| Architecture |
IMAGE_FILE_MACHINE_I386
|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date |
1992-Jun-19 22:22:17
|
| Detected languages |
English - United States
|
| Suspicious |
PEiD Signature: |
dUP 2.x Patcher --> www.diablo2oo2.cjb.net
dUP 2.x Patcher -> www.diablo2oo2.cjb.net
|
| Suspicious |
Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
Contains references to internet browsers:
- IEXPLORE.EXE
- chrome.exe
- firefox.exe
Contains another PE executable:
- This program cannot be run in DOS mode.
Miscellaneous malware strings:
Contains domain names:
- http://koti.mbnet.fi
- http://koti.mbnet.fi/vaultec/
- http://www.softpedia.com
- http://www.softpedia.com/get/PORTABLE-SOFTWARE/Security/Password-Managers---Generators/IDM-Password-Decryptor-Portable.shtml
- http://www.softpedia.com/get/PORTABLE-SOFTWARE/System/Backup-and-Recovery/Portable-IDM-Backup-Manager.shtml
- https://www.internetdownloadmanager.com
- https://www.internetdownloadmanager.com/register/new_faq/functions7.html
- internetdownloadmanager.com
- softpedia.com
- www.internetdownloadmanager.com
- www.softpedia.com
|
| Suspicious |
The PE contains functions most legitimate programs don't use. |
Functions which can be used for anti-debugging purposes:
Can access the registry:
- RegQueryValueExA
- RegOpenKeyExA
- RegCloseKey
- RegSetValueExW
- RegQueryValueExW
- RegOpenKeyExW
Possibly launches other programs:
- WinExec
- CreateProcessW
- ShellExecuteW
- ShellExecuteA
Can create temporary files:
- GetTempPathW
- CreateFileW
- CreateFileA
Checks if it has admin rights:
|
| Malicious |
The PE header may have been manually modified. |
Resource UNSIGNER detected as a PE Executable.
The resource timestamps differ from the PE header:
|
| Malicious |
VirusTotal score: 46/71 (Scanned on 2023-05-14 22:52:54) |
Bkav:
W32.AIDetectMalware
Lionic:
Trojan.Win32.Generic.4!c
Cynet:
Malicious (score: 100)
Cylance:
unsafe
Zillya:
Tool.Crack.Win32.4961
Sangfor:
Trojan.Win32.Save.a
K7AntiVirus:
Unwanted-Program ( 00517dbc1 )
K7GW:
Unwanted-Program ( 00517dbc1 )
Cybereason:
malicious.069b6e
Cyren:
W32/ABRisk.POTB-5362
Symantec:
PUA.Keygen
Elastic:
malicious (high confidence)
ESET-NOD32:
a variant of Win32/HackTool.Crack.FO potentially unsafe
APEX:
Malicious
Paloalto:
generic.ml
Avast:
Win32:MiscX-gen [PUP]
TrendMicro:
Trojan.Win32.BIANLIAN.YXCIHZ
McAfee-GW-Edition:
BehavesLike.Win32.Wabot.lh
Trapmine:
malicious.high.ml.score
FireEye:
Generic.mg.dcdc109069b6e0d8
Sophos:
Generic Reputation PUA (PUA)
Ikarus:
Trojan-GameThief.Win32.OnLineGames
Webroot:
W32.Malware.Gen
MAX:
malware (ai score=99)
Antiy-AVL:
GrayWare/Win32.Presenoker
Microsoft:
HackTool:Win32/Agent
Gridinsoft:
Trojan.Win32.Agent.cl
Xcitium:
ApplicUnwnt@#2gep82bydwcs9
SUPERAntiSpyware:
Hack.Tool/Gen-Crack
GData:
Win32.Application.Agent.CP92WF
Google:
Detected
AhnLab-V3:
HackTool/Win.Agent.R550111
McAfee:
RDN/Generic PUP.z
TACHYON:
Trojan/W32.DP-Agent.76288.R
VBA32:
BScope.Trojan.Bitrep
Malwarebytes:
Crack.Trojan.HackTool.DDS
Panda:
PUP/Crack
TrendMicro-HouseCall:
Trojan.Win32.BIANLIAN.YXCIHZ
Rising:
HackTool.Crack!8.38F (TFE:5:8LCIRMtZgKG)
Yandex:
Trojan.GenAsa!goBHvcP+dPg
MaxSecure:
Trojan.Malware.185080952.susgen
Fortinet:
Riskware/Crack
BitDefenderTheta:
Gen:NN.ZelphiF.36196.eGW@aqV7IDni
AVG:
Win32:MiscX-gen [PUP]
DeepInstinct:
MALICIOUS
CrowdStrike:
win/grayware_confidence_100% (W)
|
| MD5 |
dcdc109069b6e0d80d776c143fecde3f
|
| SHA1 |
761589c94ba8c2fd57d3ae9666a0fdc0d1b72eb5
|
| SHA256 |
fe44f050ab9ea33f87acef449ed57157a331a19956207d6243522676c894e284
|
| SHA3 |
41b6bef856655e59ec3cfa387712b06e1863cd03cf8c29448cc62428b9c0a95b
|
| SSDeep |
768:Jfs8N18U/TZklIrB/zkHsXaH61xxpBf/0y1gGAT/ZHgf4sMM34zCT1Ty:lrf9kY7kyaE8DzjCf4sMM0CFy
|
| Imports Hash |
8d06472751a48003a4a3909de9a29f53
|
| e_magic |
MZ
|
| e_cblp |
0x50
|
| e_cp |
0x2
|
| e_crlc |
0
|
| e_cparhdr |
0x4
|
| e_minalloc |
0xf
|
| e_maxalloc |
0xffff
|
| e_ss |
0
|
| e_sp |
0xb8
|
| e_csum |
0
|
| e_ip |
0
|
| e_cs |
0
|
| e_ovno |
0x1a
|
| e_oemid |
0
|
| e_oeminfo |
0
|
| e_lfanew |
0x100
|
| Signature |
PE
|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections |
8
|
| TimeDateStamp |
1992-Jun-19 22:22:17
|
| PointerToSymbolTable |
0
|
| NumberOfSymbols |
0
|
| SizeOfOptionalHeader |
0xe0
|
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
| Magic |
PE32
|
| LinkerVersion |
2.0
|
| SizeOfCode |
0x7e00
|
| SizeOfInitializedData |
0xa800
|
| SizeOfUninitializedData |
0
|
| AddressOfEntryPoint |
0x000089C4 (Section: CODE)
|
| BaseOfCode |
0x1000
|
| BaseOfData |
0x9000
|
| ImageBase |
0x400000
|
| SectionAlignment |
0x1000
|
| FileAlignment |
0x200
|
| OperatingSystemVersion |
4.0
|
| ImageVersion |
0.0
|
| SubsystemVersion |
4.0
|
| Win32VersionValue |
0
|
| SizeOfImage |
0x18000
|
| SizeOfHeaders |
0x400
|
| Checksum |
0
|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| SizeofStackReserve |
0x100000
|
| SizeofStackCommit |
0x4000
|
| SizeofHeapReserve |
0x100000
|
| SizeofHeapCommit |
0x1000
|
| LoaderFlags |
0
|
| NumberOfRvaAndSizes |
16
|
| MD5 |
98a771451d98f5cd26f8f3b4ce0fd18d
|
| SHA1 |
1667f18da5c6e8121650123ad626d323677097eb
|
| SHA256 |
91eef25f7cc5de23faf6aa4bcc0bb93a7a161422961ea89f883222e4619da72c
|
| SHA3 |
ca039bb917ff7172d20509d629885980d1ac00a3a2a2e719a3bf65d3d9e99bf7
|
| VirtualSize |
0x7c8c
|
| VirtualAddress |
0x1000
|
| SizeOfRawData |
0x7e00
|
| PointerToRawData |
0x400
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
|
| Entropy |
6.35511
|
| MD5 |
d6c6456ab7c441389a74a8f41e9d3a0f
|
| SHA1 |
f11b82ae994ae7c221451131e17dcd34fe50acf8
|
| SHA256 |
599e1b4a0a1af6d5239e8744441caecc46d5efce78311c8333cc17e8eae2e082
|
| SHA3 |
2e8dc5597496e6b922ca72ed6ca63a3daba08505fb04331ef49a68174832214d
|
| VirtualSize |
0x47c
|
| VirtualAddress |
0x9000
|
| SizeOfRawData |
0x600
|
| PointerToRawData |
0x8200
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
|
| Entropy |
2.78158
|
| MD5 |
d41d8cd98f00b204e9800998ecf8427e
|
| SHA1 |
da39a3ee5e6b4b0d3255bfef95601890afd80709
|
| SHA256 |
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
|
| SHA3 |
a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
|
| VirtualSize |
0x691
|
| VirtualAddress |
0xa000
|
| SizeOfRawData |
0
|
| PointerToRawData |
0x8800
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
|
| MD5 |
fbad136cfa6e215a86bd65b1ed12573e
|
| SHA1 |
35b012f73fef2ff97cb53e497d6aaf308d90a3fc
|
| SHA256 |
8a0067a5b0301e24483516f69b58777bc4ea8a23a4254f912d23ff72d9e450d0
|
| SHA3 |
dacb7bc62124613fae5ac9eb3a5b1443529f12eec60d2adbcad8e60b9576f0c6
|
| VirtualSize |
0xa3a
|
| VirtualAddress |
0xb000
|
| SizeOfRawData |
0xc00
|
| PointerToRawData |
0x8800
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
|
| Entropy |
4.18345
|
| MD5 |
d41d8cd98f00b204e9800998ecf8427e
|
| SHA1 |
da39a3ee5e6b4b0d3255bfef95601890afd80709
|
| SHA256 |
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
|
| SHA3 |
a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
|
| VirtualSize |
0x8
|
| VirtualAddress |
0xc000
|
| SizeOfRawData |
0
|
| PointerToRawData |
0x9400
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
|
| MD5 |
d61303205e73ca096826f93772cb8a34
|
| SHA1 |
489996058c68b3afbea98f27af782cf2e2cc7568
|
| SHA256 |
0b96500eb2ee862b46b2ded8e7c603dd0d950086182f68033674f87af0bd8431
|
| SHA3 |
b7ff1bbdec54348054e176781d962335438b541f485857e17b6b7c06e77fd7ef
|
| VirtualSize |
0x18
|
| VirtualAddress |
0xd000
|
| SizeOfRawData |
0x200
|
| PointerToRawData |
0x9400
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
|
| Entropy |
0.204488
|
| MD5 |
e9d7d59a805beb3e93e9f50376f2a3b3
|
| SHA1 |
b13765af477912d6d28dfac0d09bea1ed54149ae
|
| SHA256 |
1045b043d2aa9468d5a0a2b76051198eb138571b555d2e5d38fb3946a86f259a
|
| SHA3 |
f8790faaa9f01dd78a27a40ce9ac862ce56fa35aafc4e87923f3a10e2b7d6bdc
|
| VirtualSize |
0x718
|
| VirtualAddress |
0xe000
|
| SizeOfRawData |
0x800
|
| PointerToRawData |
0x9600
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
|
| Entropy |
6.27072
|
| MD5 |
734fa21f09146b2bb3cff37f58cedaa7
|
| SHA1 |
87b72ff7806cfb2273738a27ee47f759fc059085
|
| SHA256 |
25bb223c2bbe5b1f9a7d4d06c5be726b55f901afc2d523cc0e2a78e4680bed60
|
| SHA3 |
c42522002ff95135b021cded74d419beab42d0736398b07b8abd7ddf6881057f
|
| VirtualSize |
0x8c00
|
| VirtualAddress |
0xf000
|
| SizeOfRawData |
0x8c00
|
| PointerToRawData |
0x9e00
|
| PointerToRelocations |
0
|
| PointerToLineNumbers |
0
|
| NumberOfLineNumbers |
0
|
| NumberOfRelocations |
0
|
| Characteristics |
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
|
| Entropy |
6.1177
|
| kernel32.dll |
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
CreateThread
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
|
| user32.dll |
GetKeyboardType
MessageBoxA
CharNextA
|
| advapi32.dll |
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
|
| oleaut32.dll |
SysFreeString
SysReAllocStringLen
SysAllocStringLen
|
| kernel32.dll (#2) |
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
CreateThread
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
|
| advapi32.dll (#2) |
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
|
| kernel32.dll (#3) |
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
CreateThread
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
|
| gdi32.dll |
SetTextColor
SetBkColor
|
| user32.dll (#2) |
GetKeyboardType
MessageBoxA
CharNextA
|
| shell32.dll |
ShellExecuteExA
|
| shell32.dll (#2) |
ShellExecuteExA
|
| Type |
BINRES
|
| Language |
English - United States
|
| Codepage |
UNKNOWN
|
| Size |
0x2c6d
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.76831
|
| MD5 |
8b673eee3ede90fa71a7c636f5fa4afe
|
| SHA1 |
6d289f878736afbfaccc60f245621af3915f5525
|
| SHA256 |
0187e89585143e50537e3ec23789b4aeed78aab657ee8d7a7e6b06e03dba2096
|
| SHA3 |
7434e95667a7f450de051b46ff9028d83b00d5f547bdaed862c066f930a96c68
|
| Type |
BINRES
|
| Language |
English - United States
|
| Codepage |
UNKNOWN
|
| Size |
0x1a22
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.50066
|
| MD5 |
5e7c73fecfdc71e75a35231c2e941e4f
|
| SHA1 |
efd53834b15078d68507c11470adc81340708d79
|
| SHA256 |
1e13c1062b2956f073b3abf363d6ab6ca45c52ab79bab175c21cc609c845c207
|
| SHA3 |
26a9e8ff4911952f5642ae38d790e86eecb5e6ce9a864b6000ea998311748890
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x112
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.02225
|
| MD5 |
25f3b2262e92449c5d9e7fa2b8f7d171
|
| SHA1 |
5a56bb8277e1b0aff566ab9e19dd89a159752940
|
| SHA256 |
e76b171fe79f4f24809d709aaf0440873993b9583cbeef9829f327bbda51aaeb
|
| SHA3 |
a5c26cd6d547a8df7219fda9ee3b049ee5a0c3d9af892d9a4558b5fb0aefcb10
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x31e
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.36471
|
| MD5 |
c9f46ce1c43c5690159ffd1544e7cd65
|
| SHA1 |
a7b9dd7ea8a68408f0e9f1e6fb81b1412c8da4ba
|
| SHA256 |
fefb9f428921baca4d0e6101c527cebb3a4c6c8e44406bfa20e96d634a7b126d
|
| SHA3 |
e9a69e1255b9cd1f9635226252b0d1559a3b2ef5446214b74482df9839b370db
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x143
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
4.898
|
| MD5 |
9541ed9ee1530ed742d75acdd23f57fc
|
| SHA1 |
595a914910303a13ceca86e5495a21d897e46954
|
| SHA256 |
81e4324156c1237002ec96ab162187b026a8e51fe828b24f027eb4ab478c374c
|
| SHA3 |
3543bd877da005a56712d1fa459842113b32cb672c473c08bb73955ef2c133d5
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x280
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.16471
|
| MD5 |
3320960abf4e179e6f0209d60982b028
|
| SHA1 |
c3e554a472244e13d4b8a426782d418e49f375ed
|
| SHA256 |
6c0fa346879b63eb5b64f552dcc433a86d28f86e54a6fd027eebfa26d9cb5301
|
| SHA3 |
a9f21d30e74edbe1b478c133bb262c06556d6242e8cdc8abfcb3b6bec0880a36
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x3a6
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.07133
|
| MD5 |
5eff73e8838586c0ba8db20dbda6d637
|
| SHA1 |
6b1f995470986c35f47786c2db7d333738ff12ac
|
| SHA256 |
9a858fe69a74e2e4517e9c64da6cc596355d6f80c1998caa920bfa7346f51bbd
|
| SHA3 |
6c74da14e440033e7535bb141db05688852e2dc9c54e7f0cd6acff3a37439710
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x37
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
4.48118
|
| MD5 |
cc01f6b92b77682f7f45c48b10791391
|
| SHA1 |
fb313c691a2bd4e71b8767c6b75d52274586fb61
|
| SHA256 |
714fd053e67fa99f02ff051f8cb6c53f5ec096ba282fe27e4dbae7c39bb826a1
|
| SHA3 |
d9743801dc8695456826959c476b28cabc73c3adf94e65c3aa8101ac4c6846a8
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x2400
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.00944
|
| Detected Filetype |
PE Executable
|
| MD5 |
b69afe73ccfa949818fcd721bd32d8b3
|
| SHA1 |
3e961e7bd9cb456b6778668dee98afa2cf8782dd
|
| SHA256 |
a9a6e074eaf2c90325a84797c24d17ed755d79ce0e608ce54fe584fa54ed9ecc
|
| SHA3 |
2882fe517ee339d46544a4834ff680a4d35a474c7cbd48be4aaee4e4442aa1c9
|
| Type |
BINRES
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x3d2
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.4452
|
| MD5 |
11d0034eb00ad20ece527bb71875bcbc
|
| SHA1 |
52215fd6585afd3afd9657231215efefa7a74ea7
|
| SHA256 |
d5d58c1288265fd44f62b50fb6975903ee9e29221d1590f7f033c4009409c9fa
|
| SHA3 |
d0672c80eca01680bfd04faa50ee9b7cf270f8ded61585d0ea70c9d31a67f21c
|
| Type |
RT_ICON
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x2e8
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
1.96237
|
| MD5 |
40fdaec38f1a963cc6cc516d07d0fc75
|
| SHA1 |
3125f7180443836a3dc965bbf21d76217b88f9a0
|
| SHA256 |
c7895ea64e2cae0a1abc529deb762a477a41461a38d20c85362b59c0208eadcf
|
| SHA3 |
34be37c0b64f1945d2f0380110504e6df36b0f7fdba1619f234b72726f006f76
|
| Type |
RT_DIALOG
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x178
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
3.23595
|
| MD5 |
8c6b2e5d6646a0764c5b84311f1744e7
|
| SHA1 |
ca4ac4a78274dbbaaf71b18e96619c05491c27f7
|
| SHA256 |
315b0fad05063a507cadbef411882e82a6483a0a7f6a4a80ce3c741b6c3ef3c8
|
| SHA3 |
06347a1d93fadfe83a1f1ee0f6a6573ff0471f66f91e9bd9b3739be05b117cb9
|
| Type |
RT_RCDATA
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x10
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
4
|
| MD5 |
d8090aba7197fbf9c7e2631c750965a8
|
| SHA1 |
04f73efb0801b18f6984b14cd057fb56519cd31b
|
| SHA256 |
88d14cc6638af8a0836f6d868dfab60df92907a2d7becaefbbd7e007acb75610
|
| SHA3 |
a5a67ad8166061d38fc75cfb2c227911de631166c6531a6664cd49cfb207e8bb
|
| Type |
RT_RCDATA
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x64
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
4.57243
|
| MD5 |
427bad538591c3254ade66990197aa01
|
| SHA1 |
36fd87b6ecfbce60922c3b131a18bb9dead59fe5
|
| SHA256 |
81203b2da3a9169eb5a07b2e9f5e62d80306aab5c3751f277541d15f02a30f68
|
| SHA3 |
7a6742a07d81937bfd6cbcd883511171b4b0e4b21129de585927000098a58b7f
|
| Type |
RT_GROUP_ICON
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x14
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
2.16096
|
| Detected Filetype |
Icon file
|
| MD5 |
42cf62b780813706e75fb9f2b2e8c258
|
| SHA1 |
a022d5c1cfdd8aace0089f3e72f2eedd41bda464
|
| SHA256 |
a0c9d012e2bf6b2fe05c2d97cb5594d97cf2f539e97935c12abd7a3562f4d9bf
|
| SHA3 |
0aafc8e3d8b6bde595537da4ffe0efc5fe53f01dafe336a2a5828b6a71283d3c
|
| Type |
RT_MANIFEST
|
| Language |
UNKNOWN
|
| Codepage |
UNKNOWN
|
| Size |
0x691
|
| TimeDateStamp |
2022-Apr-14 01:47:28
|
| Entropy |
5.03348
|
| MD5 |
c9448541f24100ba334219eb0ae3fe1f
|
| SHA1 |
09fbebe9249b02e7fe58ece0d1c62312d494328a
|
| SHA256 |
955eac893c9afd4de61ef83507f2e247be93336459d5b511e0476c308fc2d360
|
| SHA3 |
8f7b8eeb7e9c9227d5a142732e9d5a62e407e1b2ae6577cd464b7b4df4874ff1
|
| StartAddressOfRawData |
0x40c000
|
| EndAddressOfRawData |
0x40c008
|
| AddressOfIndex |
0x409088
|
| AddressOfCallbacks |
0x40d010
|
| SizeOfZeroFill |
0
|
| Characteristics |
IMAGE_SCN_TYPE_REG
|
| Callbacks |
(EMPTY)
|
[*] Warning: Section BSS has a size of 0!
[*] Warning: Section .tls has a size of 0!