afca12717fb5a1294b84215fbecdac2020d7e350cf0a7f75a356a61ce632799d

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2026-Feb-12 00:41:14
Detected languages English - United States
Debug artifacts C:\Users\kanax\source\repos\CrackMeEasy\x64\Release\CrackMeEasy.pdb

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious VirusTotal score: 2/72 (Scanned on 2026-03-16 10:11:51) APEX: Malicious
MaxSecure: Trojan.Malware.300983.susgen

Hashes

MD5 da56872e97eb7a0967063ebe7f28bcad
SHA1 a04e525f34c65c4d5de8378ec273473820bed8f2
SHA256 afca12717fb5a1294b84215fbecdac2020d7e350cf0a7f75a356a61ce632799d
SHA3 275a0aebfcf807c4f97e1656798a9b6c28f93e8a63b8443b02f719a4ae535e47
SSDeep 384:VUhh7qyb1U48MsOCHGU3KRgCVI5xTorEYHg:VWZbq48pByVIMEYHg
Imports Hash f8e09da968b79672cefca321270d33af

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2026-Feb-12 00:41:14
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x1c00
SizeOfInitializedData 0x2a00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000002128 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x9000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 bd97d47f75bef94318f26bdb5e86ed99
SHA1 7140cfcf949da6f6cda2b6a9defdac41bab80431
SHA256 924fc90b3561cd61ed9ecfbdf254e84582a069b1fa0d7a560cf240a4cb79ea0a
SHA3 0b5b549f6dccac2ea44fcec37ab11f9ff642be3196e0015bd7d1b4f9ef42a7dd
VirtualSize 0x1a93
VirtualAddress 0x1000
SizeOfRawData 0x1c00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.88688

.rdata

MD5 e07d5f2c4c05ecdc26d078b59971a8b9
SHA1 96b035de242d097f71f5f4eef929ed3d2b5423cf
SHA256 00cc32f259dc1ecf7b83530674002e95a15456fe2be34c2ea75e9791bfed4a58
SHA3 99705b65089d7bda5e30f98bf30d78cc6c70c3d6aa6090123f34651ff722ab50
VirtualSize 0x1d1c
VirtualAddress 0x3000
SizeOfRawData 0x1e00
PointerToRawData 0x2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.35126

.data

MD5 65acfe65a73daba092f7d15ffce4db07
SHA1 72a782f2750e975824666d278f24681565fdedb8
SHA256 eaf9727305146331d7f0cfa055ee9152ed325e7d52b8de2f7a13287a8cf8ffbc
SHA3 98aa5ac71b0fc9e1e99b77cee2f9799f1ee67aa25ca94f3885ca5177b60744a6
VirtualSize 0x248
VirtualAddress 0x5000
SizeOfRawData 0x200
PointerToRawData 0x3e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.52812

.pdata

MD5 fc4aa5f316638eb9ea4523a26914021f
SHA1 801c17cb03fb52a622a3b7ee60f01ca64e065a61
SHA256 14e55817584bd67af9805a52abe4688c86beeb8ae30c755f338837d97c01b626
SHA3 950554df540c4d907ab95601f4f7dd580665635c19a9064070d18f968c480740
VirtualSize 0x294
VirtualAddress 0x6000
SizeOfRawData 0x400
PointerToRawData 0x4000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.78233

.rsrc

MD5 0b35de07beeb30d1d6013cbca2846303
SHA1 c98626ce4d587471d115df6f42cb0f5221f13689
SHA256 c9ed38ed40cfe8c1718cbf78be16bb4aa76b76097a449f9ea315aee9fd20df0d
SHA3 76678b071daa4ec33980be3b819260aea5ade31193b0580e19b41e16156137cf
VirtualSize 0x1e0
VirtualAddress 0x7000
SizeOfRawData 0x200
PointerToRawData 0x4400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.7015

.reloc

MD5 118fcff0d56fb6619d6f3220ad1fd16f
SHA1 05981308dbb3cd2bd439786b6709fc89b3c72e0b
SHA256 2326312fde5c4acd5d418a8a18a757264f0e102ce0d4be8617852b90ba01f527
SHA3 5e6700d21cd2151a047da28bec7e3b4df22b50b111aa1f6cc8b84cd1bae43464
VirtualSize 0x60
VirtualAddress 0x8000
SizeOfRawData 0x200
PointerToRawData 0x4600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 1.34363

Imports

MSVCP140.dll ?_Xlength_error@std@@YAXPEBD@Z
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?id@?$ctype@D@std@@2V0locale@2@A
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?ignore@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
?good@ios_base@std@@QEBA_NXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?_Xbad_alloc@std@@YAXXZ
?_Id_cnt@id@locale@std@@0HA
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exceptions@std@@YAHXZ
??0_Lockit@std@@QEAA@H@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
??1_Lockit@std@@QEAA@XZ
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll __std_exception_destroy
__std_exception_copy
__std_terminate
__C_specific_handler
memcpy
memcmp
__current_exception
_CxxThrowException
__current_exception_context
api-ms-win-crt-heap-l1-1-0.dll free
malloc
_callnewh
_set_new_mode
api-ms-win-crt-runtime-l1-1-0.dll __p___argc
__p___argv
_c_exit
_exit
exit
_initterm_e
_configure_narrow_argv
terminate
_initterm
_initialize_narrow_environment
_get_initial_narrow_environment
_initialize_onexit_table
_register_thread_local_exe_atexit_callback
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
api-ms-win-crt-math-l1-1-0.dll __setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll __p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale
KERNEL32.dll InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
api-ms-win-crt-string-l1-1-0.dll strlen

Delayed Imports

1

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-Feb-12 00:41:14
Version 0.0
SizeofData 92
AddressOfRawData 0x395c
PointerToRawData 0x295c
Referenced File C:\Users\kanax\source\repos\CrackMeEasy\x64\Release\CrackMeEasy.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2026-Feb-12 00:41:14
Version 0.0
SizeofData 20
AddressOfRawData 0x39b8
PointerToRawData 0x29b8

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2026-Feb-12 00:41:14
Version 0.0
SizeofData 800
AddressOfRawData 0x39cc
PointerToRawData 0x29cc

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2026-Feb-12 00:41:14
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140005040

RICH Header

XOR Key 0x90fbc956
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 12
ASM objects (35403) 3
C objects (35403) 10
C++ objects (35403) 26
Imports (35403) 7
Imports (33145) 2
Total imports 80
C++ objects (LTCG) (35723) 1
Resource objects (35723) 1
Linker (35723) 1

Errors

Leave a comment

No comments yet.