8b9c489961bbf9d98f84d75f878a8076c1a1424018b6a59aba40660bef8e7886

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2021-Aug-23 03:55:16
Detected languages English - United States
CompanyName Studio 3T
FileDescription Studio 3T is the professional IDE, client, and GUI for MongoDB
FileVersion 0. 0. 0. 0
InternalName
LegalCopyright B4A
LegalTrademarks
OriginalFilename
ProductName Studio 3T for MongoDB
ProductVersion 0.0.0.0
Comments board4all.biz

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • CMD.EXE
Info Cryptographic algorithms detected in the binary: Uses constants related to RC5 or RC6
Suspicious The PE is possibly packed. Unusual section name found: .itext
Unusual section name found: .didata
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryA
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegQueryValueExW
  • RegOpenKeyExW
  • RegCloseKey
  • RegSetValueExW
  • RegSetValueW
  • RegQueryValueW
  • RegOpenKeyW
  • RegEnumKeyW
  • RegDeleteKeyW
  • RegCreateKeyExW
Possibly launches other programs:
  • CreateProcessW
Enumerates local disk drives:
  • GetVolumeInformationW
  • GetDriveTypeW
Info The PE's resources present abnormal characteristics. Resource SRC is possibly compressed or encrypted.
Malicious VirusTotal score: 47/72 (Scanned on 2025-03-08 15:31:12) APEX: Malicious
AVG: Win32:Malware-gen
AhnLab-V3: Malware/Win.CQ.R475397
Alibaba: Trojan:Win32/Convagent.ca3e6ec9
Antiy-AVL: Trojan/Win32.Poweliks
Avast: Win32:Malware-gen
Avira: TR/Redcap.zdcwr
Bkav: W32.Common.AF6D6A6D
CAT-QuickHeal: Trojan.Ghanarava.1679620450cff8ee
CTX: exe.trojan.convagent
ClamAV: Win.Malware.Midie-9973163-0
CrowdStrike: win/grayware_confidence_100% (W)
Cylance: Unsafe
Cynet: Malicious (score: 100)
DeepInstinct: MALICIOUS
DrWeb: Trojan.KillProc2.16825
Elastic: malicious (high confidence)
F-Secure: Trojan.TR/Redcap.zdcwr
Fortinet: W32/PossibleThreat
Google: Detected
Gridinsoft: Ransom.Win32.Wacatac.oa!s1
Ikarus: Trojan.Agent
Jiangmin: Trojan.Runner.iy
Kaspersky: HEUR:Trojan.Win32.Convagent.gen
Lionic: Trojan.Win32.Convagent.4!c
Malwarebytes: Generic.Malware.Agent.DDS
MaxSecure: Trojan.Malware.140075420.susgen
McAfee: GenericRXPZ-CQ!500FE6511290
McAfeeD: ti!8B9C489961BB
Microsoft: Trojan:Win32/Convagent!MSR
NANO-Antivirus: Trojan.Win32.KillProc2.jpnjbx
Paloalto: generic.ml
Panda: Trj/Genetic.gen
Rising: Trojan.Convagent!8.12323 (CLOUD)
Sangfor: Trojan.Win32.Save.a
SentinelOne: Static AI - Suspicious PE
Skyhigh: BehavesLike.Win32.Generic.fh
Sophos: Mal/Generic-S
Symantec: ML.Attribute.HighConfidence
Tencent: Malware.Win32.Gencirc.10bdec39
Trapmine: suspicious.low.ml.score
VBA32: BScope.Trojan.MulDrop
Varist: W32/ABRisk.UOJO-5487
ViRobot: Trojan.Win.Z.Ulise.308224
Webroot: W32.Trojan.Gen
Zillya: Trojan.Inject.Win32.320601
alibabacloud: Trojan:Win/Fragtor.Gen

Hashes

MD5 500fe6511290e484aeb74d0b47cff8ee
SHA1 bff6a93b04ba6022c33f5a442bd8d755ae8a38c2
SHA256 8b9c489961bbf9d98f84d75f878a8076c1a1424018b6a59aba40660bef8e7886
SHA3 24aeb253a59707542250a2ee72f3c427a7360517b7276ec47fecdffdcb1b6b4e
SSDeep 3072:t07R0m9xNbDNwLkhutRG+AhcQsCKG0JUKniMVZqEvYsNvvZ/p6+fyVRs5cyh9sFJ:t07R0Crbhsq+AnvgUKniM1O+aV9jBD
Imports Hash 7eb583052cbb50d60e05090d4af842b2

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 10
TimeDateStamp 2021-Aug-23 03:55:16
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x2f400
SizeOfInitializedData 0x1bc00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00030410 (Section: .itext)
BaseOfCode 0x1000
BaseOfData 0x31000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.0
ImageVersion 0.0
SubsystemVersion 5.0
Win32VersionValue 0
SizeOfImage 0x6a000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 1d7432b959cd9850bd8ce20164d8eec2
SHA1 1e22aeef0ac2cf2dab3b93d1475f79e444853bd5
SHA256 d4646e99e5bfd98e55beaa977f8376ca49d0425e3674ca67c784027cc6d91424
SHA3 0428aba4c23bbd39f3b9ef60301ea0ef7329e71c66b24da34d6e0ed9bcf93283
VirtualSize 0x2ebd4
VirtualAddress 0x1000
SizeOfRawData 0x2ec00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.3375

.itext

MD5 209885161d8c42861470c18189e751b8
SHA1 47a2ce7cd8a1f460e0863b16dc9eea7577c21632
SHA256 5fad7038023849813cd1276e94ff8fed8d23cc76299fec4a475983eb24524ac9
SHA3 30f230a358465ff491965713078da572d191ba501ec48f25ced1550ebe80ea18
VirtualSize 0x778
VirtualAddress 0x30000
SizeOfRawData 0x800
PointerToRawData 0x2f000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.89957

.data

MD5 f93100635d8337510692028567fbdc14
SHA1 e5257518fe404c652122eabe83c77b762bd00e04
SHA256 0983ebe2517c3a6f6fcc2717a2152c13172d5b109e039a37b6297160d091db02
SHA3 99e1ea108ef8c90e7a948af1063f96af69dde92692f6dcf78b909e5de90878cd
VirtualSize 0x1e64
VirtualAddress 0x31000
SizeOfRawData 0x2000
PointerToRawData 0x2f800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.89691

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x18cd8
VirtualAddress 0x33000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 966ef18be875d1334f758c3764cf3a14
SHA1 4cb9077b9d989d0217b02a099d0ea6dcfd4f5f77
SHA256 53e6a1c0d913f55d3a5f1572cd4d76aedd5779d23dfaa0c3051c9ac5a0b3734b
SHA3 89b7812ef26ce215b53735e1d359c7075889a348918f547043157ca5811f9b8a
VirtualSize 0x1664
VirtualAddress 0x4c000
SizeOfRawData 0x1800
PointerToRawData 0x31800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.86585

.didata

MD5 6640352e2cdae94c72d9704520ee8741
SHA1 ae8e496ae77554696c379033252392326d33f777
SHA256 e4546c385bf2f7fa4ac8e157c77f90ab0afe472e230270f115e917701285dee5
SHA3 8ad574bef4ae5be90257370e157c9b3ad64584f2bb48f8e9988a59607fbbc7ba
VirtualSize 0x130
VirtualAddress 0x4e000
SizeOfRawData 0x200
PointerToRawData 0x33000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.06427

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x8
VirtualAddress 0x4f000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 db363525514d824b01d90ed2ed4621a6
SHA1 6d7a3b079a7c7da00953d2b8e34f419d8e149aad
SHA256 8af46aff0a49ddc11b7b1b4bc47f44657977dcc167ff4e202d91fd1a86c7b0ec
SHA3 eba785145f1d0daedac35c7546cfebdf197af8effcf8bd0a9c0fce5f47d4a380
VirtualSize 0x18
VirtualAddress 0x50000
SizeOfRawData 0x200
PointerToRawData 0x33200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.195869

.reloc

MD5 3529049a1ccbcb671c0bf6b73ecf264d
SHA1 acd44353eb168c2596f102ea688ca94e64316a29
SHA256 473cadcf343f5d4ae87c017f9842244f891d1c9104420556e4ea6215eb97c536
SHA3 8a72365c549c1e595b4bd616470992b6935316fd7a9cd8605344f1d2ec609bef
VirtualSize 0x394c
VirtualAddress 0x51000
SizeOfRawData 0x3a00
PointerToRawData 0x33400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.61127

.rsrc

MD5 fc99d418e7d13d2219854a7a5f51c592
SHA1 631942ec3bdf8778aceff7668234b81dc50a35c5
SHA256 034e31d813a7107f9cc49b217006572a4d99478a3dacf534cc01ebc745634776
SHA3 0d46198aac875967d343666cee9b768022ddf6765c6ee515c631040bc1105970
VirtualSize 0x144c8
VirtualAddress 0x55000
SizeOfRawData 0x14600
PointerToRawData 0x36e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.68373

Imports

oleaut32.dll SysFreeString
SysReAllocStringLen
SysAllocStringLen
advapi32.dll RegQueryValueExW
RegOpenKeyExW
RegCloseKey
user32.dll MessageBoxA
CharNextW
LoadStringW
kernel32.dll Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsDBCSLeadByteEx
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
GetConsoleCP
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
SwitchToThread
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
GetFileSize
CreateFileW
GetStdHandle
CloseHandle
kernel32.dll (#2) Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsDBCSLeadByteEx
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
GetConsoleCP
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
SwitchToThread
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
GetFileSize
CreateFileW
GetStdHandle
CloseHandle
user32.dll (#2) MessageBoxA
CharNextW
LoadStringW
mpr.dll WNetGetConnectionW
WNetCancelConnection2W
WNetAddConnection2W
kernel32.dll (#3) Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsDBCSLeadByteEx
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
GetConsoleCP
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
SwitchToThread
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
GetFileSize
CreateFileW
GetStdHandle
CloseHandle
advapi32.dll (#2) RegQueryValueExW
RegOpenKeyExW
RegCloseKey
kernel32.dll (#4) Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsDBCSLeadByteEx
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
GetConsoleCP
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
SwitchToThread
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
GetFileSize
CreateFileW
GetStdHandle
CloseHandle
MSVCRT.DLL _getch
msvcrt.dll _ltow
_ultow
_wtol
wcstoul
wcstol
_pipe
feof
ferror
fgets
_pclose
_wpopen
fflush
_dup2
_dup
_close
_get_osfhandle
_open_osfhandle
shell32.dll ShellExecuteExW
kernel32.dll (delay-loaded) Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsDBCSLeadByteEx
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
GetConsoleCP
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
SwitchToThread
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
GetFileSize
CreateFileW
GetStdHandle
CloseHandle

Delayed Imports

Attributes 0x1
Name kernel32.dll
ModuleHandle 0x4e060
DelayImportAddressTable 0x4e06c
DelayImportNameTable 0x4e084
BoundDelayImportTable 0x4e09c
UnloadDelayImportTable 0x4e0ac
TimeStamp 1970-Jan-01 00:00:00

1

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.14606
MD5 0cee951da9249afe79f4535690f681d9
SHA1 7b69e020ab075c3270d7a565962bba7f3eb1c6d4
SHA256 a4d31ffcecae747595831bf2fe65b144273cc90246e5a9a58187e800f2fa6b15
SHA3 b1a87bb5bb2d398f373e126941e71b6c23c17a466291b2ebb98af135f5c13b29

4085

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x26c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.12207
MD5 7635e046eb467b0652300a43b948a52f
SHA1 6844c91aace71996fcfa41f786dbd7bf7fa70cd6
SHA256 97f7e16ff21b6db474b05f7c93326b17c27696aae04b5c6b8046dced2660bc69
SHA3 fdd1610b0e96b4abae9d3ff78b74e245db4698d3d3dcba27562b57944fe486ad

4086

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x6ec
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33549
MD5 646100fbae7646e8082b8e88843b45a1
SHA1 e5e507ad6b09184dd23acf2ab0631582e6c2c245
SHA256 f94b152d276201f13d68d5c6497f90318ec434882c90acd8b29ce998f11b6ed2
SHA3 ae5e1596f28d86e9e3dd1dd95dec1f683516978075295f66f7d8f19be97dd6ea

4087

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x5a4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.29602
MD5 9febe7bdcb9d2d9ec1522f7028ca98dc
SHA1 093cf8df88475801e450694fc91ca050c981b1db
SHA256 7da16fc0bd4ce22aeb07ea1d146b95348b41425a4da13101c33b08512a248638
SHA3 8c7d1d1c6ef60a1a291ab4cfa46a2216d7eea03b7bad2bb42852c8c1ad91d29b

4088

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x7cc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.27912
MD5 376828d4a2d320777432982d2aabed2a
SHA1 faaefd9dbde3de435717d5882debbe450cadc805
SHA256 c2393a443f9e20771c3262695b035618563f76748e5990541fe4eea20bb5aee7
SHA3 161a5e3c16bb55f3eede1f38e9213270eba65c5e5628b7bf8fc710a5d67c07f3

4089

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x398
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33352
MD5 c085d89be85d9c50b99ae5ec2fd33695
SHA1 28231d7d796aab74446de03aad5a3afb3851d32f
SHA256 36c4e0f69cc42825fb4fc98f741ca772fecf30eb37cfd2cd56e3abcbe6f68f8f
SHA3 d4732fd8cb99ab171f4bec0e8d10fed6e649e89060d6e2b70ff65513d6e80b35

4090

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x320
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.61845
MD5 3bf77a1b8a60450da7441b75197a9eb7
SHA1 1a3a80681f080e5bc1dada5ecdb5c888f3ee4e69
SHA256 910372c8d4a72b6e5dab94478ed5db9f1b848a00172ab0adfaea4131d3f5c1dd
SHA3 f311e291519541307f6c3c69880e71b4a72f7f905032b3ae3d77129fb7039936

4091

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x230
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.51417
MD5 d5aaa4c51db9236f29cc0d85acdf4d35
SHA1 cf66834e9fbe3ef5a498b08ae73709e8430da1db
SHA256 969284ed74390e543a1e264c0c34353dfa5f640af6fb021f4c58f29b0c329d4a
SHA3 05707bf47a1672abb98ba2dda257d6f2da884c6c050f45ab7f3d281d0613ad1a

4092

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0xb8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34235
MD5 032202aebb86c9cd02f74935cea9f678
SHA1 989e42adbe1557b65c91efe96260ea42c79442b9
SHA256 fdc5a10957d05b09b96894fde7b40cce336d32469e3542fb05a3c0a4a7deaae2
SHA3 8c43e8353c29ee672e3745d35ddf682e3ad2d05eddb31a050a4b5d5936857b4f

4093

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0xd0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.27608
MD5 5414cdc49ce654a6465aa840aa1a8107
SHA1 26521a3f46ca55c77953f382be108efd6239015a
SHA256 9ea3f9f827888532e291f2db17180dddcca4a519a85cbec7fdb9ac13342da321
SHA3 8bede8ae89b74b44155d482d0034d8812c13d192b776932b2edf3e48a73c84bc

4094

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x390
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.3245
MD5 b635f8851bb8bb77db3b3f80583b0f7e
SHA1 d2e3f0e6d1a4dd120c63bd11836cca38a5c56ba0
SHA256 9ec3ca977e5cc77c2d249072d5d4dc42c6317527ab022a2c9897e2074de40af8
SHA3 54286f7452c65bfa0ea6f8f618f79c146573e3e4ffd1da624d4682a5629f502b

4095

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x338
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.35594
MD5 bc06ca47ee6f8d20c4389834f53a44f4
SHA1 102cf0807762abbf7250c533692c282d045a5239
SHA256 e78299e236878f8931b75a5cb1ef7a566f6d2e204d6a3ab5a40d01df44709545
SHA3 c9ace61db2f1daf8a5203b1d42290d62e58289f030e2946a1e32b002ccdf530c

4096

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x2d0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28919
MD5 0cc5ea1dc96f98e878fcf0230bd0983c
SHA1 efec3eb732bedc1c6ff61bd8deeac727ea8e2ecf
SHA256 9dcff67237cae3374ea8485e09302cc03947d46ddd08c195b93cd7ce28b2ae87
SHA3 f9eb2e9ec6a3b0e29c87f5f0ac8c3a8dd08fb8ce403e2cc8ee29af8d96cb3e11

OPT

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x30
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.37663
MD5 c63c79fe2b1aff41357ca1b1d3eec4af
SHA1 eea56e46d3de0ea292ee95e0505304bd59307b6d
SHA256 218452f4f2e0a6a7c79551c1b36715558c1a0a0d5fff5900324b94f5ca8dd950
SHA3 d53a528d4cb7aec490a1e2d41e3f06ad8caa67aa7d113d53a66a169c9200fe09

PLATFORMTARGETS

Type RT_RCDATA
Language English - United States
Codepage Latin 1 / Western European
Size 0x2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1
MD5 598f4fe64aefab8f00bcbea4c9239abf
SHA1 688934845f22049cb14668832efa33d45013b6b9
SHA256 9b4fb24edd6d1d8830e272398263cdbf026b97392cc35387b991dc0248a628f9
SHA3 2951e8c89ecc8e8aa730f646caa10afd48f0be1353aaf5cc35815497dc6ba0db

SRC

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x630
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.764
MD5 78f1186ecd2465e51fd1783a09409e75
SHA1 c15d2fd29e5d30bf4bd622ab697bc95398f81646
SHA256 77ef1f0b24b1f6df9621e51b7b08f4e3129dde00166903b91ffc7d1561de8e8b
SHA3 1db50b4225beaa52f11a02dc543225ae46e7376e6644b81ea60eb7a692e1dc0b

MAINICON

Type RT_GROUP_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.98048
Detected Filetype Icon file
MD5 38388dda6548693f4d42f2241a4218d7
SHA1 78bedd12a20f97e31e58742381f3d0ca1edb4715
SHA256 cd0991dd595a1392452a8c7ccf089e73626bc6eed1fd3f54ee4c6aa7ffbaedba
SHA3 9ace1e9f008d60580379cdfdcd4119706c82d52d2e5fdb9e5745fa00864cc1a8

1 (#2)

Type RT_VERSION
Language English - United States
Codepage Latin 1 / Western European
Size 0x34c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.30855
MD5 fabc1bb9aa8f310656cda102d3bf3cba
SHA1 6f0b07b754c746e06e5fea11e1c14335755107ea
SHA256 b198c4626c25583af0c7cf3b178141cfda11c499712adf9d22fc9d4aa74e8862
SHA3 3fada7ee6db31563ab4b53043c4941d5530480634a3dfca406b638a830586ea9

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x398
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.34845
MD5 d7b3927772d29e6b1d4f5a76fbb2ebc1
SHA1 15948006b7c02dfa299d9724cfc4040acb485e2e
SHA256 243451f08f41e14dff26428f25f0bdb763be6968ede242bef6623fdbcd0382ab
SHA3 8b3e25ac823d79df7721ae767bc553803d47a93edf303cd0d068e87ddb80ec50

String Table contents

Insert the diskette that contains the batch file
and press any key when ready.
No batch label specified to GOTO command.
The system cannot find the batch label specified - %s
Invalid attempt to call batch label outside of batch script.
The system cannot open the device or file specified.
The handle could not be duplicated
during redirection of handle %s.
The handle could not be opened
during redirection of handle %s.
Out of memory.
The input line is too long.
The following character string is too long:
%s
The following usage of the path operator in batch-parameter
substitution is invalid: %s
"%s" is an invalid current directory path. UNC paths are not supported.
Defaulting to Windows directory.
The unicode output option to CMD.EXE is not supported by this
version of the operating system.
The Process Identification Number is %s.
File association not found for extension %s
File type "%s" not found or no open command associated with it.
The system is out of environment space.
Environment variable %s not defined
Invalid parameter to SETLOCAL command
Maximum setlocal recursion level reached.
The batch file cannot be found.
Not enough quota is available to process this command.
The system cannot complete the process.
The system cannot execute the specified program.
An incorrect parameter was
entered for the command.
The system cannot find the drive specified.
The syntax of the command is incorrect.
Error occurred while processing: %s.
The system cannot accept the path
or file name requested.
The system cannot find the file specified.
"%s" is not a recognized device.
A subdirectory or file %s already exists.
The directory or file cannot be created.
The handle could not be duplicated during
a pipe operation.
%s was unexpected at this time.
The device is not ready.
Invalid parameter to SHIFT command
There is not enough space on the disk.
The system cannot write to the specified device.
Not enough storage is available to process this command.
The name specified is not recognized as an internal or external command,
operable program or batch file.
The process cannot access the file because it is being used by another process.
The system cannot start another process at this time.
The specified disk or diskette cannot be accessed.
The system cannot find the file %s.
Access is denied.
This version of %s is not compatible with the version of Windows you're running. Check your computer's system information to see whether you need a x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher.
The disk is in use or locked by another process.
The operating system cannot run %s.
Cannot run %s in Win32 mode.
%s is not a valid Win32 application.
The %s application cannot be run in Win32 mode.
The current directory is invalid.
The current date is:
The current time is:
KEYS is on.
KEYS is off.
^C
Volume in drive %s is %s
Volume in drive %s has no label.
Volume Serial Number is %s
Press any key to continue . . .
Enter the new date: (mm-dd-yy)
Enter the new date: (yy-mm-dd)
Enter the new date: (dd-mm-yy)
Enter the new time:
The system cannot accept the date entered.
The system cannot accept the time entered.
The process tried to write to a nonexistent pipe.
Windows 7
Windows Server 2008 R2
Windows 2000
Windows XP
Windows Server 2003
Windows Server 2003 R2
Windows Server 2012
Windows 8
Abyssmedia(R) QBFC(TM) (x86) version 1.0
(C) Copyright 2001-2017 Abyss Media Company.
%s
Terminate batch job (Y/N)?
Microsoft Windows [Version %s]
Command Processor Extensions enabled by default.
Command Processor Extensions Enabled
ECHO is on.
ECHO is off.
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Invalid file name - %s
The specified file was not found
%s (Version %d.%d, Build %d, %5:s)
%s Service Pack %4:d (Version %1:d.%2:d, Build %3:d, %5:s)
32-bit Edition
64-bit Edition
Windows
Windows Vista
Windows Server 2008
April
May
June
July
August
September
October
November
December
Sun
Mon
Tue
Wed
Thu
Fri
Sat
A call to an OS function failed
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
January
February
March
Variant or safe array index out of bounds
Invalid variant type conversion
Invalid variant operation
Invalid argument
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
Object lock not owned
Monitor support function not initialized
Feature not implemented
Method called on disposed object
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%s%s
Floating point underflow
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Exception %s in module %s at %p.
%s%s
Application Error
Format '%s' invalid or incompatible with argument
No argument for format '%s'
Variant method calls not supported
Read
Write
Error creating variant or safe array
'%d.%d' is not a valid timestamp
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 0.0.0.0
ProductVersion 0.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United States
CompanyName Studio 3T
FileDescription Studio 3T is the professional IDE, client, and GUI for MongoDB
FileVersion (#2) 0. 0. 0. 0
InternalName
LegalCopyright B4A
LegalTrademarks
OriginalFilename
ProductName Studio 3T for MongoDB
ProductVersion (#2) 0.0.0.0
Comments board4all.biz
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x44f000
EndAddressOfRawData 0x44f008
AddressOfIndex 0x431bfc
AddressOfCallbacks 0x450010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0! [*] Warning: Section .tls has a size of 0!
Leave a comment

No comments yet.