Edit tour

Windows Analysis Report
Havij 1.12 Free.exe

Overview

General Information

Sample name:Havij 1.12 Free.exe
Analysis ID:1494087
MD5:f30896202fcea8645b2ff500c6bd2d2d
SHA1:ac6b54c6df78e35e4dc244c28466197fd6160cee
SHA256:7a1ec0f8ccec380809b8fcf66b9df8bd856dcf3814829d0bae98f999101585c8
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • Havij 1.12 Free.exe (PID: 6360 cmdline: "C:\Users\user\Desktop\Havij 1.12 Free.exe" MD5: F30896202FCEA8645B2FF500C6BD2D2D)
    • Havij 1.12 Free.tmp (PID: 6396 cmdline: "C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp" /SL5="$402CC,1684492,54272,C:\Users\user\Desktop\Havij 1.12 Free.exe" MD5: F0CCFB46F867443700D31C969BDCF552)
      • regsvr32.exe (PID: 3984 cmdline: "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\RICHTX32.ocx" MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 6520 cmdline: "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mscomctl.ocx" MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 7156 cmdline: "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mswinsck.ocx" MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • regsvr32.exe (PID: 5932 cmdline: "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\comdlg32.ocx" MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • Havij.exe (PID: 5952 cmdline: "C:\Program Files (x86)\Havij\Havij.exe" MD5: C4810367FF8F1A6346E4E6963228C19D)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Program Files (x86)\Havij\Havij.exe (copy)ReversingLabs: Detection: 34%
Source: Havij 1.12 Free.exeReversingLabs: Detection: 39%
Source: Havij 1.12 Free.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: global trafficHTTP traffic detected: GET /index.asp?id=123 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=-9.9 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123%20and%201=1 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123%20and%201=0 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123'%20and%20'x'='x HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123'%20and%20'x'='y HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123"%20and%20"x"="x HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /index.asp?id=123 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=-9.9 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123%20and%201=1 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123%20and%201=0 HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123'%20and%20'x'='x HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123'%20and%20'x'='y HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficHTTP traffic detected: GET /index.asp?id=123"%20and%20"x"="x HTTP/1.1Host: www.target.comAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) HavijConnection: Close
Source: global trafficDNS traffic detected: DNS query: www.target.com
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-RFT14.tmp
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-4DJGA.tmp
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-MT9FI.tmp
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-TERC1.tmp
Source: Havij 1.12 Free.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: Havij 1.12 Free.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: mal56.winEXE@13/20@1/10
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Program Files (x86)\Havij
Source: C:\Program Files (x86)\Havij\Havij.exeMutant created: NULL
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeFile created: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile read: C:\Program Files (x86)\desktop.ini
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
Source: Havij 1.12 Free.exeReversingLabs: Detection: 39%
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeFile read: C:\Users\user\Desktop\Havij 1.12 Free.exe
Source: unknownProcess created: C:\Users\user\Desktop\Havij 1.12 Free.exe "C:\Users\user\Desktop\Havij 1.12 Free.exe"
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeProcess created: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp "C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp" /SL5="$402CC,1684492,54272,C:\Users\user\Desktop\Havij 1.12 Free.exe"
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeProcess created: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp "C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp" /SL5="$402CC,1684492,54272,C:\Users\user\Desktop\Havij 1.12 Free.exe"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\RICHTX32.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mscomctl.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mswinsck.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\comdlg32.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Program Files (x86)\Havij\Havij.exe "C:\Program Files (x86)\Havij\Havij.exe"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\RICHTX32.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mscomctl.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mswinsck.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\comdlg32.ocx"
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess created: C:\Program Files (x86)\Havij\Havij.exe "C:\Program Files (x86)\Havij\Havij.exe"
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: shfolder.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: textshaping.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: explorerframe.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: sfc.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: sfc_os.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: linkinfo.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: ntshrui.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: cscapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: oledlg.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sxs.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sxs.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: wsock32.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sxs.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sxs.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: msvbvm60.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: vb6zz.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: uxtheme.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: sxs.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: asycfilt.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: textshaping.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: olepro32.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: oledlg.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: riched32.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: riched20.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: usp10.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: msls31.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: dataexchange.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: d3d11.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: dcomp.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: dxgi.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: twinapi.appcore.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: textinputframework.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: coreuicomponents.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: coremessaging.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: ntmarta.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: coremessaging.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: wintypes.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: wintypes.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: wintypes.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: wsock32.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: mswsock.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: winskenu.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: winsken.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: winsenu.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: napinsp.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: pnrpnsp.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: wshbth.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: nlaapi.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: iphlpapi.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: dnsapi.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: winrnr.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: fwpuclnt.dll
Source: C:\Program Files (x86)\Havij\Havij.exeSection loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpWindow found: window name: TMainForm
Source: C:\Program Files (x86)\Havij\Havij.exeFile opened: C:\Windows\SysWOW64\RichEd32.DLL
Source: C:\Windows\SysWOW64\regsvr32.exeKey value created or modified: HKEY_CURRENT_USER\Control Panel\Mouse MouseHoverTime
Source: Havij 1.12 Free.exeStatic file information: File size 1929082 > 1048576
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeFile created: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-TERC1.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Program Files (x86)\Havij\is-OUGRJ.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-RFT14.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-4DJGA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-MT9FI.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Program Files (x86)\Havij\is-V91CU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-TERC1.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-RFT14.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-4DJGA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\Windows\SysWOW64\is-MT9FI.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Havij
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Havij\Havij.lnk
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Havij\Read Me.lnk
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Havij\Uninstall Havij.lnk
Source: C:\Users\user\Desktop\Havij 1.12 Free.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Havij\Havij.exeWindow / User API: threadDelayed 9801
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Windows\SysWOW64\is-TERC1.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Windows\SysWOW64\is-RFT14.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Windows\SysWOW64\is-4DJGA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Windows\SysWOW64\is-MT9FI.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpDropped PE file which has not been started: C:\Program Files (x86)\Havij\is-V91CU.tmpJump to dropped file
Source: C:\Program Files (x86)\Havij\Havij.exe TID: 5996Thread sleep count: 190 > 30
Source: C:\Program Files (x86)\Havij\Havij.exe TID: 5996Thread sleep count: 9801 > 30
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmpQueries volume information: C:\ VolumeInformation
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media12
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Havij 1.12 Free.exe39%ReversingLabsWin32.Hacktool.Havij
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp5%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-KMUJI.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Program Files (x86)\Havij\Havij.exe (copy)35%ReversingLabs
C:\Program Files (x86)\Havij\is-V91CU.tmp4%ReversingLabs
C:\Windows\SysWOW64\Mscomctl.ocx (copy)0%ReversingLabs
C:\Windows\SysWOW64\Mswinsck.ocx (copy)0%ReversingLabs
C:\Windows\SysWOW64\RICHTX32.ocx (copy)4%ReversingLabs
C:\Windows\SysWOW64\comdlg32.ocx (copy)0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.target.com/index.asp?id=123'%20and%20'x'='y0%Avira URL Cloudsafe
http://www.target.com/index.asp?id=1230%Avira URL Cloudsafe
http://www.target.com/index.asp?id=123%20and%201=10%Avira URL Cloudsafe
http://www.target.com/index.asp?id=123%20and%201=00%Avira URL Cloudsafe
http://www.target.com/index.asp?id=123'%20and%20'x'='x0%Avira URL Cloudsafe
http://www.target.com/index.asp?id=-9.90%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sites.target.map.fastly.net
151.101.2.187
truefalse
    unknown
    www.target.com
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://www.target.com/index.asp?id=123'%20and%20'x'='xfalse
      • Avira URL Cloud: safe
      unknown
      http://www.target.com/index.asp?id=-9.9false
      • Avira URL Cloud: safe
      unknown
      http://www.target.com/index.asp?id=123"%20and%20"x"="xfalse
        unknown
        http://www.target.com/index.asp?id=123%20and%201=0false
        • Avira URL Cloud: safe
        unknown
        http://www.target.com/index.asp?id=123'%20and%20'x'='yfalse
        • Avira URL Cloud: safe
        unknown
        http://www.target.com/index.asp?id=123false
        • Avira URL Cloud: safe
        unknown
        http://www.target.com/index.asp?id=123%20and%201=1false
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        151.101.2.187
        sites.target.map.fastly.netUnited States
        54113FASTLYUSfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1494087
        Start date and time:2024-08-17 00:31:53 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:20
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        Analysis Mode:stream
        Analysis stop reason:Timeout
        Sample name:Havij 1.12 Free.exe
        Detection:MAL
        Classification:mal56.winEXE@13/20@1/10
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, login.live.com, settings-win.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: Havij 1.12 Free.exe
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:C4810367FF8F1A6346E4E6963228C19D
        SHA1:1B8C91D6E99F0C82C264221E26FDAC2E4810E50A
        SHA-256:96DF987A1C3D2ADA9BCC9785427FD9DFAA6D393C15FB8A546E48807701269737
        SHA-512:BC2DF9BD96CF906AF5839ABD4E1D5619A56AC8B9AE691506156799F00166715AE91E7E5BA01970F913E3B8CE7FC35DD2739B5974BC24F0491555E81FD5DDD7A4
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 35%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........].I.<|..<|..<|.z r..<|..#u..<|..#q..<|.Rich.<|.................PE..L....V{L.................0...........`.......@....@..........................................................................$..(....p..4...................................................................0... .......x............................text...L#.......0.................. ..`.data....)...@.......@..............@....rsrc...4....p.......P..............@..@..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:39A58DAF51A64EF74605F02E725EB62F
        SHA1:A0541BF0EBEA64B8B5B962AF723C8BF055BBC474
        SHA-256:38020B5EC4FCAF9402B207F53B192D2822B623930228C21188BE39B5DA40D044
        SHA-512:FCFB8BBF4265D776CDD82BBAF0B04B6C7D7F79BBBA8C22A1B505C7139098A1B54FF33B6EB0E3C7C62D38640F18A0873E4B0E4B8798AA3499031D305D9BD4FCF0
        Malicious:false
        Reputation:unknown
        Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity .. version="1.11.0.0" .. processorArchitecture="X86" .. name="Havij" .. type="win32" />.. <description>Havij 1.01 Advanced SQL Injecttion Tool</description>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity .. type="win32" .. name="Microsoft.Windows.Common-Controls" .. version="6.0.0.0" .. processorArchitecture="X86" .. publicKeyToken="6595b64144ccf1df" .. language="*" />.. </dependentAssembly>.. </dependency>..</assembly>
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:ISO-8859 text, with CRLF line terminators
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:0D17827CFAB2014C7E91A761EDF8AE8E
        SHA1:08CA45336610DA3C3E1BEA063F945AD2B1C3E3E3
        SHA-256:CC98881CC89F87FB18EBF3F700BE3F6B31DAC3CF596B6BC3AF693500D4C9ADBD
        SHA-512:A16B6F7CDE1EE351EC8F42CCD5BA839F8874E2F8ABB53D7FEB1C98C9E5DC5CCBBBECBD919512FF4A1FF4255D240C961426BE5B0C3433AB801C6BEBD7B233EAB3
        Malicious:false
        Reputation:unknown
        Preview:Havij..-----..Version 1.12 Free..Advanced SQL Injection Tool..Copyright . 2009-2010..By r3dm0v3......Contact..-------..WebSite: http://ITSecTeam.com..Forum: http://Forum.ITSecTeam.com..Email: Info@ITSecTeam.com......Licence..-------..The free version of Havij is free software. We hope it be useful for you...This software is provided "as is" without warranties...Feel free to share and distribute it anywhere but please keep the files original!....There is a commerical version of Havij that is not free...To purchase Pro version of Havij please visit http://itsecteam.com......Disclaimer..----------..We are NOT responsible for any damage or illegal actions caused by the use of this program. Use on your own risk!......What's New?..-----------..In this version major features and changes have been done and many bugs were fixed...-HTTPS Support..-MsSQL Blind added..-MsAccess Blind added (Commerical version only)..-PostgreSQL added (Commerical version only)..-Check for update added...-Manual
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:D091777E98C96BB8651A678B8FA01AA7
        SHA1:0F101ED087A8EC67FFB11EECDF8624B49CF90467
        SHA-256:DD3459789F7D13D7055CF7CCEBFD361B4B2CD926CF5248E9BD62F72FAE1382F2
        SHA-512:988CC06192A4099150AAAF20B30A00CB836FEB0972AD66A54942EAA581B890406B0415CD1C6DDC58574A99A321797097F9AEAB100FC4B2470408199FE85CC37B
        Malicious:false
        Reputation:unknown
        Preview:admin.%EXT%..login.htm..login.html..login/..login.%EXT%..adm/..admin/..admin/account.html..admin/login.html..admin/login.htm..admin/home.%EXT%..admin/controlpanel.html..admin/controlpanel.htm..admin/cp.%EXT%..admin/adminLogin.html..admin/adminLogin.htm..admin/admin_login.%EXT%..admin/controlpanel.%EXT%..admin/admin-login.%EXT%..admin-login.%EXT%..admin/account.%EXT%..admin/admin.%EXT%..admin.htm..admin.html..adminitem/..adminitem.%EXT%..adminitems/..adminitems.%EXT%..administrator/..administrator/login.%EXT%..administrator.%EXT%..administration/..administration.%EXT%..adminLogin/..adminlogin.%EXT%..admin_area/admin.%EXT%..admin_area/..admin_area/login.%EXT%..manager/..manager.%EXT%..letmein/..letmein.%EXT%..superuser/..superuser.%EXT%..access/..access.%EXT%..sysadm/..sysadm.%EXT%..superman/..supervisor/..panel.%EXT%..control/..control.%EXT%..member/..member.%EXT%..members/..members.%EXT%..user/..user.%EXT%..cp/..uvpanel/..manage/..manage.%EXT%..management/..management.%EXT%..signin/..s
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:Unicode text, UTF-8 text, with CRLF line terminators
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:4AF28EEDC30BB7D5B95CADFE3D1FD969
        SHA1:2A8A3C1D0921EF1C142D30C7A4ED8798E10DDA7E
        SHA-256:50D118AFCEE6BE343B6277A7D00A9B988B7132C26BEF89252017EE86B2F1E6CF
        SHA-512:52484C1DE5E6E2D00CC545561CA3A5826808D7B10AF2E5CDEB61F1F7F7DE3038766E18D4947E37B5A74721A81BFEA6FB47C492219169FCBA3396E9BBCBE0BD03
        Malicious:false
        Reputation:unknown
        Preview:id..username..password..user..pass..uname..user_id..user_password..user_name..loginname..login_name..pwd..pasword..mail..email..name..permission..perm..group..user_group..access..accnt..accnts..account..accounts..admin..fldid..fldusername..flduser..fldname..fldpass..fldpassword..flduserpass..fldpwd..fldusr..admin_id..admin_name..admin_pass..admin_passwd..admin_password..admin_pwd..admin_user..admin_userid..admin_username..adminemail..adminid..tendn..tendangnhap..tenquantri..tenquanly..tennguoidung..ten..tennd..nguoidung..nguoidungid..quantri..quanly..u_id..aname..accountname..account_name..matkhau..matma..paswd..pas..tukhoa..login_pas..loginpassword..loginpasswd..loginpass..loginpas..loginpwd..code..secret..secret_code..secretcode..administrator..administrator_name..administrators..adminlogin..adminmail..adminname..adminpass..adminpassword..adminpaw..adminpwd..admins..AdminUID..adminuser..adminuserid..adminusername..u_name..uid..un..upass..level..tusername..tuser..tpassword..uUsername.
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:Unicode text, UTF-8 text, with CRLF line terminators
        Category:dropped
        Size (bytes):7907
        Entropy (8bit):4.7160650340496355
        Encrypted:false
        SSDEEP:
        MD5:0176ECA39C23B07D7BA0ED93A43743D9
        SHA1:18C2ED4C086F818BE90E7DB02D70FDC303965DAD
        SHA-256:AFCF3FFAB277678B7A29BDFBEBEB49A52049B8FA1F9D656FB6F34463E56D803E
        SHA-512:4A9C0D160D6D887D3022E03DEF6C132993890C30FC2B48303664332472E5ED58B565B1CFA34F0F41CB75DD09257BA62A73C82BA2505D3C0DEBE5A7CF1C824350
        Malicious:false
        Reputation:unknown
        Preview:user..username..usernames..admin..admins..users..manager..account..accounts..member..login..logins..members..tbl_user..tbl_users..tbl_admin..tbl_admins..tbl_member..tbl_members..tbladmins..memberlist..tbluser..tblusers..tblmanager..tblmanagers..tblclients..tblservers..adminuser..usertbl..userstbl..admintbl..adminstbl..id..tuser..tusers..uid..userid..user_id..auid..adminpass..LoginID..FirstName..LastName..cms_user..cms_member..cms_users..cms_members..cms_admin..cms_admins..user_admin..user_info..user_list..user_login..user_logins..user_names..userrights..userinfo..userlist..webadmin..webadmins..Webmaster..Webuser..product..products..tblproducts..tblproduct..tbl_tbadmin..Adminlogin..useraccount..nguoidung..quanly..quantri..dangnhap..taikhoan..taikhoanquantri..useraccounts..nguoidungs..tbuser..tblogin..tbadmin..tbaccount..tbuseraccount..tbnguoidung..tbllogin..tbladmin..tblaccount..tbluseraccount..tblnguoidung..tbusers..tblogins..tbadmins..tbaccounts..tbuseraccounts..tbnguoidungs..tbllogin
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):743
        Entropy (8bit):4.658729935146697
        Encrypted:false
        SSDEEP:
        MD5:39A58DAF51A64EF74605F02E725EB62F
        SHA1:A0541BF0EBEA64B8B5B962AF723C8BF055BBC474
        SHA-256:38020B5EC4FCAF9402B207F53B192D2822B623930228C21188BE39B5DA40D044
        SHA-512:FCFB8BBF4265D776CDD82BBAF0B04B6C7D7F79BBBA8C22A1B505C7139098A1B54FF33B6EB0E3C7C62D38640F18A0873E4B0E4B8798AA3499031D305D9BD4FCF0
        Malicious:false
        Reputation:unknown
        Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity .. version="1.11.0.0" .. processorArchitecture="X86" .. name="Havij" .. type="win32" />.. <description>Havij 1.01 Advanced SQL Injecttion Tool</description>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity .. type="win32" .. name="Microsoft.Windows.Common-Controls" .. version="6.0.0.0" .. processorArchitecture="X86" .. publicKeyToken="6595b64144ccf1df" .. language="*" />.. </dependentAssembly>.. </dependency>..</assembly>
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:Unicode text, UTF-8 text, with CRLF line terminators
        Category:dropped
        Size (bytes):4756
        Entropy (8bit):4.6627450540209665
        Encrypted:false
        SSDEEP:
        MD5:4AF28EEDC30BB7D5B95CADFE3D1FD969
        SHA1:2A8A3C1D0921EF1C142D30C7A4ED8798E10DDA7E
        SHA-256:50D118AFCEE6BE343B6277A7D00A9B988B7132C26BEF89252017EE86B2F1E6CF
        SHA-512:52484C1DE5E6E2D00CC545561CA3A5826808D7B10AF2E5CDEB61F1F7F7DE3038766E18D4947E37B5A74721A81BFEA6FB47C492219169FCBA3396E9BBCBE0BD03
        Malicious:false
        Reputation:unknown
        Preview:id..username..password..user..pass..uname..user_id..user_password..user_name..loginname..login_name..pwd..pasword..mail..email..name..permission..perm..group..user_group..access..accnt..accnts..account..accounts..admin..fldid..fldusername..flduser..fldname..fldpass..fldpassword..flduserpass..fldpwd..fldusr..admin_id..admin_name..admin_pass..admin_passwd..admin_password..admin_pwd..admin_user..admin_userid..admin_username..adminemail..adminid..tendn..tendangnhap..tenquantri..tenquanly..tennguoidung..ten..tennd..nguoidung..nguoidungid..quantri..quanly..u_id..aname..accountname..account_name..matkhau..matma..paswd..pas..tukhoa..login_pas..loginpassword..loginpasswd..loginpass..loginpas..loginpwd..code..secret..secret_code..secretcode..administrator..administrator_name..administrators..adminlogin..adminmail..adminname..adminpass..adminpassword..adminpaw..adminpwd..admins..AdminUID..adminuser..adminuserid..adminusername..u_name..uid..un..upass..level..tusername..tuser..tpassword..uUsername.
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):1302528
        Entropy (8bit):5.887909857753879
        Encrypted:false
        SSDEEP:
        MD5:C4810367FF8F1A6346E4E6963228C19D
        SHA1:1B8C91D6E99F0C82C264221E26FDAC2E4810E50A
        SHA-256:96DF987A1C3D2ADA9BCC9785427FD9DFAA6D393C15FB8A546E48807701269737
        SHA-512:BC2DF9BD96CF906AF5839ABD4E1D5619A56AC8B9AE691506156799F00166715AE91E7E5BA01970F913E3B8CE7FC35DD2739B5974BC24F0491555E81FD5DDD7A4
        Malicious:true
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........].I.<|..<|..<|.z r..<|..#u..<|..#q..<|.Rich.<|.................PE..L....V{L.................0...........`.......@....@..........................................................................$..(....p..4...................................................................0... .......x............................text...L#.......0.................. ..`.data....)...@.......@..............@....rsrc...4....p.......P..............@..@..:@............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:ISO-8859 text, with CRLF line terminators
        Category:dropped
        Size (bytes):10697
        Entropy (8bit):4.840390071374524
        Encrypted:false
        SSDEEP:
        MD5:0D17827CFAB2014C7E91A761EDF8AE8E
        SHA1:08CA45336610DA3C3E1BEA063F945AD2B1C3E3E3
        SHA-256:CC98881CC89F87FB18EBF3F700BE3F6B31DAC3CF596B6BC3AF693500D4C9ADBD
        SHA-512:A16B6F7CDE1EE351EC8F42CCD5BA839F8874E2F8ABB53D7FEB1C98C9E5DC5CCBBBECBD919512FF4A1FF4255D240C961426BE5B0C3433AB801C6BEBD7B233EAB3
        Malicious:false
        Reputation:unknown
        Preview:Havij..-----..Version 1.12 Free..Advanced SQL Injection Tool..Copyright . 2009-2010..By r3dm0v3......Contact..-------..WebSite: http://ITSecTeam.com..Forum: http://Forum.ITSecTeam.com..Email: Info@ITSecTeam.com......Licence..-------..The free version of Havij is free software. We hope it be useful for you...This software is provided "as is" without warranties...Feel free to share and distribute it anywhere but please keep the files original!....There is a commerical version of Havij that is not free...To purchase Pro version of Havij please visit http://itsecteam.com......Disclaimer..----------..We are NOT responsible for any damage or illegal actions caused by the use of this program. Use on your own risk!......What's New?..-----------..In this version major features and changes have been done and many bugs were fixed...-HTTPS Support..-MsSQL Blind added..-MsAccess Blind added (Commerical version only)..-PostgreSQL added (Commerical version only)..-Check for update added...-Manual
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4305
        Entropy (8bit):4.694496360874564
        Encrypted:false
        SSDEEP:
        MD5:D091777E98C96BB8651A678B8FA01AA7
        SHA1:0F101ED087A8EC67FFB11EECDF8624B49CF90467
        SHA-256:DD3459789F7D13D7055CF7CCEBFD361B4B2CD926CF5248E9BD62F72FAE1382F2
        SHA-512:988CC06192A4099150AAAF20B30A00CB836FEB0972AD66A54942EAA581B890406B0415CD1C6DDC58574A99A321797097F9AEAB100FC4B2470408199FE85CC37B
        Malicious:false
        Reputation:unknown
        Preview:admin.%EXT%..login.htm..login.html..login/..login.%EXT%..adm/..admin/..admin/account.html..admin/login.html..admin/login.htm..admin/home.%EXT%..admin/controlpanel.html..admin/controlpanel.htm..admin/cp.%EXT%..admin/adminLogin.html..admin/adminLogin.htm..admin/admin_login.%EXT%..admin/controlpanel.%EXT%..admin/admin-login.%EXT%..admin-login.%EXT%..admin/account.%EXT%..admin/admin.%EXT%..admin.htm..admin.html..adminitem/..adminitem.%EXT%..adminitems/..adminitems.%EXT%..administrator/..administrator/login.%EXT%..administrator.%EXT%..administration/..administration.%EXT%..adminLogin/..adminlogin.%EXT%..admin_area/admin.%EXT%..admin_area/..admin_area/login.%EXT%..manager/..manager.%EXT%..letmein/..letmein.%EXT%..superuser/..superuser.%EXT%..access/..access.%EXT%..sysadm/..sysadm.%EXT%..superman/..supervisor/..panel.%EXT%..control/..control.%EXT%..member/..member.%EXT%..members/..members.%EXT%..user/..user.%EXT%..cp/..uvpanel/..manage/..manage.%EXT%..management/..management.%EXT%..signin/..s
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):721694
        Entropy (8bit):6.49216236105162
        Encrypted:false
        SSDEEP:
        MD5:D3DB1742EAC55C42AF392C23F72DF92A
        SHA1:3A133963D2D695E38FFB75C0B565F5E5A6608C99
        SHA-256:E1D02B7D0D1A10277A761F151580666FCB1EEC7E4C9CA96AA5527EC6C1A264AA
        SHA-512:44CBD509513C0507E68B9C57735024CB3086AD51267B7E9BB42A7D087C6EA0B64702C91BF1D7CF2705EC07F0D8363999D41F3219927C8EBF3E7BD49719288987
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 4%
        Reputation:unknown
        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................\..........(h.......p....@..............................................@...............................%.......@..........................................................................................................CODE....`Z.......\.................. ..`DATA.........p.......`..............@...BSS..................r...................idata...%.......&...r..............@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....@.......@..................@..P.....................d..............@..P........................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:Unicode text, UTF-8 text, with CRLF line terminators
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:0176ECA39C23B07D7BA0ED93A43743D9
        SHA1:18C2ED4C086F818BE90E7DB02D70FDC303965DAD
        SHA-256:AFCF3FFAB277678B7A29BDFBEBEB49A52049B8FA1F9D656FB6F34463E56D803E
        SHA-512:4A9C0D160D6D887D3022E03DEF6C132993890C30FC2B48303664332472E5ED58B565B1CFA34F0F41CB75DD09257BA62A73C82BA2505D3C0DEBE5A7CF1C824350
        Malicious:false
        Reputation:unknown
        Preview:user..username..usernames..admin..admins..users..manager..account..accounts..member..login..logins..members..tbl_user..tbl_users..tbl_admin..tbl_admins..tbl_member..tbl_members..tbladmins..memberlist..tbluser..tblusers..tblmanager..tblmanagers..tblclients..tblservers..adminuser..usertbl..userstbl..admintbl..adminstbl..id..tuser..tusers..uid..userid..user_id..auid..adminpass..LoginID..FirstName..LastName..cms_user..cms_member..cms_users..cms_members..cms_admin..cms_admins..user_admin..user_info..user_list..user_login..user_logins..user_names..userrights..userinfo..userlist..webadmin..webadmins..Webmaster..Webuser..product..products..tblproducts..tblproduct..tbl_tbadmin..Adminlogin..useraccount..nguoidung..quanly..quantri..dangnhap..taikhoan..taikhoanquantri..useraccounts..nguoidungs..tbuser..tblogin..tbadmin..tbaccount..tbuseraccount..tbnguoidung..tbllogin..tbladmin..tblaccount..tbluseraccount..tblnguoidung..tbusers..tblogins..tbadmins..tbaccounts..tbuseraccounts..tbnguoidungs..tbllogin
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:InnoSetup Log Havij, version 0x30, 2063 bytes, 141700\user, "C:\Program Files (x86)\Havij"
        Category:dropped
        Size (bytes):2063
        Entropy (8bit):4.551500889801332
        Encrypted:false
        SSDEEP:
        MD5:741F39BE5556D7789BDCB97D1058F556
        SHA1:A9E80AF5BBB3B1372351DADAD76568D798975D69
        SHA-256:3158497EC667DA3873339748D0F529C40034DF111A244069383C805F18A0A0B8
        SHA-512:C219B5436F4A1B4B0C7856A002B047F0B35FBF14C74F7FFD2645F5D34F8148484CAA5AA481BDDD61F01AA3737C91B62F504F5E7142B9B8ED65F2A273340DA8F5
        Malicious:false
        Reputation:unknown
        Preview:Inno Setup Uninstall Log (b)....................................Havij...........................................................................................................................Havij...........................................................................................................................0...........%................................................................................................................bn<C.........tM......;....141700.user.C:\Program Files (x86)\Havij........... .".... .......... .................................C:\Program Files (x86)\Havij:C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Havij.Havij.english.............C:\Program Files (x86)\Havij.......&... C:\Windows\system32\RICHTX32.ocx...........&... C:\Windows\system32\Mscomctl.ocx...........&... C:\Windows\system32\Mswinsck.ocx...........&... C:\Windows\system32\comdlg32.ocx...........,...&C:\Program Files (x86)\Havij\Havij.exe...............(C:\Program Files (x86)\Hav
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:D3DB1742EAC55C42AF392C23F72DF92A
        SHA1:3A133963D2D695E38FFB75C0B565F5E5A6608C99
        SHA-256:E1D02B7D0D1A10277A761F151580666FCB1EEC7E4C9CA96AA5527EC6C1A264AA
        SHA-512:44CBD509513C0507E68B9C57735024CB3086AD51267B7E9BB42A7D087C6EA0B64702C91BF1D7CF2705EC07F0D8363999D41F3219927C8EBF3E7BD49719288987
        Malicious:true
        Reputation:unknown
        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................\..........(h.......p....@..............................................@...............................%.......@..........................................................................................................CODE....`Z.......\.................. ..`DATA.........p.......`..............@...BSS..................r...................idata...%.......&...r..............@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....@.......@..................@..P.....................d..............@..P........................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 16 21:32:34 2024, mtime=Fri Aug 16 21:32:34 2024, atime=Mon Aug 30 14:27:02 2010, length=1302528, window=hide
        Category:dropped
        Size (bytes):996
        Entropy (8bit):4.6385715643594025
        Encrypted:false
        SSDEEP:
        MD5:725410CEB002D510D122902C55399054
        SHA1:D63B208F05C67093F3E3EA52DD790C5CB87A01FC
        SHA-256:5519F65CAF1E3C381CEE23D8801B5B8A5D1EAD82279BD0B2C95420AA7BF48EE6
        SHA-512:923218939E4C56AB2FEE159CE6183258282DAA88C31B0E0D67A30B0BD76D350E64169C8F76875E0A1C00204178CB0E8E5C3ADFCBDD7E7B98EE1288F523480747
        Malicious:false
        Reputation:unknown
        Preview:L..................F.... ....0,......0,....gG.WH..........................s....P.O. .:i.....+00.../C:\.....................1......Y....PROGRA~2.........O.I.Y......................V......>v.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....P.1......Y....Havij.<.......Y...Y.......\........................H.a.v.i.j.....\.2......=a{ .Havij.exe.D.......Y...Y.......\........................H.a.v.i.j...e.x.e.......U...............-.......T.............\.....C:\Program Files (x86)\Havij\Havij.exe..5.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.H.a.v.i.j.\.H.a.v.i.j...e.x.e.........*................@Z|...K.J.........`.......X.......141700...........hT..CrF.f4... .'.............%..hT..CrF.f4... .'.............%.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 16 21:32:34 2024, mtime=Fri Aug 16 21:32:34 2024, atime=Mon Aug 30 14:13:44 2010, length=10697, window=hide
        Category:dropped
        Size (bytes):1010
        Entropy (8bit):4.681599003114028
        Encrypted:false
        SSDEEP:
        MD5:8639B3F7EA406BDCC3332A0D7181297D
        SHA1:E0793B54B7FA3F00927D11B4A809CC507EEA6E7A
        SHA-256:B4BD500704B92C85D2776B117A06A4663C042DA31221D38257DFFA419AD3AF38
        SHA-512:53CE77E48B04D9CB2C301411D1E66F76399DBD391445172D06E1436360284287C3B6727AA92299C439484CCDCF2F834BB06F556D1A01F3F8C26300E583BD82C9
        Malicious:false
        Reputation:unknown
        Preview:L..................F.... ......0,......0,....D..UH...)......................{....P.O. .:i.....+00.../C:\.....................1......Y....PROGRA~2.........O.I.Y......................V......g..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....P.1......Y....Havij.<.......Y...Y.......\........................H.a.v.i.j.....d.2..)...=.y .README~1.TXT..H.......Y...Y.......\........................R.e.a.d. .M.e...t.x.t.......W...............-.......V.............\.....C:\Program Files (x86)\Havij\Read Me.txt..7.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.H.a.v.i.j.\.R.e.a.d. .M.e...t.x.t.........*................@Z|...K.J.........`.......X.......141700...........hT..CrF.f4... .A.............%..hT..CrF.f4... .A.............%.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?......
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 16 21:32:34 2024, mtime=Fri Aug 16 21:32:34 2024, atime=Fri Aug 16 21:32:23 2024, length=721694, window=hide
        Category:dropped
        Size (bytes):1015
        Entropy (8bit):4.689968381927978
        Encrypted:false
        SSDEEP:
        MD5:546841705A17915C637B7D6BEF6A4350
        SHA1:1E0B1588EC6167A3A565BD4E280FF2351EE0E0BC
        SHA-256:255CBC728FE00E496877637C8DD04358ECB0139AC542CAF215357B01327C23BB
        SHA-512:1225DEF621DD8E443F17C86848B0904055500A28FC81A86B09B8970EE9138AC8FF1AEA8D09910C12DF8B67EE191D2310797C03D1ED3F29A43B880AD4D12241A4
        Malicious:false
        Reputation:unknown
        Preview:L..................F.... ....k.0,...F..0,.....%*,...........................}....P.O. .:i.....+00.../C:\.....................1......Y....PROGRA~2.........O.I.Y......................V......g..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....P.1......Y....Havij.<.......Y...Y.......\........................H.a.v.i.j.....f.2......Y.. .unins000.exe..J.......Y...Y.......\....................?]+.u.n.i.n.s.0.0.0...e.x.e.......X...............-.......W.............\.....C:\Program Files (x86)\Havij\unins000.exe..8.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.H.a.v.i.j.\.u.n.i.n.s.0.0.0...e.x.e.........*................@Z|...K.J.........`.......X.......141700...........hT..CrF.f4... .M.............%..hT..CrF.f4... .M.............%.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?.
        Process:C:\Users\user\Desktop\Havij 1.12 Free.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):711168
        Entropy (8bit):6.484055707305179
        Encrypted:false
        SSDEEP:
        MD5:F0CCFB46F867443700D31C969BDCF552
        SHA1:F2474D5D7A906DE3BC3381CA79BB1EA60F0D6697
        SHA-256:54BB849D30567D5F10AC359F8B503732A3FCD76AD7CC72007EAB843B784367BB
        SHA-512:71C7DE53D1DB03F1149C3E82FD92842CBD284D17C981267B20290F8D54BAF2B578F7830F64EB5308C82CF4AFF4F1937586624C2769DA74A463C8D4EBDCBE45EE
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 5%
        Reputation:unknown
        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................\..........(h.......p....@..............................................@...............................%.......@..........................................................................................................CODE....`Z.......\.................. ..`DATA.........p.......`..............@...BSS..................r...................idata...%.......&...r..............@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....@.......@..................@..P.....................d..............@..P........................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):4096
        Entropy (8bit):4.026670007889822
        Encrypted:false
        SSDEEP:
        MD5:0EE914C6F0BB93996C75941E1AD629C6
        SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
        SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
        SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32+ executable (console) x86-64, for MS Windows
        Category:dropped
        Size (bytes):6144
        Entropy (8bit):4.215994423157539
        Encrypted:false
        SSDEEP:
        MD5:4FF75F505FDDCC6A9AE62216446205D9
        SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
        SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
        SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):23312
        Entropy (8bit):4.596242908851566
        Encrypted:false
        SSDEEP:
        MD5:92DC6EF532FBB4A5C3201469A5B5EB63
        SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
        SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
        SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files (x86)\Havij\Havij.exe
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):4.91385331499306
        Encrypted:false
        SSDEEP:
        MD5:4F8648A6FF4C78B3998FA29368657D00
        SHA1:FB1C86A93859C4DA3BADC2FBB4A8A7D2ED64C1CC
        SHA-256:01C5708C565DA6354E52E163B25B64579AD80B951CEBBD6840D2382AF60CB929
        SHA-512:58C3128A47566838B483F873A84C666BFCE32B4A2CD8593DAF2939834A0D1E3C4C7C29BCC46429C25EDC35D46695C6FF41BD82CFC065BB8188BA737050971EA9
        Malicious:false
        Reputation:unknown
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:ECC7D7F0D3446DE36045D1D9E964FAFE
        SHA1:DA6B0EC081D628C33B150327F3BD16D3B7FA4729
        SHA-256:BC58D624CEEA02AB086F1CCE809C992BF5A7105E88931853317A2F5AA5AFD6E4
        SHA-512:443DE697BE9886CD97235E6468F3A7F6BF11612711E54DBA31431B0D9418672E1434E839ED50CACF28107F692F0C9D9D2F57D90E3A843D81015D459C180DB632
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:@...........#.........n.......i.......p....X'.........................`......hA..............................pF......@........`...Z...........f..............@................................................................................text............................... ..`.data...Du..........................@....rsrc....\...`...`...`..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
        SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
        SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
        SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:21034A336E16F30345A96DE9BD8CEC25
        SHA1:C9FB876A001874C4EE8670FABF12C36036F54A1F
        SHA-256:251A419BB5998882227A11188311B82F20C4952865FF916397973BD9A50C69D5
        SHA-512:ED1F33CD13F6CDA5AA4696271927FF2497A2BD33FEE606655ED50BB5F13CEDB81A3597844C1A8030E6FFA3C46ED34C217A55DAB062BA00A76F2F079B7DA2E86F
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 4%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ay.8...........#.........8..................... ......................... ......................................p...........8...............................4....................................................................................text............................... ..`.data...............................@....rsrc...P...........................@....reloc..4...........................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):0
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:B73809A916E6D7C1AE56F182A2E8F7E2
        SHA1:34E4213D8BF0E150D3F50AE0BD3F5B328E1105F5
        SHA-256:64C6EE999562961D11AF130254AD3FFD24BB725D3C18E7877F9FD362F4936195
        SHA-512:26C28CB6C7E1B47425403AB8850A765AC420DD6474327CE8469376219C830AB46218383D15A73C9EA3A23FC6B5F392EE6E2A1632A1BF644B1BD1A05A4729E333
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.6....!......#......................... ....z!.........................0......T................................s...............@...............................................................................................................text...L........................... ..`.data........0......................@....rsrc........@.......*..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):1081616
        Entropy (8bit):6.346871871902746
        Encrypted:false
        SSDEEP:
        MD5:ECC7D7F0D3446DE36045D1D9E964FAFE
        SHA1:DA6B0EC081D628C33B150327F3BD16D3B7FA4729
        SHA-256:BC58D624CEEA02AB086F1CCE809C992BF5A7105E88931853317A2F5AA5AFD6E4
        SHA-512:443DE697BE9886CD97235E6468F3A7F6BF11612711E54DBA31431B0D9418672E1434E839ED50CACF28107F692F0C9D9D2F57D90E3A843D81015D459C180DB632
        Malicious:true
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:@...........#.........n.......i.......p....X'.........................`......hA..............................pF......@........`...Z...........f..............@................................................................................text............................... ..`.data...Du..........................@....rsrc....\...`...`...`..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):124688
        Entropy (8bit):5.941729779329973
        Encrypted:false
        SSDEEP:
        MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
        SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
        SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
        SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
        Malicious:true
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):260096
        Entropy (8bit):5.236979537450169
        Encrypted:false
        SSDEEP:
        MD5:21034A336E16F30345A96DE9BD8CEC25
        SHA1:C9FB876A001874C4EE8670FABF12C36036F54A1F
        SHA-256:251A419BB5998882227A11188311B82F20C4952865FF916397973BD9A50C69D5
        SHA-512:ED1F33CD13F6CDA5AA4696271927FF2497A2BD33FEE606655ED50BB5F13CEDB81A3597844C1A8030E6FFA3C46ED34C217A55DAB062BA00A76F2F079B7DA2E86F
        Malicious:true
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ay.8...........#.........8..................... ......................... ......................................p...........8...............................4....................................................................................text............................... ..`.data...............................@....rsrc...P...........................@....reloc..4...........................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Local\Temp\is-3VH7B.tmp\Havij 1.12 Free.tmp
        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Category:dropped
        Size (bytes):140488
        Entropy (8bit):6.138293118127049
        Encrypted:false
        SSDEEP:
        MD5:B73809A916E6D7C1AE56F182A2E8F7E2
        SHA1:34E4213D8BF0E150D3F50AE0BD3F5B328E1105F5
        SHA-256:64C6EE999562961D11AF130254AD3FFD24BB725D3C18E7877F9FD362F4936195
        SHA-512:26C28CB6C7E1B47425403AB8850A765AC420DD6474327CE8469376219C830AB46218383D15A73C9EA3A23FC6B5F392EE6E2A1632A1BF644B1BD1A05A4729E333
        Malicious:true
        Reputation:unknown
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.6....!......#......................... ....z!.........................0......T................................s...............@...............................................................................................................text...L........................... ..`.data........0......................@....rsrc........@.......*..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.993672506437042
        TrID:
        • Win32 Executable (generic) a (10002005/4) 98.86%
        • Inno Setup installer (109748/4) 1.08%
        • Win16/32 Executable Delphi generic (2074/23) 0.02%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        File name:Havij 1.12 Free.exe
        File size:1'929'082 bytes
        MD5:f30896202fcea8645b2ff500c6bd2d2d
        SHA1:ac6b54c6df78e35e4dc244c28466197fd6160cee
        SHA256:7a1ec0f8ccec380809b8fcf66b9df8bd856dcf3814829d0bae98f999101585c8
        SHA512:0da26c338656e651a54fd09bc10802b8d1770ff7daaa6ecb48f8763b814cbc41ddb15ef855fd1e47d8d14d7dbb5be8fb7438ca3bac763520a9d10bf2b06ecfdf
        SSDEEP:49152:H2m5e3oF/QvqkIsVLugpshGyidsqP63FYTPz13:Wm5syMIqLxpshGygP4YTLR
        TLSH:0F95334157F5113FE463A9B449476A101A3BBD3B293C5258F33CAE4D0F236D2BAD9B82
        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
        Icon Hash:2d2e3797b32b2b99
        Entrypoint:0x409b60
        Entrypoint Section:CODE
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        DLL Characteristics:TERMINAL_SERVER_AWARE
        Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:1
        OS Version Minor:0
        File Version Major:1
        File Version Minor:0
        Subsystem Version Major:1
        Subsystem Version Minor:0
        Import Hash:884310b1928934402ea6fec1dbd3cf5e
        Instruction
        push ebp
        mov ebp, esp
        add esp, FFFFFFC4h
        push ebx
        push esi
        push edi
        xor eax, eax
        mov dword ptr [ebp-10h], eax
        mov dword ptr [ebp-24h], eax
        call 00007F44C1017EEBh
        call 00007F44C10190F2h
        call 00007F44C101B31Dh
        call 00007F44C101B364h
        call 00007F44C101DC93h
        call 00007F44C101DDFAh
        xor eax, eax
        push ebp
        push 0040A217h
        push dword ptr fs:[eax]
        mov dword ptr fs:[eax], esp
        xor edx, edx
        push ebp
        push 0040A1E0h
        push dword ptr fs:[edx]
        mov dword ptr fs:[edx], esp
        mov eax, dword ptr [0040C014h]
        call 00007F44C101E820h
        call 00007F44C101E387h
        lea edx, dword ptr [ebp-10h]
        xor eax, eax
        call 00007F44C101B94Dh
        mov edx, dword ptr [ebp-10h]
        mov eax, 0040CDF0h
        call 00007F44C1017F9Ch
        push 00000002h
        push 00000000h
        push 00000001h
        mov ecx, dword ptr [0040CDF0h]
        mov dl, 01h
        mov eax, 004072ECh
        call 00007F44C101C1DCh
        mov dword ptr [0040CDF4h], eax
        xor edx, edx
        push ebp
        push 0040A198h
        push dword ptr fs:[edx]
        mov dword ptr fs:[edx], esp
        call 00007F44C101E890h
        mov dword ptr [0040CDFCh], eax
        mov eax, dword ptr [0040CDFCh]
        cmp dword ptr [eax+0Ch], 01h
        jne 00007F44C101E9CAh
        mov eax, dword ptr [0040CDFCh]
        mov edx, 00000028h
        call 00007F44C101C5DDh
        mov edx, dword ptr [0040CDFCh]
        cmp eax, dword ptr [edx+00h]
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        CODE0x10000x92800x94005d87ded351b0b41961d927fb546efca7False0.6105363175675675data6.537825193518719IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        DATA0xb0000x24c0x400e8b4b57d70dce84e92f20fc39f4aa0ceFalse0.30859375data2.7354399295454255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        BSS0xc0000xe540x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
        .reloc0x100000x8b00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
        .rsrc0x110000x2c000x2c00d7d545b94a93321c2a2b5f7f2fa08917False0.32270951704545453data4.459920513264149IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
        RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
        RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
        RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
        RT_STRING0x125740x2f2data0.35543766578249336
        RT_STRING0x128680x30cdata0.3871794871794872
        RT_STRING0x12b740x2cedata0.42618384401114207
        RT_STRING0x12e440x68data0.75
        RT_STRING0x12eac0xb4data0.6277777777777778
        RT_STRING0x12f600xaedata0.5344827586206896
        RT_RCDATA0x130100x2cdata1.1590909090909092
        RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
        RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2723509933774834
        RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
        DLLImport
        kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
        user32.dllMessageBoxA
        oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
        kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
        user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
        comctl32.dllInitCommonControls
        advapi32.dllAdjustTokenPrivileges
        Language of compilation systemCountry where language is spokenMap
        DutchNetherlands
        EnglishUnited States