unusual section name found: .ChNdhrZ
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Has Internet access capabilities:
  • WinHttpOpen
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 85bf6412175c6f57c85325453355ff3d
SHA1 47e6a2a5e951719cff59a2f5e1ec20b41bd2632c
SHA256 0a84a6b78475264d3b22b00df24fc9c050d40927522ec18819837af87bf6a107
SHA3 f743b421b0587d44bfec394d490e18dae72d445a3876cc70a3ec7ca859898522
SSDeep 196608:U0epy7yiRPPwXeN0dnTjLXl0n5eTH2732WfUf:Ud6twXe09TjLXl0ATHUtf
Imports Hash 190e6a09c77efcfe5d4daf0e75ed6965

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 9
TimeDateStamp 2026-Feb-14 16:01:42
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xa7c00
SizeOfInitializedData 0x2d000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000C02BBF (Section: .ChNdhrZ)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x1038000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.ChNdhrZ

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0xa7a63
VirtualAddress 0x1000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ

.ChNdhrZ (#2)

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x25620
VirtualAddress 0xa9000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.ChNdhrZ (#3)

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x14a0
VirtualAddress 0xcf000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.ChNdhrZ (#4)

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x5a9c
VirtualAddress 0xd1000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.ChNdhrZ (#5)

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x5af05a
VirtualAddress 0xd7000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ

.ChNdhrZ (#6)

MD5 dd8000a7e55968226f8766b87735193e
SHA1 0a174d7e5fd39b2ce9cdb14e37cafc608528c68c
SHA256 15e04c29d49166a23c2a8a610108c21555bebd6a83a79a8e298ebb47e00b665f
SHA3 05e0078b935dd6a5035feee8e7a1dccedf899556ebf0fbc409a255bca7da3ca6
VirtualSize 0xe48
VirtualAddress 0x687000
SizeOfRawData 0x1000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.281588

.ChNdhrZ (#7)

MD5 519badf9da1fc48915993a9dd5f2131d
SHA1 73856d55a1efd2ffc94b740e232b91d31b5e3dc6
SHA256 bafdd97527d8f0ee17d9a148a8797eb602dcfe57ca68d0940f454415e084eee4
SHA3 a662715cfb00aab6b5e86d7dca5e32d0016d029fbc7b2c9daa51f32e3e41ab72
VirtualSize 0x9adbfc
VirtualAddress 0x688000
SizeOfRawData 0x9adc00
PointerToRawData 0x1400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 7.79441

.ChNdhrZ (#8)

MD5 130f700bab3f978f76d83afee81d3b3b
SHA1 ea3a998873d77f3890defee2e0eb195bdbb4c6fe
SHA256 25a5a5c305cc34b14604a3f62904f433a82f2fcfbde5fc3da2eb1dfb778d3aa6
SHA3 65d71aa2bb518d9c16a9b216701e6b4f3efb9fda963574295f8560ad4fe2136d
VirtualSize 0x128
VirtualAddress 0x1036000
SizeOfRawData 0x200
PointerToRawData 0x9af000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.62898

.ChNdhrZ (#9)

MD5 5fc964e54d6d3c6857a697a25a9bde7d
SHA1 dc378cb49041d596663aff0b0ad2e4afd13fdbff
SHA256 d3a11edd0dc55bce79323c592595b0c7fc1add80374db74709946a8ae119b7cd
SHA3 9c95df3f3f5a74f11127a369615fe27adbfa205fb3a4f6288ce7bb1107d92de1
VirtualSize 0x1e0
VirtualAddress 0x1037000
SizeOfRawData 0x200
PointerToRawData 0x9af200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.78028

Imports

ntdll.dll RtlCaptureStackBackTrace
KERNEL32.dll Module32First
USER32.dll UnregisterClassA
GDI32.dll GetDeviceCaps
ADVAPI32.dll GetTokenInformation
ole32.dll CoCreateInstance
OLEAUT32.dll SysAllocString
MSVCP140.dll ??1facet@locale@std@@MEAA@XZ
WINHTTP.dll WinHttpOpen
IMM32.dll ImmSetCompositionWindow
d3d9.dll Direct3DCreate9
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll __std_type_info_compare
api-ms-win-crt-heap-l1-1-0.dll _callnewh
api-ms-win-crt-stdio-l1-1-0.dll _wfopen
api-ms-win-crt-time-l1-1-0.dll _mktime64
api-ms-win-crt-runtime-l1-1-0.dll terminate
api-ms-win-crt-math-l1-1-0.dll sinf
api-ms-win-crt-convert-l1-1-0.dll strtod
api-ms-win-crt-filesystem-l1-1-0.dll _lock_file
api-ms-win-crt-locale-l1-1-0.dll ___lc_collate_cp_func
api-ms-win-crt-environment-l1-1-0.dll getenv
api-ms-win-crt-string-l1-1-0.dll strcat_s
api-ms-win-crt-utility-l1-1-0.dll qsort
KERNEL32.dll (#2) Module32First

Delayed Imports

1

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x188
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.89623
MD5 b8e76ddb52d0eb41e972599ff3ca431b
SHA1 fc12d7ad112ddabfcd8f82f290d84e637a4d62f8
SHA256 165c5c883fd4fd36758bcba6baf2faffb77d2f4872ffd5ee918a16f91de5a8a8
SHA3 37f83338b28cb102b1b14f27280ba1aa3fffb17f7bf165cb7b675b7e8eb7cddd

Version Info

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1400cf040

RICH Header

Errors

[!] Error: Could not reach the TLS callback table. [*] Warning: Section .ChNdhrZ has a size of 0! [*] Warning: Section .ChNdhrZ has a size of 0! [*] Warning: Section .ChNdhrZ has a size of 0! [*] Warning: Section .ChNdhrZ has a size of 0! [*] Warning: Section .ChNdhrZ has a size of 0!