8f23594d3b55493efb332da1e28a93b8

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2023-May-09 13:38:50
Detected languages English - United States
CompanyName crack-westernpips.com
FileDescription musaviahmad952@gmail.com
FileVersion 1.0.0.4
InternalName msimg32.dll
LegalCopyright Copyright (C) 2021
OriginalFilename msimg32.dll
ProductName Patcher-MT5-ONLY3661
ProductVersion 1.0.0.4

Plugin Output

Info Interesting strings found in the binary: Contains domain names:
  • crack-westernpips.com
  • gmail.com
  • westernpips.com
Info Libraries used to perform cryptographic operations: Microsoft's Cryptography API
Suspicious This PE is packed with VMProtect Unusual section name found: .vmp0
Unusual section name found: .vmp1
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Uses Microsoft's cryptographic API:
  • CryptCreateHash
Malicious VirusTotal score: 45/72 (Scanned on 2024-10-04 18:00:57) ALYac: Gen:Variant.Tedy.560469
APEX: Malicious
AVG: Other:Malware-gen [Trj]
AhnLab-V3: Trojan/Win.Generic.C5488955
Alibaba: Packed:Win64/VMProtect.938927d7
Antiy-AVL: Trojan[Packed]/Win64.VMProtect
Arcabit: Trojan.Tedy.D88D55
Avast: Other:Malware-gen [Trj]
BitDefender: Gen:Variant.Tedy.560469
Bkav: W64.AIDetectMalware
CTX: dll.unknown.tedy
CrowdStrike: win/malicious_confidence_100% (W)
Cylance: Unsafe
Cynet: Malicious (score: 100)
DeepInstinct: MALICIOUS
ESET-NOD32: a variant of Win64/Packed.VMProtect.L suspicious
Elastic: malicious (high confidence)
Emsisoft: Gen:Variant.Tedy.560469 (B)
FireEye: Gen:Variant.Tedy.560469
Fortinet: Riskware/Application
GData: Gen:Variant.Tedy.560469
Google: Detected
Ikarus: Trojan.Win32.VMProtect
K7AntiVirus: Trojan ( 0058cdc71 )
K7GW: Trojan ( 0058cdc71 )
Lionic: Trojan.Win32.VMProtect.4!c
Malwarebytes: VMProtect.Trojan.MalPack.DDS
MaxSecure: Trojan.Malware.199882630.susgen
McAfee: Artemis!8F23594D3B55
McAfeeD: ti!4CD40E705E26
MicroWorld-eScan: Gen:Variant.Tedy.560469
Paloalto: generic.ml
Panda: Trj/Chgt.AD
SentinelOne: Static AI - Suspicious PE
Skyhigh: BehavesLike.Win64.Packed.rc
Sophos: Mal/VMProtBad-A
Symantec: ML.Attribute.HighConfidence
Trapmine: suspicious.low.ml.score
TrendMicro: TROJ_GEN.R002C0RGJ23
TrendMicro-HouseCall: TROJ_GEN.R002C0RGJ23
VIPRE: Gen:Variant.Tedy.560469
Varist: W64/ABRisk.VITS-3205
ViRobot: Trojan.Win.Z.Vmprotect.4247552
Webroot: W32.Hack.Tool
alibabacloud: VirTool:Win/Packed.VMProtect.L

Hashes

MD5 8f23594d3b55493efb332da1e28a93b8
SHA1 fc1550adffd9b2cb131bfcc6ae7fee409004fdce
SHA256 4cd40e705e26b99f082d32c9698df2400163f578443907ccd0301afd24877b40
SHA3 5d52a146370bdeddace8a5b621206ca1888106456d8d33d9d59c9485a5526681
SSDeep 98304:UxU0DsTSysHlGc0J3J+Lu4zsDaZQug+6SKS:2BXlGc0sbQugZ
Imports Hash 216c7abd8b3cf957faf0dc14fcf9fcc5

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 11
TimeDateStamp 2023-May-09 13:38:50
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x42200
SizeOfInitializedData 0x1fa00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000321BFC (Section: .vmp1)
BaseOfCode 0x1000
ImageBase 0x180000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x6f5000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x42118
VirtualAddress 0x1000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ

.rdata

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x15aca
VirtualAddress 0x44000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.data

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x2ffc
VirtualAddress 0x5a000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.pdata

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x3198
VirtualAddress 0x5d000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.detourc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x21f0
VirtualAddress 0x61000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.detourd

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x18
VirtualAddress 0x64000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

_RDATA

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0xf4
VirtualAddress 0x65000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.vmp0

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x27fcab
VirtualAddress 0x66000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ

.vmp1

MD5 16f7d36aabc643e1c3fba49220c758da
SHA1 3c11b7b1a4e6f058b591d9b7cd0e0e3c6f3a914b
SHA256 390a154d90c6e98bd09effc41792a101da7189783d47ff4692a152f5951d37d6
SHA3 73e9cbc5651c7d6b6baa12e707c8a7a81e7c3db130459cda1800badf0dd5bbb1
VirtualSize 0x40c234
VirtualAddress 0x2e6000
SizeOfRawData 0x40c400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 7.84576

.reloc

MD5 b21cf71a2b82eb8d20b68e72b587172d
SHA1 669fe48a32bd122e9371e54efb88f62ed958b618
SHA256 1518501900c10d10b65a31225480bb996d87fd019a12dfa96c83049dc0e366f6
SHA3 ec681002affd599063c663bf440b02e87809497c21530717545102c6aa2bc40b
VirtualSize 0xb8
VirtualAddress 0x6f3000
SizeOfRawData 0x200
PointerToRawData 0x40c800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.9495

.rsrc

MD5 360e1f2179b85704e7858737dd932d6b
SHA1 e72045503b9ead6848076cc5000f47ded5522064
SHA256 41e1a28a0e6e35c81982cca81ea16588f50a688d39e353d4c5758fd9cf1babdb
SHA3 2b6a8add84bdc64e444f652a86efb0870f65287eed88bff4536d9874d0bec534
VirtualSize 0x515
VirtualAddress 0x6f4000
SizeOfRawData 0x600
PointerToRawData 0x40ca00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.7605

Imports

KERNEL32.dll InitializeCriticalSectionEx
USER32.dll MessageBoxW
ADVAPI32.dll CryptCreateHash
VERSION.dll VerQueryValueW
WTSAPI32.dll WTSSendMessageW
KERNEL32.dll (#2) InitializeCriticalSectionEx
USER32.dll (#2) MessageBoxW
KERNEL32.dll (#3) InitializeCriticalSectionEx
USER32.dll (#3) MessageBoxW

Delayed Imports

AlphaBlend

Ordinal 1
Address 0x4790

DllInitialize

Ordinal 2
Address 0x47b0

GradientFill

Ordinal 3
Address 0x47d0

TransparentBlt

Ordinal 4
Address 0x47f0

vSetDdrawflag

Ordinal 5
Address 0x4810

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x2f8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.44346
MD5 fc3f81c3331b7e63477c31b8d7d9aef9
SHA1 73044661b87f1ea0a51d646cbc254ec3df065191
SHA256 aad285d71ab3d33ecfa97c173c7a9887290aa46a93128edca6b8931daaa67344
SHA3 b152028e0373dabc0a334acd738473157fea50bbfdd8852871d2f1dfbf5cff6b

2

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.4
ProductVersion 1.0.0.4
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_DLL
Language English - United States
CompanyName crack-westernpips.com
FileDescription musaviahmad952@gmail.com
FileVersion (#2) 1.0.0.4
InternalName msimg32.dll
LegalCopyright Copyright (C) 2021
OriginalFilename msimg32.dll
ProductName Patcher-MT5-ONLY3661
ProductVersion (#2) 1.0.0.4
Resource LangID English - United States

TLS Callbacks

Load Configuration

Size 0x138
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x18005a088

RICH Header

Errors

[!] Error: Could not reach the TLS callback table. [*] Warning: Section .text has a size of 0! [*] Warning: Section .rdata has a size of 0! [*] Warning: Section .data has a size of 0! [*] Warning: Section .pdata has a size of 0! [*] Warning: Section .detourc has a size of 0! [*] Warning: Section .detourd has a size of 0! [*] Warning: Section _RDATA has a size of 0! [*] Warning: Section .vmp0 has a size of 0! [*] Warning: 1 invalid export(s) not shown.