Windows
Analysis Report
Havij 1.12 Free.exe
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
Havij 1.12 Free.exe (PID: 6360 cmdline:
"C:\Users\ user\Deskt op\Havij 1 .12 Free.e xe" MD5: F30896202FCEA8645B2FF500C6BD2D2D) Havij 1.12 Free.tmp (PID: 6396 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-3VH 7B.tmp\Hav ij 1.12 Fr ee.tmp" /S L5="$402CC ,1684492,5 4272,C:\Us ers\user\D esktop\Hav ij 1.12 Fr ee.exe" MD5: F0CCFB46F867443700D31C969BDCF552) regsvr32.exe (PID: 3984 cmdline:
"C:\Window s\system32 \regsvr32. exe" /s "C :\Windows\ system32\R ICHTX32.oc x" MD5: 878E47C8656E53AE8A8A21E927C6F7E0) regsvr32.exe (PID: 6520 cmdline:
"C:\Window s\system32 \regsvr32. exe" /s "C :\Windows\ system32\M scomctl.oc x" MD5: 878E47C8656E53AE8A8A21E927C6F7E0) regsvr32.exe (PID: 7156 cmdline:
"C:\Window s\system32 \regsvr32. exe" /s "C :\Windows\ system32\M swinsck.oc x" MD5: 878E47C8656E53AE8A8A21E927C6F7E0) regsvr32.exe (PID: 5932 cmdline:
"C:\Window s\system32 \regsvr32. exe" /s "C :\Windows\ system32\c omdlg32.oc x" MD5: 878E47C8656E53AE8A8A21E927C6F7E0) Havij.exe (PID: 5952 cmdline:
"C:\Progra m Files (x 86)\Havij\ Havij.exe" MD5: C4810367FF8F1A6346E4E6963228C19D)
- cleanup
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: |
Source: | Mutant created: |
Source: | File created: |
Source: | File read: |
Source: | Key opened: |
Source: | Key value created or modified: |
Source: | ReversingLabs: |
Source: | File read: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Key value created or modified: |
Source: | Window found: |
Source: | File opened: |
Source: | Key value created or modified: |
Source: | Static file information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Window / User API: |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep count: | ||
Source: | Thread sleep count: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 21 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 12 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 1 Process Injection | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 2 System Owner/User Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 11 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Win32.Hacktool.Havij |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
35% | ReversingLabs | |||
4% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
4% | ReversingLabs | |||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
sites.target.map.fastly.net | 151.101.2.187 | true | false | unknown | |
www.target.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false | unknown | ||
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
151.101.2.187 | sites.target.map.fastly.net | United States | 54113 | FASTLYUS | false |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1494087 |
Start date and time: | 2024-08-17 00:31:53 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 20 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | Havij 1.12 Free.exe |
Detection: | MAL |
Classification: | mal56.winEXE@13/20@1/10 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, sv chost.exe - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , login.live.com, settings-win .data.microsoft.com, fe3cr.del ivery.mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found. - VT rate limit hit for: Havij
1.12 Free.exe
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | C4810367FF8F1A6346E4E6963228C19D |
SHA1: | 1B8C91D6E99F0C82C264221E26FDAC2E4810E50A |
SHA-256: | 96DF987A1C3D2ADA9BCC9785427FD9DFAA6D393C15FB8A546E48807701269737 |
SHA-512: | BC2DF9BD96CF906AF5839ABD4E1D5619A56AC8B9AE691506156799F00166715AE91E7E5BA01970F913E3B8CE7FC35DD2739B5974BC24F0491555E81FD5DDD7A4 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 39A58DAF51A64EF74605F02E725EB62F |
SHA1: | A0541BF0EBEA64B8B5B962AF723C8BF055BBC474 |
SHA-256: | 38020B5EC4FCAF9402B207F53B192D2822B623930228C21188BE39B5DA40D044 |
SHA-512: | FCFB8BBF4265D776CDD82BBAF0B04B6C7D7F79BBBA8C22A1B505C7139098A1B54FF33B6EB0E3C7C62D38640F18A0873E4B0E4B8798AA3499031D305D9BD4FCF0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0D17827CFAB2014C7E91A761EDF8AE8E |
SHA1: | 08CA45336610DA3C3E1BEA063F945AD2B1C3E3E3 |
SHA-256: | CC98881CC89F87FB18EBF3F700BE3F6B31DAC3CF596B6BC3AF693500D4C9ADBD |
SHA-512: | A16B6F7CDE1EE351EC8F42CCD5BA839F8874E2F8ABB53D7FEB1C98C9E5DC5CCBBBECBD919512FF4A1FF4255D240C961426BE5B0C3433AB801C6BEBD7B233EAB3 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | D091777E98C96BB8651A678B8FA01AA7 |
SHA1: | 0F101ED087A8EC67FFB11EECDF8624B49CF90467 |
SHA-256: | DD3459789F7D13D7055CF7CCEBFD361B4B2CD926CF5248E9BD62F72FAE1382F2 |
SHA-512: | 988CC06192A4099150AAAF20B30A00CB836FEB0972AD66A54942EAA581B890406B0415CD1C6DDC58574A99A321797097F9AEAB100FC4B2470408199FE85CC37B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4AF28EEDC30BB7D5B95CADFE3D1FD969 |
SHA1: | 2A8A3C1D0921EF1C142D30C7A4ED8798E10DDA7E |
SHA-256: | 50D118AFCEE6BE343B6277A7D00A9B988B7132C26BEF89252017EE86B2F1E6CF |
SHA-512: | 52484C1DE5E6E2D00CC545561CA3A5826808D7B10AF2E5CDEB61F1F7F7DE3038766E18D4947E37B5A74721A81BFEA6FB47C492219169FCBA3396E9BBCBE0BD03 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 7907 |
Entropy (8bit): | 4.7160650340496355 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0176ECA39C23B07D7BA0ED93A43743D9 |
SHA1: | 18C2ED4C086F818BE90E7DB02D70FDC303965DAD |
SHA-256: | AFCF3FFAB277678B7A29BDFBEBEB49A52049B8FA1F9D656FB6F34463E56D803E |
SHA-512: | 4A9C0D160D6D887D3022E03DEF6C132993890C30FC2B48303664332472E5ED58B565B1CFA34F0F41CB75DD09257BA62A73C82BA2505D3C0DEBE5A7CF1C824350 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 743 |
Entropy (8bit): | 4.658729935146697 |
Encrypted: | false |
SSDEEP: | |
MD5: | 39A58DAF51A64EF74605F02E725EB62F |
SHA1: | A0541BF0EBEA64B8B5B962AF723C8BF055BBC474 |
SHA-256: | 38020B5EC4FCAF9402B207F53B192D2822B623930228C21188BE39B5DA40D044 |
SHA-512: | FCFB8BBF4265D776CDD82BBAF0B04B6C7D7F79BBBA8C22A1B505C7139098A1B54FF33B6EB0E3C7C62D38640F18A0873E4B0E4B8798AA3499031D305D9BD4FCF0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 4756 |
Entropy (8bit): | 4.6627450540209665 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4AF28EEDC30BB7D5B95CADFE3D1FD969 |
SHA1: | 2A8A3C1D0921EF1C142D30C7A4ED8798E10DDA7E |
SHA-256: | 50D118AFCEE6BE343B6277A7D00A9B988B7132C26BEF89252017EE86B2F1E6CF |
SHA-512: | 52484C1DE5E6E2D00CC545561CA3A5826808D7B10AF2E5CDEB61F1F7F7DE3038766E18D4947E37B5A74721A81BFEA6FB47C492219169FCBA3396E9BBCBE0BD03 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1302528 |
Entropy (8bit): | 5.887909857753879 |
Encrypted: | false |
SSDEEP: | |
MD5: | C4810367FF8F1A6346E4E6963228C19D |
SHA1: | 1B8C91D6E99F0C82C264221E26FDAC2E4810E50A |
SHA-256: | 96DF987A1C3D2ADA9BCC9785427FD9DFAA6D393C15FB8A546E48807701269737 |
SHA-512: | BC2DF9BD96CF906AF5839ABD4E1D5619A56AC8B9AE691506156799F00166715AE91E7E5BA01970F913E3B8CE7FC35DD2739B5974BC24F0491555E81FD5DDD7A4 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 10697 |
Entropy (8bit): | 4.840390071374524 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0D17827CFAB2014C7E91A761EDF8AE8E |
SHA1: | 08CA45336610DA3C3E1BEA063F945AD2B1C3E3E3 |
SHA-256: | CC98881CC89F87FB18EBF3F700BE3F6B31DAC3CF596B6BC3AF693500D4C9ADBD |
SHA-512: | A16B6F7CDE1EE351EC8F42CCD5BA839F8874E2F8ABB53D7FEB1C98C9E5DC5CCBBBECBD919512FF4A1FF4255D240C961426BE5B0C3433AB801C6BEBD7B233EAB3 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 4305 |
Entropy (8bit): | 4.694496360874564 |
Encrypted: | false |
SSDEEP: | |
MD5: | D091777E98C96BB8651A678B8FA01AA7 |
SHA1: | 0F101ED087A8EC67FFB11EECDF8624B49CF90467 |
SHA-256: | DD3459789F7D13D7055CF7CCEBFD361B4B2CD926CF5248E9BD62F72FAE1382F2 |
SHA-512: | 988CC06192A4099150AAAF20B30A00CB836FEB0972AD66A54942EAA581B890406B0415CD1C6DDC58574A99A321797097F9AEAB100FC4B2470408199FE85CC37B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 721694 |
Entropy (8bit): | 6.49216236105162 |
Encrypted: | false |
SSDEEP: | |
MD5: | D3DB1742EAC55C42AF392C23F72DF92A |
SHA1: | 3A133963D2D695E38FFB75C0B565F5E5A6608C99 |
SHA-256: | E1D02B7D0D1A10277A761F151580666FCB1EEC7E4C9CA96AA5527EC6C1A264AA |
SHA-512: | 44CBD509513C0507E68B9C57735024CB3086AD51267B7E9BB42A7D087C6EA0B64702C91BF1D7CF2705EC07F0D8363999D41F3219927C8EBF3E7BD49719288987 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0176ECA39C23B07D7BA0ED93A43743D9 |
SHA1: | 18C2ED4C086F818BE90E7DB02D70FDC303965DAD |
SHA-256: | AFCF3FFAB277678B7A29BDFBEBEB49A52049B8FA1F9D656FB6F34463E56D803E |
SHA-512: | 4A9C0D160D6D887D3022E03DEF6C132993890C30FC2B48303664332472E5ED58B565B1CFA34F0F41CB75DD09257BA62A73C82BA2505D3C0DEBE5A7CF1C824350 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 2063 |
Entropy (8bit): | 4.551500889801332 |
Encrypted: | false |
SSDEEP: | |
MD5: | 741F39BE5556D7789BDCB97D1058F556 |
SHA1: | A9E80AF5BBB3B1372351DADAD76568D798975D69 |
SHA-256: | 3158497EC667DA3873339748D0F529C40034DF111A244069383C805F18A0A0B8 |
SHA-512: | C219B5436F4A1B4B0C7856A002B047F0B35FBF14C74F7FFD2645F5D34F8148484CAA5AA481BDDD61F01AA3737C91B62F504F5E7142B9B8ED65F2A273340DA8F5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | D3DB1742EAC55C42AF392C23F72DF92A |
SHA1: | 3A133963D2D695E38FFB75C0B565F5E5A6608C99 |
SHA-256: | E1D02B7D0D1A10277A761F151580666FCB1EEC7E4C9CA96AA5527EC6C1A264AA |
SHA-512: | 44CBD509513C0507E68B9C57735024CB3086AD51267B7E9BB42A7D087C6EA0B64702C91BF1D7CF2705EC07F0D8363999D41F3219927C8EBF3E7BD49719288987 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 996 |
Entropy (8bit): | 4.6385715643594025 |
Encrypted: | false |
SSDEEP: | |
MD5: | 725410CEB002D510D122902C55399054 |
SHA1: | D63B208F05C67093F3E3EA52DD790C5CB87A01FC |
SHA-256: | 5519F65CAF1E3C381CEE23D8801B5B8A5D1EAD82279BD0B2C95420AA7BF48EE6 |
SHA-512: | 923218939E4C56AB2FEE159CE6183258282DAA88C31B0E0D67A30B0BD76D350E64169C8F76875E0A1C00204178CB0E8E5C3ADFCBDD7E7B98EE1288F523480747 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1010 |
Entropy (8bit): | 4.681599003114028 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8639B3F7EA406BDCC3332A0D7181297D |
SHA1: | E0793B54B7FA3F00927D11B4A809CC507EEA6E7A |
SHA-256: | B4BD500704B92C85D2776B117A06A4663C042DA31221D38257DFFA419AD3AF38 |
SHA-512: | 53CE77E48B04D9CB2C301411D1E66F76399DBD391445172D06E1436360284287C3B6727AA92299C439484CCDCF2F834BB06F556D1A01F3F8C26300E583BD82C9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1015 |
Entropy (8bit): | 4.689968381927978 |
Encrypted: | false |
SSDEEP: | |
MD5: | 546841705A17915C637B7D6BEF6A4350 |
SHA1: | 1E0B1588EC6167A3A565BD4E280FF2351EE0E0BC |
SHA-256: | 255CBC728FE00E496877637C8DD04358ECB0139AC542CAF215357B01327C23BB |
SHA-512: | 1225DEF621DD8E443F17C86848B0904055500A28FC81A86B09B8970EE9138AC8FF1AEA8D09910C12DF8B67EE191D2310797C03D1ED3F29A43B880AD4D12241A4 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\Desktop\Havij 1.12 Free.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 711168 |
Entropy (8bit): | 6.484055707305179 |
Encrypted: | false |
SSDEEP: | |
MD5: | F0CCFB46F867443700D31C969BDCF552 |
SHA1: | F2474D5D7A906DE3BC3381CA79BB1EA60F0D6697 |
SHA-256: | 54BB849D30567D5F10AC359F8B503732A3FCD76AD7CC72007EAB843B784367BB |
SHA-512: | 71C7DE53D1DB03F1149C3E82FD92842CBD284D17C981267B20290F8D54BAF2B578F7830F64EB5308C82CF4AFF4F1937586624C2769DA74A463C8D4EBDCBE45EE |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 4.026670007889822 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0EE914C6F0BB93996C75941E1AD629C6 |
SHA1: | 12E2CB05506EE3E82046C41510F39A258A5E5549 |
SHA-256: | 4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2 |
SHA-512: | A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 6144 |
Entropy (8bit): | 4.215994423157539 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4FF75F505FDDCC6A9AE62216446205D9 |
SHA1: | EFE32D504CE72F32E92DCF01AA2752B04D81A342 |
SHA-256: | A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81 |
SHA-512: | BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 23312 |
Entropy (8bit): | 4.596242908851566 |
Encrypted: | false |
SSDEEP: | |
MD5: | 92DC6EF532FBB4A5C3201469A5B5EB63 |
SHA1: | 3E89FF837147C16B4E41C30D6C796374E0B8E62C |
SHA-256: | 9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87 |
SHA-512: | 9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Havij\Havij.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 4.91385331499306 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4F8648A6FF4C78B3998FA29368657D00 |
SHA1: | FB1C86A93859C4DA3BADC2FBB4A8A7D2ED64C1CC |
SHA-256: | 01C5708C565DA6354E52E163B25B64579AD80B951CEBBD6840D2382AF60CB929 |
SHA-512: | 58C3128A47566838B483F873A84C666BFCE32B4A2CD8593DAF2939834A0D1E3C4C7C29BCC46429C25EDC35D46695C6FF41BD82CFC065BB8188BA737050971EA9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | ECC7D7F0D3446DE36045D1D9E964FAFE |
SHA1: | DA6B0EC081D628C33B150327F3BD16D3B7FA4729 |
SHA-256: | BC58D624CEEA02AB086F1CCE809C992BF5A7105E88931853317A2F5AA5AFD6E4 |
SHA-512: | 443DE697BE9886CD97235E6468F3A7F6BF11612711E54DBA31431B0D9418672E1434E839ED50CACF28107F692F0C9D9D2F57D90E3A843D81015D459C180DB632 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | E8A2190A9E8EE5E5D2E0B599BBF9DDA6 |
SHA1: | 4E97BF9519C83835DA9DB309E61EC87DDF165167 |
SHA-256: | 80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311 |
SHA-512: | 57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 21034A336E16F30345A96DE9BD8CEC25 |
SHA1: | C9FB876A001874C4EE8670FABF12C36036F54A1F |
SHA-256: | 251A419BB5998882227A11188311B82F20C4952865FF916397973BD9A50C69D5 |
SHA-512: | ED1F33CD13F6CDA5AA4696271927FF2497A2BD33FEE606655ED50BB5F13CEDB81A3597844C1A8030E6FFA3C46ED34C217A55DAB062BA00A76F2F079B7DA2E86F |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | B73809A916E6D7C1AE56F182A2E8F7E2 |
SHA1: | 34E4213D8BF0E150D3F50AE0BD3F5B328E1105F5 |
SHA-256: | 64C6EE999562961D11AF130254AD3FFD24BB725D3C18E7877F9FD362F4936195 |
SHA-512: | 26C28CB6C7E1B47425403AB8850A765AC420DD6474327CE8469376219C830AB46218383D15A73C9EA3A23FC6B5F392EE6E2A1632A1BF644B1BD1A05A4729E333 |
Malicious: | true |
Antivirus: |
|
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 1081616 |
Entropy (8bit): | 6.346871871902746 |
Encrypted: | false |
SSDEEP: | |
MD5: | ECC7D7F0D3446DE36045D1D9E964FAFE |
SHA1: | DA6B0EC081D628C33B150327F3BD16D3B7FA4729 |
SHA-256: | BC58D624CEEA02AB086F1CCE809C992BF5A7105E88931853317A2F5AA5AFD6E4 |
SHA-512: | 443DE697BE9886CD97235E6468F3A7F6BF11612711E54DBA31431B0D9418672E1434E839ED50CACF28107F692F0C9D9D2F57D90E3A843D81015D459C180DB632 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 124688 |
Entropy (8bit): | 5.941729779329973 |
Encrypted: | false |
SSDEEP: | |
MD5: | E8A2190A9E8EE5E5D2E0B599BBF9DDA6 |
SHA1: | 4E97BF9519C83835DA9DB309E61EC87DDF165167 |
SHA-256: | 80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311 |
SHA-512: | 57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 260096 |
Entropy (8bit): | 5.236979537450169 |
Encrypted: | false |
SSDEEP: | |
MD5: | 21034A336E16F30345A96DE9BD8CEC25 |
SHA1: | C9FB876A001874C4EE8670FABF12C36036F54A1F |
SHA-256: | 251A419BB5998882227A11188311B82F20C4952865FF916397973BD9A50C69D5 |
SHA-512: | ED1F33CD13F6CDA5AA4696271927FF2497A2BD33FEE606655ED50BB5F13CEDB81A3597844C1A8030E6FFA3C46ED34C217A55DAB062BA00A76F2F079B7DA2E86F |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp |
File Type: | |
Category: | dropped |
Size (bytes): | 140488 |
Entropy (8bit): | 6.138293118127049 |
Encrypted: | false |
SSDEEP: | |
MD5: | B73809A916E6D7C1AE56F182A2E8F7E2 |
SHA1: | 34E4213D8BF0E150D3F50AE0BD3F5B328E1105F5 |
SHA-256: | 64C6EE999562961D11AF130254AD3FFD24BB725D3C18E7877F9FD362F4936195 |
SHA-512: | 26C28CB6C7E1B47425403AB8850A765AC420DD6474327CE8469376219C830AB46218383D15A73C9EA3A23FC6B5F392EE6E2A1632A1BF644B1BD1A05A4729E333 |
Malicious: | true |
Reputation: | unknown |
Preview: |
File type: | |
Entropy (8bit): | 7.993672506437042 |
TrID: |
|
File name: | Havij 1.12 Free.exe |
File size: | 1'929'082 bytes |
MD5: | f30896202fcea8645b2ff500c6bd2d2d |
SHA1: | ac6b54c6df78e35e4dc244c28466197fd6160cee |
SHA256: | 7a1ec0f8ccec380809b8fcf66b9df8bd856dcf3814829d0bae98f999101585c8 |
SHA512: | 0da26c338656e651a54fd09bc10802b8d1770ff7daaa6ecb48f8763b814cbc41ddb15ef855fd1e47d8d14d7dbb5be8fb7438ca3bac763520a9d10bf2b06ecfdf |
SSDEEP: | 49152:H2m5e3oF/QvqkIsVLugpshGyidsqP63FYTPz13:Wm5syMIqLxpshGygP4YTLR |
TLSH: | 0F95334157F5113FE463A9B449476A101A3BBD3B293C5258F33CAE4D0F236D2BAD9B82 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 2d2e3797b32b2b99 |
Entrypoint: | 0x409b60 |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 1 |
OS Version Minor: | 0 |
File Version Major: | 1 |
File Version Minor: | 0 |
Subsystem Version Major: | 1 |
Subsystem Version Minor: | 0 |
Import Hash: | 884310b1928934402ea6fec1dbd3cf5e |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFC4h |
push ebx |
push esi |
push edi |
xor eax, eax |
mov dword ptr [ebp-10h], eax |
mov dword ptr [ebp-24h], eax |
call 00007F44C1017EEBh |
call 00007F44C10190F2h |
call 00007F44C101B31Dh |
call 00007F44C101B364h |
call 00007F44C101DC93h |
call 00007F44C101DDFAh |
xor eax, eax |
push ebp |
push 0040A217h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
xor edx, edx |
push ebp |
push 0040A1E0h |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
mov eax, dword ptr [0040C014h] |
call 00007F44C101E820h |
call 00007F44C101E387h |
lea edx, dword ptr [ebp-10h] |
xor eax, eax |
call 00007F44C101B94Dh |
mov edx, dword ptr [ebp-10h] |
mov eax, 0040CDF0h |
call 00007F44C1017F9Ch |
push 00000002h |
push 00000000h |
push 00000001h |
mov ecx, dword ptr [0040CDF0h] |
mov dl, 01h |
mov eax, 004072ECh |
call 00007F44C101C1DCh |
mov dword ptr [0040CDF4h], eax |
xor edx, edx |
push ebp |
push 0040A198h |
push dword ptr fs:[edx] |
mov dword ptr fs:[edx], esp |
call 00007F44C101E890h |
mov dword ptr [0040CDFCh], eax |
mov eax, dword ptr [0040CDFCh] |
cmp dword ptr [eax+0Ch], 01h |
jne 00007F44C101E9CAh |
mov eax, dword ptr [0040CDFCh] |
mov edx, 00000028h |
call 00007F44C101C5DDh |
mov edx, dword ptr [0040CDFCh] |
cmp eax, dword ptr [edx+00h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xd000 | 0x950 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x11000 | 0x2c00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xf000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x9280 | 0x9400 | 5d87ded351b0b41961d927fb546efca7 | False | 0.6105363175675675 | data | 6.537825193518719 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0xb000 | 0x24c | 0x400 | e8b4b57d70dce84e92f20fc39f4aa0ce | False | 0.30859375 | data | 2.7354399295454255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0xc000 | 0xe54 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xd000 | 0x950 | 0xa00 | bb5485bf968b970e5ea81292af2acdba | False | 0.414453125 | data | 4.430733069799036 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xe000 | 0x8 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0xf000 | 0x18 | 0x200 | 9ba824905bf9c7922b6fc87a38b74366 | False | 0.052734375 | data | 0.2044881574398449 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0x8b0 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0x11000 | 0x2c00 | 0x2c00 | d7d545b94a93321c2a2b5f7f2fa08917 | False | 0.32270951704545453 | data | 4.459920513264149 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x11354 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | Dutch | Netherlands | 0.5675675675675675 |
RT_ICON | 0x1147c | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | Dutch | Netherlands | 0.4486994219653179 |
RT_ICON | 0x119e4 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | Dutch | Netherlands | 0.4637096774193548 |
RT_ICON | 0x11ccc | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152 | Dutch | Netherlands | 0.3935018050541516 |
RT_STRING | 0x12574 | 0x2f2 | data | 0.35543766578249336 | ||
RT_STRING | 0x12868 | 0x30c | data | 0.3871794871794872 | ||
RT_STRING | 0x12b74 | 0x2ce | data | 0.42618384401114207 | ||
RT_STRING | 0x12e44 | 0x68 | data | 0.75 | ||
RT_STRING | 0x12eac | 0xb4 | data | 0.6277777777777778 | ||
RT_STRING | 0x12f60 | 0xae | data | 0.5344827586206896 | ||
RT_RCDATA | 0x13010 | 0x2c | data | 1.1590909090909092 | ||
RT_GROUP_ICON | 0x1303c | 0x3e | data | English | United States | 0.8387096774193549 |
RT_VERSION | 0x1307c | 0x4b8 | COM executable for DOS | English | United States | 0.2723509933774834 |
RT_MANIFEST | 0x13534 | 0x560 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.4251453488372093 |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle |
user32.dll | MessageBoxA |
oleaut32.dll | VariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA |
kernel32.dll | WriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle |
user32.dll | TranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA |
comctl32.dll | InitCommonControls |
advapi32.dll | AdjustTokenPrivileges |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Dutch | Netherlands | |
English | United States |