cd7818acc1838fab77fb15f81a083386f0ea571858c89f4ed30bf340bfa6143c

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Apr-19 15:28:59
Debug artifacts C:\projects\CUI\sui.pdb

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Info Interesting strings found in the binary: Contains domain names:
  • color.xyz
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 ff4432f961bad2d9e10efaf729ef04d5
SHA1 1572d0a8d5cfa8448b2851397911821d9f4ba19d
SHA256 cd7818acc1838fab77fb15f81a083386f0ea571858c89f4ed30bf340bfa6143c
SHA3 f6993a5bd0e9f4424364385671d7db6f7b28918940944cf3bdcc078cd1883d1e
SSDeep 24576:83lidStnKST6a0BF1HlRI90J+9xgMa6tf9Co+CZ6A4c4:oQgT6a0X1HlC+U9xgr/
Imports Hash 5e7473da47c3f68105cb35f8a9eae838

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2026-Apr-19 15:28:59
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x1bba00
SizeOfInitializedData 0x58600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000005966 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x21a000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 628c4a09e6370922cb5bbc87c25af735
SHA1 edf5291fad7f6ed03e6a668502956ac13afc6350
SHA256 5d53cb18433e6a00d40ad55c58491847f39b4bbe4b7ad0455e534c191026d066
SHA3 4ff34d8af51c22f2301df37513fa13ef1121553e1e3f3688def8fee992d46fc7
VirtualSize 0x1bb802
VirtualAddress 0x1000
SizeOfRawData 0x1bba00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.0809

.rdata

MD5 77cca813463e4a9d56e80c306d72b563
SHA1 2d5f9d532b65b0ba41959a8fd00fe6c0dcf32eec
SHA256 ae54f3ec8a0ae5e056f0b644e86f10f88970603115188885f1fe1a42395cbb51
SHA3 afddc5dcbf304a34bc7a422df4a571700331dce177f90e6b270f9f0d46df7df5
VirtualSize 0x2f334
VirtualAddress 0x1bd000
SizeOfRawData 0x2f400
PointerToRawData 0x1bbe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.14743

.data

MD5 ea41d1fee49497d034bbc18b215c50c9
SHA1 af7deea81159d41c38cfb78cc8354eb9e8cbd045
SHA256 be0fe86dff7067f41fd3dd6a2bd94c8bfc0959c6b2c167d48167e7e3f8183d35
SHA3 0895e9a7aa2546e08ba51407faecc55f7b3faf7390377091515bd6185b53f6ae
VirtualSize 0x111e1
VirtualAddress 0x1ed000
SizeOfRawData 0xe000
PointerToRawData 0x1eb200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.38909

.pdata

MD5 0d79af9cf36b36aafd65c7e725e81af1
SHA1 b8ab7dda818aff8e98e8ce0229351b4447645001
SHA256 68d6a55123c74123068c6514ea7788a2b74962c3a80ad46497a245ad904c13fb
SHA3 945e3b9be3c3bd670084c6ccd82adfab4c4a7f2a039618a5e1a2de1d1f0289c8
VirtualSize 0x13074
VirtualAddress 0x1ff000
SizeOfRawData 0x13200
PointerToRawData 0x1f9200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.70195

.idata

MD5 56d68568d0cc6871f487e21f8d35a3c0
SHA1 c4e36eb88d19e8d37106db661ed04cba87f0145d
SHA256 95837d686fd6e8604b5101ac158f6251a93fa5b44de239e82e793127ca85ceb1
SHA3 2f00142f73e05c4f00ee41a548d067493810048d8e86a50bde98e2f647370e69
VirtualSize 0x2553
VirtualAddress 0x213000
SizeOfRawData 0x2600
PointerToRawData 0x20c400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.61222

.00cfg

MD5 d3690610f717db70c283f3cc55b9c28b
SHA1 8ca829c7ec93a467ae3b022212e8815be30da696
SHA256 c6a874877700493be3dbeb60862c7be837a4ae63b69ae8609b80e632d31307fd
SHA3 367164203fc7afc04e36cf49b11be47ea2d020991458392dce93db888b9ff28f
VirtualSize 0x175
VirtualAddress 0x216000
SizeOfRawData 0x200
PointerToRawData 0x20ea00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.426558

.reloc

MD5 df27e3ad17689d852577d04d4522b47c
SHA1 0e95975f2755d71b4a4c80f12f8fb5dc7bfa9e6b
SHA256 e0e7f28fcf690bb9e052904ff182a7f3f05fc5b0e7610103cf5f31b46a1674cd
SHA3 d08b37b29d7289a9144ed31a3e67122d3943c5a419e4babffceac96bf4ac46a4
VirtualSize 0x24a3
VirtualAddress 0x217000
SizeOfRawData 0x2600
PointerToRawData 0x20ec00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 2.5993

Imports

USER32.dll GetWindowRect
GetClientRect
AdjustWindowRectEx
InvalidateRect
SetCursor
LoadIconA
GetCursorPos
ScreenToClient
GetWindowLongA
GetWindowThreadProcessId
LoadCursorA
GetMessageA
GetMonitorInfoA
MonitorFromWindow
MonitorFromPoint
LoadImageA
SystemParametersInfoA
GetIconInfo
SetWindowTextA
SetWindowRgn
EndPaint
BeginPaint
ReleaseDC
GetDC
UpdateWindow
GetSystemMetrics
SetTimer
ReleaseCapture
EmptyClipboard
RegisterClipboardFormatA
IsZoomed
SetWindowPos
SetLayeredWindowAttributes
UpdateLayeredWindow
ShowWindow
CreateWindowExA
RegisterClassExA
PostQuitMessage
DefWindowProcA
PostMessageA
SendMessageA
UnregisterHotKey
DispatchMessageA
TranslateMessage
TrackMouseEvent
GDI32.dll GetDeviceCaps
CreateRoundRectRgn
DeleteDC
DeleteObject
GetDIBits
SelectObject
SetPixelFormat
CreateDIBSection
GetObjectA
SwapBuffers
ChoosePixelFormat
OPENGL32.dll wglCreateContext
wglMakeCurrent
wglGetProcAddress
SHELL32.dll DragQueryFileA
DragFinish
DragAcceptFiles
MSVCP140D.dll ?_Xbad_function_call@std@@YAXXZ
?_Xout_of_range@std@@YAXPEBD@Z
?_Xinvalid_argument@std@@YAXPEBD@Z
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Xlength_error@std@@YAXPEBD@Z
KERNEL32.dll RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GlobalLock
GlobalUnlock
GlobalSize
GlobalAlloc
TerminateProcess
SetProcessWorkingSetSize
GetWindowsDirectoryA
GetTickCount64
GetCurrentProcess
SetUnhandledExceptionFilter
CloseHandle
OutputDebugStringA
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameA
VCRUNTIME140D.dll memcpy
memmove
memset
strstr
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__std_type_info_destroy_list
memchr
memcmp
__C_specific_handler
__current_exception
__current_exception_context
VCRUNTIME140_1D.dll __CxxFrameHandler4
ucrtbased.dll _invoke_watson
isalpha
isdigit
isxdigit
isspace
isalnum
toupper
tolower
_errno
wcslen
strcmp
strcpy
strlen
strncmp
strncpy
free
malloc
realloc
abort
abs
_lrotl
rand
strtof
strtod
strtol
strtoul
_CrtDbgReport
__acrt_iob_func
fopen_s
fclose
feof
fopen
fread
fseek
ftell
fwrite
__stdio_common_vfprintf
__stdio_common_vsprintf
__stdio_common_vsscanf
_dtest
acos
cos
fabs
fmod
log
pow
sin
sqrt
tan
ceil
floor
ldexp
nan
round
trunc
acosf
atan2f
ceilf
cosf
expf
floorf
fmodf
sinf
sqrtf
tanf
_wassert
_rotl
_callnewh
_free_dbg
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_cexit
_seh_filter_exe
_set_app_type
__setusermatherr
_get_narrow_winmain_command_line
_initterm
_initterm_e
exit
_exit
_set_fmode
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
terminate

Delayed Imports

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-Apr-19 15:28:59
Version 0.0
SizeofData 48
AddressOfRawData 0x1dcd70
PointerToRawData 0x1dbb70
Referenced File C:\projects\CUI\sui.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2026-Apr-19 15:28:59
Version 0.0
SizeofData 20
AddressOfRawData 0x1dcda0
PointerToRawData 0x1dbba0

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1401ed400

RICH Header

XOR Key 0x22551a60
Unmarked objects 0
ASM objects (35207) 4
C objects (35207) 10
C++ objects (35207) 32
Imports (35207) 6
Imports (33145) 13
Total imports 201
C++ objects (35225) 1
Linker (35225) 1

Errors

Leave a comment

No comments yet.