1b46636e7d9e3a101e7062d9ea5f870bfea7f8906b1feb373c586c6ed4b82e40

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2025-Jan-08 15:36:35
Detected languages English - United States
Comments This installation was built with Inno Setup.
CompanyName Ansgar Becker
FileDescription HeidiSQL Setup
FileVersion 12.15.0.7171
LegalCopyright
OriginalFileName
ProductName HeidiSQL
ProductVersion 12.15.0.7171

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Looks for Qemu presence:
  • qEMU
Contains domain names:
  • https://jrsoftware.org
  • jrsoftware.org
Suspicious The PE is possibly packed. Unusual section name found: .itext
Unusual section name found: .didata
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegOpenKeyExW
  • RegQueryValueExW
  • RegCloseKey
Possibly launches other programs:
  • CreateProcessW
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Functions related to the privilege level:
  • AdjustTokenPrivileges
  • OpenProcessToken
Enumerates local disk drives:
  • GetVolumeInformationW
  • GetDriveTypeW
Can shut the system down or lock the screen:
  • ExitWindowsEx
Info The PE is digitally signed. Signer: Ansgar Becker
Issuer: Sectigo Public Code Signing CA R36
Suspicious VirusTotal score: 1/71 (Scanned on 2026-03-07 03:23:18) Bkav: W32.AIDetectMalware

Hashes

MD5 d9a8ef04a0b84ae78e2c297adfc2ab42
SHA1 763139a107fe8475616f552ff60a07285dc729b3
SHA256 1b46636e7d9e3a101e7062d9ea5f870bfea7f8906b1feb373c586c6ed4b82e40
SHA3 45ac132e35f3e8e6905b1457c86d2e67c113ac3e8fd8b05821a02973e0e5fe4c
SSDeep 393216:m3CEarxX0VurDi4Mg8U/W45TeGP7mY1QXVYjkq2n:QsrxX0SDFr/WQPP1Qyjkq2n
Imports Hash 4fedeec03d85f2e0d9939674af913942

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 11
TimeDateStamp 2025-Jan-08 15:36:35
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0xa7000
SizeOfInitializedData 0x36000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000A7F98 (Section: .itext)
BaseOfCode 0x1000
BaseOfData 0xa9000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.1
ImageVersion 0.0
SubsystemVersion 6.1
Win32VersionValue 0
SizeOfImage 0xec000
SizeOfHeaders 0x400
Checksum 0x10e3349
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 e7297e2838a9a2e0b8d93dd5795f62ad
SHA1 370e65746183b7d47333175efb5306b5153488a1
SHA256 e9858576a01d165b5d7767b016138ba058d859abdf85b1fc9c85143443bd91d5
SHA3 775f21aad54465cf22994199b3be549cfa851e587a2f9441496bb53a2704d902
VirtualSize 0xa5604
VirtualAddress 0x1000
SizeOfRawData 0xa5800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.37842

.itext

MD5 d7d68e24fd8aa2c38c12fc0ba57ee5fc
SHA1 60da1fbd11a2661a36cad193732af827fdda6578
SHA256 11eb8a4a3606d4933a6ca7e3eb9ad3dcd3cf1563061804d74e1a4288b0e7a528
SHA3 15ddd5929552e6929fb11d29ddba057081787ed8f279e28b525397d5dc7b6067
VirtualSize 0x1740
VirtualAddress 0xa7000
SizeOfRawData 0x1800
PointerToRawData 0xa5c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.17042

.data

MD5 4daf07ad25de9a5fbce0e8bfa5bebf31
SHA1 d562297a7472b6298e6108dc3a5a4975beb79166
SHA256 3c0c32e9287827dbcca323687491de258601e6ff0b984fcf098f00e51f192c1d
SHA3 620b2f6201d9e20e31de4a53bd6f75a4cba151705e092b6af9acb642fe251d64
VirtualSize 0x3838
VirtualAddress 0xa9000
SizeOfRawData 0x3a00
PointerToRawData 0xa7400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.97266

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x7278
VirtualAddress 0xad000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 627340dff539ef99048969aa4824fb2d
SHA1 24cfe989547aa50de659512bce7e2a6e77786c59
SHA256 e7c1a2b5618072b58a6948a7c7e0d9f4a7bce8086f8957d45d287acab7351fc1
SHA3 ba6e203f0f1e298cc5762dd8fb3a28578674f4dd0dcaa08802b9986c38804e11
VirtualSize 0xfec
VirtualAddress 0xb5000
SizeOfRawData 0x1000
PointerToRawData 0xaae00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.0204

.didata

MD5 fd11c1109737963cc6cb7258063abfd6
SHA1 f6b9fa45a8f34bd2cb9218ce88c11e20d3fc71a3
SHA256 da813677d0ab6c0ef688beb594ebd76cf4980cb614cee01b756efda9b3316742
SHA3 bbfadba84d740dfd46a08ed84111a5327ada5b7c1c883797e859c36cd7d0043e
VirtualSize 0x1a4
VirtualAddress 0xb6000
SizeOfRawData 0x200
PointerToRawData 0xabe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.72929

.edata

MD5 7de8ca0c7a61668a728fd3a88dc0942d
SHA1 ba95bf2c856634a9f69d90861654962600b646de
SHA256 78383375db293ffadb4418ce339ec010bc78832dfdb6cf8f58d535f7a38e41fd
SHA3 b8c408c4762e0631353f37bb98cdf3be3b97c15c108d3cd83c7c50f5e0a0ba72
VirtualSize 0x71
VirtualAddress 0xb7000
SizeOfRawData 0x200
PointerToRawData 0xac000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.30558

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x18
VirtualAddress 0xb8000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 d84006640084dc9f74a07c2ff9c7d656
SHA1 0379022c42b8971c66f5c503046d0ab125118679
SHA256 a1f69e8471e1728aef0f39cfe3f833c244d412e375d9538d47fca3cc8f148401
SHA3 064a2c4885c5e43b07674dc5448234cd0eeabfec6652ec78f6ba14b27207cbed
VirtualSize 0x5d
VirtualAddress 0xb9000
SizeOfRawData 0x200
PointerToRawData 0xac200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.38928

.reloc

MD5 d1dabd66b3769955f2e22e556793f48d
SHA1 9067b7c8880d9663196158366bf9aff1e129a252
SHA256 49d04252b27330b2103726c6d3195578b8519d84992d170d5486146f8a973a22
SHA3 0cd7ae649781a751df81df9fd67b21ecfbf5f8520d34952a5281b18ea5444a51
VirtualSize 0x10d84
VirtualAddress 0xba000
SizeOfRawData 0x10e00
PointerToRawData 0xac400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.71259

.rsrc

MD5 1e523b8dd3872fafdd44a747349d776e
SHA1 37a5cc09baa3e00dc55b59a989b372dbeb2ac156
SHA256 82997123d8e7dae2912500f2d74885bece6974769f141f36bcfeaf5757c2a169
SHA3 260853919ef762ac19c0f81294ec535ebbc8e42ed5947473e170f364ac40b845
VirtualSize 0x201d4
VirtualAddress 0xcb000
SizeOfRawData 0x20200
PointerToRawData 0xbd200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.44548

Imports

kernel32.dll GetACP
GetExitCodeProcess
CloseHandle
LocalFree
SizeofResource
VirtualProtect
QueryPerformanceFrequency
VirtualFree
GetFullPathNameW
GetProcessHeap
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
GetStdHandle
GetModuleHandleW
FreeLibrary
HeapDestroy
ReadFile
CreateProcessW
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
LoadLibraryA
ResetEvent
GetVolumeInformationW
GetVersion
GetDriveTypeW
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetFileSize
GetStartupInfoW
GetFileAttributesW
InitializeCriticalSection
GetSystemWindowsDirectoryW
GetThreadPriority
SetThreadPriority
GetCurrentProcess
VirtualAlloc
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetWindowsDirectoryW
LCMapStringW
VerSetConditionMask
GetDiskFreeSpaceW
FindFirstFileW
GetUserDefaultUILanguage
lstrlenW
QueryPerformanceCounter
SetEndOfFile
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
GetSystemDirectoryW
DeleteFileW
GetLocalTime
GetEnvironmentVariableW
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
TlsGetValue
GetDateFormatW
SetErrorMode
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetUserDefaultLangID
RemoveDirectoryW
CreateEventW
SetThreadLocale
GetThreadLocale
comctl32.dll InitCommonControls
user32.dll CreateWindowExW
TranslateMessage
CharLowerBuffW
CallWindowProcW
CharUpperW
PeekMessageW
GetSystemMetrics
SetWindowLongW
MessageBoxW
DestroyWindow
CharUpperBuffW
CharNextW
MsgWaitForMultipleObjects
LoadStringW
ExitWindowsEx
DispatchMessageW
oleaut32.dll SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
advapi32.dll ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
OpenProcessToken
FreeSid
AllocateAndInitializeSid
EqualSid
RegQueryValueExW
GetTokenInformation
ConvertSidToStringSidW
RegCloseKey
kernel32.dll (delay-loaded) GetACP
GetExitCodeProcess
CloseHandle
LocalFree
SizeofResource
VirtualProtect
QueryPerformanceFrequency
VirtualFree
GetFullPathNameW
GetProcessHeap
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
GetStdHandle
GetModuleHandleW
FreeLibrary
HeapDestroy
ReadFile
CreateProcessW
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
LoadLibraryA
ResetEvent
GetVolumeInformationW
GetVersion
GetDriveTypeW
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetFileSize
GetStartupInfoW
GetFileAttributesW
InitializeCriticalSection
GetSystemWindowsDirectoryW
GetThreadPriority
SetThreadPriority
GetCurrentProcess
VirtualAlloc
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetWindowsDirectoryW
LCMapStringW
VerSetConditionMask
GetDiskFreeSpaceW
FindFirstFileW
GetUserDefaultUILanguage
lstrlenW
QueryPerformanceCounter
SetEndOfFile
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
GetSystemDirectoryW
DeleteFileW
GetLocalTime
GetEnvironmentVariableW
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
TlsGetValue
GetDateFormatW
SetErrorMode
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetUserDefaultLangID
RemoveDirectoryW
CreateEventW
SetThreadLocale
GetThreadLocale

Delayed Imports

Attributes 0x1
Name kernel32.dll
ModuleHandle 0xb6080
DelayImportAddressTable 0xb6090
DelayImportNameTable 0xb60b4
BoundDelayImportTable 0xb60d8
UnloadDelayImportTable 0xb60f0
TimeStamp 1970-Jan-01 00:00:00

dbkFCallWrapperAddr

Ordinal 1
Address 0xb063c

__dbk_fcall_wrapper

Ordinal 2
Address 0xfc10

100

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x45fc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.96376
Detected Filetype PNG graphic file
MD5 affeaa75acd4cff0a1f69b6d9ce2fb29
SHA1 0a84691873c76f1e0694ae754e966d7c37479d29
SHA256 f767428f14b636f707441546b4798c47bee99d498c06857568ff54cbd62a95c0
SHA3 c7bc52582b535ac671d5c366f2c2010bdea891baa4ff79d384a8e1c8e8be9606

101

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.54797
MD5 908fbc0e966f674713a4b758fed73cd6
SHA1 bee3b41fe90734fd8f16663950d4cac63f6b7b47
SHA256 04ff5bfb4d58dcf8ec79af3a44ebe6822f1cd8916c640296d96198c1c3690238
SHA3 823d7e5e050e93234e5ca5ce3f5dcfb3b56039336bd4fb119d8c78854ba2757c

102

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.80622
MD5 6edad9d2362b032173108eec4e8427ba
SHA1 6c1c0be0d182b8fd2f39adb1db106f713de7cc89
SHA256 beda42d2a1c85d528a7817d428397e584ab16f58d250605a2596b276a3161f96
SHA3 b875bc67674e7598d318b2261a2e9546eef2ec7ffb64943c6261463caa08a9e0

103

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.88563
MD5 b24ecac3b936b1e346802388bbe41ccd
SHA1 bbebd6312cdde48b0caf1d6fa95f42ed169dbe1c
SHA256 f3867400e4afd927db1d23c28488337a446de29d870a59ef8f72929a63c52030
SHA3 046c69b04a0eef1779b4639443f483aef59f0430c20a9cdcdc267cd0cd4cbe94

104

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.1118
MD5 93385f78a035b88d7ce26dc3f2f5ff7d
SHA1 f7c328f64085215583fbd26dfbe2f534b2d9839c
SHA256 4ce42742fc380cc5274d11da9915612c431c9ec24c085727f09a60bbd5a5ecad
SHA3 f26499723b998f665ac97d7d108516d8615389bc7f23f307932a79a22084afc3

105

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.72999
MD5 d9832f5d34f42aeefe147681dfeeb86f
SHA1 c4670448ed9c0bb6ed1fd8b8d7226f17bb87ac46
SHA256 d46bc70e409873fb02a92b15bc046490ee7290ac93676c8ccc422afae9b025f7
SHA3 ff77df815ac420c050de932b42978f60a1e706538265446828ae501b3016f334

4086

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x3f8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.27436
MD5 16c83a530551674c0549067380ee799d
SHA1 fb015722bc9b8bd10e901b4a6063887e9075d9c8
SHA256 6bb30c8a1df395a8e73321f5feb010ad66b1440f85df19b0b66611d8c029730a
SHA3 5363ab577c0955f1c6ec3d3690ce43f74bf16e69a9dd6a3d60cec490d4655a27

4087

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x2dc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.52568
MD5 6389af7862593e7ce4db180f39e50140
SHA1 88b9651a981bf3348a74e5ab7d73a68c00eacb34
SHA256 91a2703df665f2d3201c6a5071fafb0b9aef1f7cf2ee36c53ba1d463251b1d90
SHA3 b14fffd73c83498cf4e53e90f20804af158c45088ae7f345668efc50088a4508

4088

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x430
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.24973
MD5 c585062fd9508d9ef6eed11299d5cdb9
SHA1 a86d3099f1ff650e0fbbcfa50dcc7069eb12a9bd
SHA256 a33f03dda00385bdf0b927b77ab2d02256f5dbb3d1e973a4bacd49a8e835d497
SHA3 dbce279b2b5fa3baae5d5fc5c390abd14c3467917892d72491220e955459fe7b

4089

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x44c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.37757
MD5 fdf50a2ec296ee0c6f14f17dcbb4d033
SHA1 89e1dd972c2cf0f03819f154e20b41147317ab57
SHA256 86c9c0f8051440577615ce48dea198071272529bb7202e1be19cd89b54a41501
SHA3 e785bebb46272c3a4adc7ce895af83ab4c68bc9f3888bad61bf1f8ed09f1afba

4090

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x2d4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.36723
MD5 d2467f70311fc072d9202909bdfa9fcb
SHA1 c8abb69fb38434daf6811309cc88e9d0df65e2cd
SHA256 51209c8034cd5c2127a7b877a3280699d6bad965bcc102e830420c836f535c97
SHA3 4386b5d28f8adc0eccd1a396c2d0689b85cd7cfcf727c8d08a87940c92bd64c7

4091

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0xb8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33978
MD5 e8e4995b464abd85d77008d3750ca7af
SHA1 2c39cf9c2c1cfab48077cda2d4d6312fdb53c54b
SHA256 22296669c2c50d3fdfee9de9f7730d0a5cc498b7cc54cd2aa8ded74d7e69f654
SHA3 5480674ca53405ca327424ca774da73700d535e5ca7d51363d86511e5268bb0c

4092

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x9c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.15425
MD5 d0969cc9a96275d54a109de740708a5a
SHA1 2c365c0341faf71f810a39c69859a7eb5bc0de8d
SHA256 3c45c82b39b3c90c9c22342a8f6be98073faf1dcd26dbc578b3a6fa9a499cb46
SHA3 99f949ba47f1c5cd7b313b0b89e2b14f238be4bd78199a590c1f257e4f562967

4093

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x374
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.31895
MD5 4ac29bb5f7361e85771807112cd4ec93
SHA1 b164bf0882b60c0d7d4643495a2c1db5a20a1343
SHA256 2e6d8102640132ccabd2fa3c3a61c77c2b41a80d7f60013cf7149819c2b5c9d2
SHA3 ee5ab8846732cb786d250fc1780293072aff157ae61cf7f671eb4e6e29018bf7

4094

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x398
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28786
MD5 110abe16232608d8671eaca8ee324f45
SHA1 30704560832bafa440df1fd20693653c2a30f815
SHA256 b33f156b0a8ce96c7182dfb6afa9f6a7020433a6e16ca21f6092ba03695bdd12
SHA3 0179804f22369dabd55b8e4ca79a33645191c197c0474cabc4e13546c7e7fcd6

4095

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x368
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33385
MD5 1c9252919f0a0d2072f3fe0565f0b443
SHA1 dc6002a243c7567105aef957d8b01142df42b3d2
SHA256 734b698aafc2cfabfd0750c88498022d650f6ee025250dc8795de56a6e122445
SHA3 4d0c5d27e1b222f09e17dc6fa9ec0bc174b3e58bba30ce90cb89b3594622e627

4096

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x2a4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.2935
MD5 d1efb0d972603f09c3a2a866a8b36d48
SHA1 64a194ea368bb16ffac3e7a4ca84b3c00bf15920
SHA256 351e7d3c756242cde2e4a2bef16d636d5e073e0cf3e9cfa2b1da1efccd7806ae
SHA3 545cc79af077359ed49f0ba5cdc74b58bef1f6fd71725c976ad9c892dc9a0b56

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.75
MD5 fa1c96712ab8720f82ad4095daf7cee5
SHA1 abe71b9873e6e494a7d9de8f1f1985c550fc6b59
SHA256 10ca7c7ba673f29383bc50d1becb5fbeddddecaa6109de088da9a94c74d4f1c4
SHA3 c3be1ab5871e6568c50c4c2dd73e7c8c09d9e9451b256e9871c537b6da54a299

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x354
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.09235
MD5 20649a4139ca3072df14f4261a5d3b0b
SHA1 8327deefdbf8016276579f5ca5062723aa6b607b
SHA256 44079cd3326a6a5e90c6ac15df916f7fd724d6726122c562909dde48fc90654d
SHA3 96e412006179a5d4c118826788b0817ee4fce1f376aa0c963f346accf1cf2a2a

11111

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x2c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.72013
MD5 dc6fb0d2c313eefacedcab83355de36b
SHA1 fea9051814014f8a2fd473c660b5a55ff5284fcb
SHA256 bb5084204ee4028491154a2fa77d3004c2282e27cb794af60845c8288d6d7e5f
SHA3 612e6286c10c17672e8c3a13d95b22781ad4097d7d40e021a56212e035d8de46

MAINICON

Type RT_GROUP_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.87162
Detected Filetype Icon file
MD5 d80e5bb6ae4a1c1803eaa3f5aa78dfa5
SHA1 dc954ee145179c189fc89b97ac8ec3b3831e4035
SHA256 ffc8422c3fcdd6723dc12411a127602d2f21892ddcb9871c4389c27b88ef33a7
SHA3 abc8a8769fd035fce00fa010994e6e29013b189729cf9e1306cbf93e8c187486

1

Type RT_VERSION
Language English - United States
Codepage Latin 1 / Western European
Size 0x584
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.66895
MD5 7a970a25b23a715dbb6e47cdfc793e8d
SHA1 51f084134af802cff4578b18345411ee3075bd06
SHA256 46e75fd34544d5f31fed5f3dffa08c704b446548a3d531981f7002c3e557b672
SHA3 c6ef667ab0d5bdcff8d662efb5ab8b38ac14043d598229d6edca0cc6d2ed79c8

1 (#2)

Type RT_MANIFEST
Language English - United States
Codepage Latin 1 / Western European
Size 0x7a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.89085
MD5 e07ab8c9030f776ce0f6d9040d41c616
SHA1 593953973c74066bcd09b22402948425dab9b12f
SHA256 75bb01fe4bafdef22d879aaea5b85d1165a30ec0e558536e1b4c6002c4730d5d
SHA3 51b78d43db0954fcaa7c6fd2558eece5eb98a1c5f6e95a3033891777bfd00a7c

String Table contents

Windows Server 2016
Windows Server 2019
Windows Server 2022
Windows 8
Windows 8.1
Windows 10
Windows 11
Observer is not supported
Cannot have multiple single cast observers added to the observers collection
The object does not implement the observer interface
No single cast observer with ID %d was added to the observer collection
No multi cast observer with ID %d was added to the observer collection
Must wait on at least one event
Cannot call BeginInvoke on a TComponent in the process of destruction
VAR and OUT arguments must match parameter type exactly
%s (Version %d.%d, Build %d, %5:s)
%s Service Pack %4:d (Version %1:d.%2:d, Build %3:d, %5:s)
32-bit Edition
64-bit Edition
Windows
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 2000
Windows XP
Windows Server 2003
Windows Server 2003 R2
Windows Server 2012
Windows Server 2012 R2
Property is read-only
%s.Seek not implemented
Property %s does not exist
Stream write error
Thread creation error: %s
Thread Error: %s (%d)
Cannot terminate an externally created thread
Cannot wait for an externally created thread
Cannot call Start on a running or suspended thread
Invalid argument
Source and Destination arrays must not be the same
Argument out of range
Duplicates not allowed
Insufficient RTTI available to support this operation
Parameter count mismatch
Type '%s' is not declared in the interface section of a unit
Cannot assign a %s to a %s
CheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
List does not allow duplicates ($0%x)
A component named %s already exists
''%s'' is not a valid component name
Invalid property value
Invalid property path
Invalid property value
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%0:d). %2:s object range is 0..%1:d
Out of memory while expanding memory stream
%s has not been registered as a COM class
Error reading %s%s%s: %s
Stream read error
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Invalid source array
Invalid destination array
Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid destination index (%d)
Invalid code page
No mapping for the Unicode character exists in the target multi-byte code page
Invalid StringBaseIndex
Ancestor for '%s' not found
May
June
July
August
September
October
November
December
Sun
Mon
Tue
Wed
Thu
Fri
Sat
Sunday
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
January
February
March
April
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
Object lock not owned
Monitor support function not initialized
Feature not implemented
Method called on disposed object
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%s%s
A call to an OS function failed
Variant method calls not supported
Read
Write
Execution
Invalid access
Error creating variant or safe array
Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation
Invalid NULL variant operation
Invalid variant operation (%s%.8x)
%s
Could not convert variant of type (%s) into type (%s)
Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Operation aborted
Exception %s in module %s at %p.
%s%s
Application Error
Format '%s' invalid or incompatible with argument
No argument for format '%s'
'%s' is not a valid integer value
'%d.%d' is not a valid timestamp
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 12.15.0.7171
ProductVersion 12.15.0.7171
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments This installation was built with Inno Setup.
CompanyName Ansgar Becker
FileDescription HeidiSQL Setup
FileVersion (#2) 12.15.0.7171
LegalCopyright
OriginalFileName
ProductName HeidiSQL
ProductVersion (#2) 12.15.0.7171
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x4b8000
EndAddressOfRawData 0x4b8018
AddressOfIndex 0x4a9c24
AddressOfCallbacks 0x4b9010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0! [*] Warning: Section .tls has a size of 0!
Leave a comment

No comments yet.