7d899d2d33bde1c7f55ba0fcd4630b817e42e5cd1ceb8739511a990455275f90

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2010-Feb-04 16:51:42
Detected languages English - United States
Debug artifacts c:\2010r1\REALbasic\REALbasic Visual Studio\release\X86RunHoudini.pdb
CompanyName
FileVersion 1.0.0.0
Country
Release Development
FileDescription
LegalCopyright
ProductVersion
ProductName
OriginalFilename NavaDebugger
InternalName

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8.0
MSVC++ v.8 (procedure 1 recognized - h)
Suspicious Strings found in the binary may indicate undesirable behavior: May have dropper capabilities:
  • CurrentControlSet\Services
Contains domain names:
  • google.com
  • www.google.com
Info Cryptographic algorithms detected in the binary: Uses constants related to Blowfish
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryW
  • LoadLibraryA
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • FindWindowW
Code injection capabilities (PowerLoader):
  • FindWindowW
  • GetWindowLongW
  • GetWindowLongA
Can access the registry:
  • RegEnumValueW
  • RegQueryValueExW
  • RegCreateKeyExW
  • RegDeleteValueW
  • RegSetValueExW
  • RegCloseKey
  • RegEnumKeyExW
  • RegDeleteKeyW
  • RegOpenKeyExW
  • RegQueryInfoKeyW
Possibly launches other programs:
  • ShellExecuteW
Can create temporary files:
  • CreateFileA
  • GetTempPathW
  • CreateFileW
Uses functions commonly found in keyloggers:
  • MapVirtualKeyA
  • GetForegroundWindow
  • GetAsyncKeyState
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Enumerates local disk drives:
  • GetLogicalDriveStringsW
Can take screenshots:
  • FindWindowW
  • GetDC
  • BitBlt
  • CreateCompatibleDC
Reads the contents of the clipboard:
  • GetClipboardData
Suspicious The file contains overlay data. 8173479 bytes of data starting at offset 0x22d000.
Overlay data amounts for 78.1781% of the executable.
Malicious VirusTotal score: 24/59 (Scanned on 2025-07-29 05:20:47) AVG: Win32:Adware-gen [Adw]
Alibaba: Trojan:Win32/FakeAV.01406cc8
Avast: Win32:Adware-gen [Adw]
Cylance: Unsafe
Fortinet: Riskware/NavaShield
GData: Gen:Variant.Trojan.FakeAV.Nava.1
Google: Detected
Jiangmin: Trojan.CryFile.jf
Kaspersky: Trojan-FakeAV.Win32.Nava.b
Kingsoft: Win32.Trojan-FakeAV.Nava.gen
Lionic: Trojan.Win32.Generic.luRG
McAfeeD: ti!7D899D2D33BD
MicroWorld-eScan: Gen:Variant.Trojan.FakeAV.Nava.1
Microsoft: Trojan:Win32/Occamy.C7D
NANO-Antivirus: Trojan.Win32.FakeAv.bgsrq
Sophos: Generic Reputation PUA (PUA)
Symantec: PUA.Gen.2
Tencent: Malware.Win32.Gencirc.13fed1c7
TrendMicro-HouseCall: TROJ_GEN.R002H0CC825
VBA32: TrojanFakeAV.Nava
VIPRE: Gen:Variant.Trojan.FakeAV.Nava.1
Varist: W32/ABApplication.NMHD-5823
Xcitium: Malware@#3jt9vgx2bdozg
alibabacloud: Trojan:Win/Nava.b

Hashes

MD5 47ef848562a159b2ce98d527ec968db2
SHA1 56b34310e8ede0437c422531bb89b2255a03cb3d
SHA256 7d899d2d33bde1c7f55ba0fcd4630b817e42e5cd1ceb8739511a990455275f90
SHA3 8dbc728627c0e74ca91937c63e13ac76fe494594d20aaf7c5fc949a76c03d155
SSDeep 196608:L4aINr4D6Dk886nmNPJk1vn0bwqGhgXaxsSZpsw8m6Ea7uW:8U+DZmNKBgwqqgXa6Hw8m6WW
Imports Hash f07aa30f098a9f2012bd13cc4c5e49f6

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 4
TimeDateStamp 2010-Feb-04 16:51:42
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 8.0
SizeOfCode 0x168000
SizeOfInitializedData 0xe9000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x001469FF (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x169000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x1000
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x252000
SizeOfHeaders 0x1000
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 a0d6ec74c504b156deb00bb5db3333f4
SHA1 597f070ad851e90bf9dea4948b2ac07b340e2acf
SHA256 75b932d244b2ff6cc063c5782a14effe565d125673226662fd3b89e3772babb1
SHA3 3c714bcf30196da97d49e44b03885db4cd93510658cd654b5abd4974b5cab5c4
VirtualSize 0x167405
VirtualAddress 0x1000
SizeOfRawData 0x168000
PointerToRawData 0x1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.65792

.rdata

MD5 e7eac971ed5407a4b2e29fa7803c87e5
SHA1 348600977de5fbb686c62a0b02bfa3dce586bfb7
SHA256 7f61c5b792e5d2bda6d554f9d466d52b68da6b0b1957b83a285f32f04c59c12b
SHA3 ea243f8c44d6783aa910760c5301dd7cbdf718450de849cee699657483d539f6
VirtualSize 0x37940
VirtualAddress 0x169000
SizeOfRawData 0x38000
PointerToRawData 0x169000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.0381

.data

MD5 eb8b8a4a4ef3589924a7dceba0d4f270
SHA1 b7cb448defa766a90beccab6faa8dbe3df6451b4
SHA256 9fcdbca9bc01881f5b06fd069499e09d608d8c5f6b1dbb301bff8efb12fe3306
SHA3 d829771535345d9380801878222eebc5ebf9826301fdeb85b68018e4494b4504
VirtualSize 0x67060
VirtualAddress 0x1a1000
SizeOfRawData 0x43000
PointerToRawData 0x1a1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.12277

.rsrc

MD5 804e51dfc9da4e49383a7ca695dcc7e7
SHA1 614ba6137f7761451970a96eb0ca8476e95674f9
SHA256 04075d97f719363ae3b070135c17a45ccd3bd82a0e8952aabf3cf671138bc4ee
SHA3 5cf0290dc70c96cbed536df8ef6e7f8267fd26356f737e38cbedc5b0707aa7c9
VirtualSize 0x48ad8
VirtualAddress 0x209000
SizeOfRawData 0x49000
PointerToRawData 0x1e4000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.02166

Imports

VERSION.dll GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
COMCTL32.dll #17
ImageList_Destroy
ImageList_Add
InitCommonControlsEx
ImageList_Create
WINMM.dll midiOutOpen
midiOutShortMsg
midiOutClose
mciSendStringA
mciSendStringW
iphlpapi.dll GetAdaptersInfo
KERNEL32.dll ExitProcess
OutputDebugStringA
GetUserDefaultLangID
CreateEventW
SwitchToFiber
CreateFiber
ConvertThreadToFiber
DeleteFiber
GetACP
IsValidCodePage
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
MulDiv
GetVersion
GetLogicalDrives
InterlockedIncrement
InterlockedDecrement
ClearCommError
ResetEvent
GetCommState
WaitForSingleObject
SetCommBreak
GetCommProperties
EscapeCommFunction
ClearCommBreak
SetCommState
SetCommTimeouts
CreateEventA
GetCurrentProcess
GetOverlappedResult
GetCommandLineA
VirtualFree
GetProcessHeap
IsBadReadPtr
HeapAlloc
VirtualProtect
HeapFree
GetSystemDirectoryA
GetModuleHandleA
TerminateProcess
GetSystemTimeAsFileTime
HeapReAlloc
GetFileType
SetStdHandle
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoA
SetLastError
GetCurrentThreadId
HeapSize
RaiseException
GetStdHandle
HeapDestroy
HeapCreate
GetConsoleCP
GetConsoleMode
SetHandleCount
RtlUnwind
SetEnvironmentVariableW
OutputDebugStringW
GetEnvironmentVariableW
GetCommandLineW
ExpandEnvironmentStringsW
WideCharToMultiByte
GetModuleFileNameA
LoadLibraryW
VirtualAlloc
_lopen
_llseek
_lread
_lclose
LoadResource
FindResourceA
LockResource
lstrcpyA
GetFileTime
CopyFileW
FindNextFileW
GetSystemDirectoryW
FindClose
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
SetFileAttributesW
SetFileTime
MoveFileW
DeleteFileW
GetCurrentThread
CreateDirectoryW
GetWindowsDirectoryW
GetLongPathNameW
GetFileAttributesW
GetLogicalDriveStringsW
RemoveDirectoryW
SetCurrentDirectoryW
GetShortPathNameW
FindFirstFileW
GetCurrentDirectoryW
GlobalSize
GlobalFree
GlobalAlloc
GlobalReAlloc
CreateFileA
GetCurrentProcessId
CompareFileTime
GetLocalTime
LocalFileTimeToFileTime
GetSystemTime
GetDateFormatA
FileTimeToLocalFileTime
GetTimeFormatA
SystemTimeToFileTime
GetTimeZoneInformation
UnhandledExceptionFilter
FileTimeToSystemTime
GetFileSize
GetTempFileNameW
CloseHandle
GetLastError
WriteFile
GetTempPathW
FlushFileBuffers
CreateFileW
ReadFile
SetEndOfFile
SetFilePointer
DeleteCriticalSection
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
GlobalUnlock
GlobalLock
FreeLibrary
LoadLibraryA
GetVersionExA
Sleep
GetProcAddress
GetLocaleInfoW
MultiByteToWideChar
GetUserDefaultLCID
QueryPerformanceCounter
QueryPerformanceFrequency
GetTickCount
GetStringTypeExA
CompareStringW
CompareStringA
IsDBCSLeadByteEx
GetLocaleInfoA
GetModuleHandleW
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetCommModemStatus
USER32.dll IsIconic
CreateMDIWindowW
RegisterClassW
PostMessageA
RegisterWindowMessageA
TrackMouseEvent
GetFocus
GetMenuState
EnumChildWindows
GetWindow
IsZoomed
GetTopWindow
BringWindowToTop
AdjustWindowRect
GetSystemMenu
GetClassInfoW
DestroyCursor
VkKeyScanA
DeleteMenu
DestroyMenu
GetMenuItemID
SetMenuItemInfoW
CheckMenuItem
GetWindowTextLengthW
EnableWindow
RemovePropA
SetWindowTextW
GetMessagePos
GetKeyState
GetSubMenu
GetMenuStringW
GetMenuItemInfoW
IsClipboardFormatAvailable
RegisterClipboardFormatA
OpenClipboard
wsprintfA
GetPropA
FrameRect
SetPropA
InvalidateRgn
SetParent
CreateWindowExW
BeginPaint
EndPaint
UpdateWindow
DragDetect
GetClassNameA
ValidateRect
ShowCursor
GetMonitorInfoA
EnumDisplayMonitors
RegisterClassA
SetTimer
KillTimer
MsgWaitForMultipleObjectsEx
WindowFromPoint
ReleaseCapture
GetMessageW
DispatchMessageW
TranslateMDISysAccel
PeekMessageW
SystemParametersInfoA
DrawFrameControl
DrawIconEx
FindWindowW
GetMenu
ShowWindow
GetMenuItemCount
CreateWindowExA
ChildWindowFromPointEx
CreateIconIndirect
RedrawWindow
DefWindowProcA
CreateCursor
LoadImageA
MessageBoxW
GetWindowTextW
GetWindowTextLengthA
ScreenToClient
MoveWindow
GetKeyNameTextW
MapVirtualKeyA
SetClipboardData
GetClipboardData
EmptyClipboard
CreateIconFromResource
CreateIconFromResourceEx
DrawTextW
LoadIconA
InvertRect
DrawIcon
GetSysColorBrush
DrawFocusRect
GetIconInfo
LoadCursorFromFileW
DestroyIcon
SendMessageW
GetParent
SetWindowPos
FillRect
SetForegroundWindow
DispatchMessageA
IsWindowVisible
MessageBoxA
EnumWindows
PeekMessageA
TranslateMessage
ClientToScreen
GetClientRect
GetWindowRect
GetForegroundWindow
TrackPopupMenu
GetCursorPos
CreatePopupMenu
CallWindowProcW
DefWindowProcW
GetWindowLongW
DefFrameProcW
ReleaseDC
SetWindowLongW
GetDC
SetScrollRange
GetScrollRange
SetScrollInfo
GetScrollPos
GetScrollInfo
SetScrollPos
SetWindowLongA
GetWindowLongA
DrawMenuBar
CopyRect
SetCapture
CreateMenu
DefMDIChildProcW
SendMessageA
MessageBeep
GetDoubleClickTime
OffsetRect
SetRect
ScrollWindow
CloseClipboard
SetFocus
GetSystemMetrics
InvalidateRect
WindowFromDC
CharLowerBuffA
CharUpperBuffA
GetAsyncKeyState
DrawEdge
InsertMenuW
DestroyWindow
EnableMenuItem
LoadCursorA
SetMenu
SetCursor
GetMessageTime
GetSysColor
GetActiveWindow
GDI32.dll GetSystemPaletteEntries
Polygon
SetBrushOrgEx
SetTextAlign
CreateMetaFileW
CloseMetaFile
CreateEnhMetaFileW
CloseEnhMetaFile
EnumFontsW
EnumFontFamiliesExW
CreateRectRgn
CombineRgn
CreatePen
LineTo
SelectClipRgn
CreatePatternBrush
SetBkMode
SetPixelV
GetTextExtentPoint32W
CreateBitmap
CreateSolidBrush
GetFontLanguageInfo
Ellipse
GetClipRgn
GetPixel
Rectangle
SetTextColor
RoundRect
GetTextMetricsA
GetTextMetricsW
DeleteEnhMetaFile
DeleteMetaFile
CreateDIBitmap
GetMetaFileA
GetEnhMetaFileW
EnumEnhMetaFile
CreateFontIndirectA
SetViewportOrgEx
SetBkColor
GetEnhMetaFileA
SetMapMode
CreateFontW
CreateBrushIndirect
SetPixel
StartDocA
SetAbortProc
EndDoc
CreateICA
SetViewportExtEx
StartPage
SetWindowExtEx
EndPage
GetStockObject
CreateDIBSection
DeleteDC
StretchBlt
CreateCompatibleBitmap
RealizePalette
BitBlt
CreateDCA
StretchDIBits
SetDIBitsToDevice
SelectPalette
DeleteObject
GetObjectA
GetDIBits
CreatePalette
GetEnhMetaFileHeader
SelectObject
SetStretchBltMode
CreateCompatibleDC
MoveToEx
TranslateCharsetInfo
GetDeviceCaps
comdlg32.dll GetOpenFileNameW
GetSaveFileNameW
ChooseColorA
PageSetupDlgA
PrintDlgA
ADVAPI32.dll DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegEnumValueW
RegQueryValueExW
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
ImpersonateSelf
AccessCheck
MapGenericMask
GetFileSecurityW
OpenThreadToken
RevertToSelf
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
SHELL32.dll DragAcceptFiles
DragQueryFileW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHFileOperationW
SHGetPathFromIDListW
SHGetMalloc
SHBrowseForFolderW
ShellExecuteW
DragFinish
ole32.dll CLSIDFromProgID
CLSIDFromString
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
IIDFromString
CoGetClassObject
OleInitialize
OleUninitialize
CoTaskMemAlloc
RegisterDragDrop
RevokeDragDrop
DoDragDrop
OLEAUT32.dll OleCreatePictureIndirect
SysAllocString
SysFreeString
OleLoadPicturePath

Delayed Imports

101

Type PICKLE
Language English - United States
Codepage UNKNOWN
Size 0x8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.40564
MD5 30cd750a6d5595bf095f2f004224f775
SHA1 70bd22fdcabbfe7fed70e1ea1ba4ab1c28e8fd76
SHA256 2198721775872163bd7d02f9177e569c79c53a4bc7a7fcf99ff10af4e1deef1e
SHA3 4702ee02eb1dc3fbdde10b241f3f2020b64a86783d46949c213169775aa9c0c2

8

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.45961
MD5 553c5666b8edf5a78ccdb597b3dea28f
SHA1 6f459e285f5ecd0b2790ff2194a202f7e8e6a95d
SHA256 0c321e20754606ea9c80942c480d67b4ee0a2b48afed7633992642e764ffb68c
SHA3 7d20c0bf5cd298c9eba69968b82b4f615a1e9522ead3584086c7b9aa522e99dd

9

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.36091
MD5 e8688bf3f141ae960dce71b7ed5c754e
SHA1 451acf61a07e98b0d639a80d09b48f3dcba761be
SHA256 bc052de58952642a33c62c4d599e56ee9090b6e5328159ae65b3648984613ffc
SHA3 2d1ef9ea64f2f25ab755e813d70e0f73e59efc4adc43ac9fd137cd6d5f2877d2

10

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.37877
MD5 1d51819c93eeb6bda5b7b5d6b5751584
SHA1 e4f79a69e2d9b8d4a083e9b94e9b9522fcfa6eea
SHA256 13fe96d20c1fd0a1aa47dd180cfc5a708659b0873aee90cfd28ace647fce24f0
SHA3 bb2f0bddba3d012d6a1956033692dc9eb496ec50274186b586a69a445f4c7cb3

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.09909
MD5 20846ca9f9140328d523b73246698b12
SHA1 68b902428bd488708628fe2fcb1c29cd89ce6331
SHA256 9a17d8d1888957c98b9249cd6cbc5b6ba14a4585fcc8b21f28f857c841e440a7
SHA3 f3b6b6b80cef8526460a6585035f5c20e88356a33322592aea71016c8531c487

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.03587
MD5 5055ecc4688559ea19480c00dfdfae3f
SHA1 43919cb66360e31c641d1da38989da1625065f5d
SHA256 7862e0d407acb11c7793387e13236736acf2db64fca60934a31a32e4e3f8b467
SHA3 901cf74fddabf06715b70b793303edd4e503d58060dfd89a24ea95443428a251

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x568
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.39783
MD5 7d9aa61caa80122a7ada2d48ba287859
SHA1 7f0935fb4716aa31cb36293d40067bdd568cf0c9
SHA256 ad3c430bd0f74ce1014bb3c3612cea99e7f62a43f37405ff179513ec77d21904
SHA3 07db0199dd8ca9b08156fa9804b4cab2472e9b86e78c742b238f10aa46b54d8c

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x42028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.95382
MD5 fd7e7bfc254f0d439932a811af9f346c
SHA1 2a1fe6baa2999eca7533ed233431cfd5b96ffa0f
SHA256 4c55afa5b466296c6a86af956f84155420b8d7ed9ea6825b326e5f02cd60e922
SHA3 af4fbb5118f3dfcc297d135309bb3b1b2130288db374236a9bb217521eb79adb

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.03612
MD5 47ae16bdcf03fcb78348193f769f3ab4
SHA1 f936c0108ce2d1b84a2022a50815d38628c7209f
SHA256 79ba477b07d3395ab0a2271f696b4f3c1872a0dd00df9d65933c33498124591a
SHA3 35055354d7cf5eac0b1b1197440a471c47f52f24848d60dbbe63d2159c986b1a

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.99088
MD5 528d1909f5788fd248a00c46cd04064c
SHA1 50e1a889e80e4b433729d83ad7147ebbe7637bb6
SHA256 9733304afbc163f72fe6a58b7a4e9f02e1a128112de86744d23d9d4c1530033a
SHA3 1bd6ad96c48045652b984fd22e48810043914d2be64340522a8b86a21ed6aa2e

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.85001
MD5 033c2678491b249845a2733080c502a1
SHA1 37312d1ae536a50bef120c0c8dbb47a43c401f2f
SHA256 fb338777ad7cc4518c7f7d5a0396be2366831aa47ac92314ec3b2f7b79eeae7d
SHA3 4ec868665f6f964de997e799920041bec03294ef0e6001155db515f397fdd576

6601

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.01924
Detected Filetype Cursor file
MD5 b3dbdfe1835416bbc3f5065baca9aca9
SHA1 334d5af1355f6a13c35be4ad16e76baaecf209f1
SHA256 ec26c438d10e3e84ec855c47f07a176e6c11bbfae1557d526490711b80f087fe
SHA3 2409b439f48a139d3764b226eda46c6a629d5bd208991369ae0c85e37c17c71d
Preview

6602

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.01924
Detected Filetype Cursor file
MD5 ebb32ed08b06ab16f79c997b7963c57c
SHA1 c87e290caff3cf222d5ec678a51927ff22637949
SHA256 9c17b4621412d6ded24a76aed74d4425ae61f86b6d4092ca1e28ca66b7c71399
SHA3 fb70f94bf4a64a26f2d83b588fe2a233796083fd03aae7835387aeba2646b847
Preview

6603

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.01924
Detected Filetype Cursor file
MD5 e6a3323fcb21bc5b90ee077f41a24061
SHA1 91e468b891f8306afeb6ac33bc31d67efb2cbe9d
SHA256 a92f60b25322592e7ddd13d88e4006c097666f4d87c8cb0c21ffdccd53b31d78
SHA3 ffc4266780334ccca3790e5f703fab0a138d252e16d1ad1145c1929f51d31d38
Preview

102

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x68
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.71787
Detected Filetype Icon file
MD5 eee2def6081be6fc6c237a1035cd0d47
SHA1 8806faa001a31ea3b44f50dd48cc65beaeaf5980
SHA256 b4a86ff543995d1a1dcad86ec767539180bbe55d27b306186eb5fa4bc3d5872f
SHA3 293718c08c74df16bc3e220b2edcbf174192ba2080a5b914811bc9c27d661b57

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x760
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.05252
MD5 2236eae5793adc1d7ce2fb4f7ea763a4
SHA1 b6c5f80b7fe5da73f98108accaba3f7906e85c9c
SHA256 b910a892d8f775e2d17a972debe35492b790ee2f4d7b29a2244684796ba4b672
SHA3 e911c6cc1c2657776368e08b3a9940e68995dd724db579ba1b7e8aa86600966a

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x37d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.03843
MD5 623a01575cb2fa77e55c648123ae7017
SHA1 8cdfefeb7fbb09e847ec2757255bd03246cdcc9c
SHA256 27628f1167442c39cc35816e493ce8a817b4641e4da86946b094f41256576c2f
SHA3 5c90f676df9be8f52687dd9f50f764eed20dcbc521818fe25149b959bb0ff255

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags VS_FF_PRERELEASE
VS_FF_PRIVATEBUILD
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName
FileVersion (#2) 1.0.0.0
Country
Release Development
FileDescription
LegalCopyright
ProductVersion (#2)
ProductName
OriginalFilename NavaDebugger
InternalName
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2010-Feb-04 16:51:42
Version 0.0
SizeofData 94
AddressOfRawData 0x19d4a0
PointerToRawData 0x19d4a0
Referenced File c:\2010r1\REALbasic\REALbasic Visual Studio\release\X86RunHoudini.pdb

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0x407d3198
Unmarked objects 0
126 (50327) 3
ASM objects (VS2012 build 50727 / VS2005 build 50727) 57
C objects (VS2003 (.NET) build 4035) 10
C objects (VS2012 build 50727 / VS2005 build 50727) 151
C objects (VS98 build 8168) 6
Imports (VS2003 (.NET) build 4035) 25
Total imports 487
C++ objects (VS2012 build 50727 / VS2005 build 50727) 55
114 (VS2012 build 50727 / VS2005 build 50727) 251
Resource objects (VS2012 build 50727 / VS2005 build 50727) 1
Linker (VS2012 build 50727 / VS2005 build 50727) 1

Errors

Leave a comment

No comments yet.