d12c6fda7ce2f385149e497a7cc4158a

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2018-Aug-15 07:24:28
Detected languages English - United States
CompanyName BlackBOX Sistemi
FileDescription BlackBOX Sistemi HUTOOL PRO
FileVersion 3.5.0.1
InternalName HUTOOL
LegalCopyright BlackBOX Sistemi
LegalTrademarks BlackBOX Sistemi
OriginalFilename HUTOOL3.exe
ProductName BlackBOX Sistemi HUTOOL PRO
ProductVersion 3.5.0.1

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Looks for VirtualPC presence:
  • 0f 3f 07 0b
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to AES
Suspicious The PE is possibly packed. Section .text is both writable and executable.
Unusual section name found: .hut3
Section .hut3 is both writable and executable.
Unusual section name found: .hut3
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryA
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
  • FindWindowW
Code injection capabilities (PowerLoader):
  • GetWindowLongW
  • FindWindowW
Can access the registry:
  • RegQueryValueExW
  • RegOpenKeyExW
  • RegCloseKey
  • RegUnLoadKeyW
  • RegSetValueExW
  • RegSaveKeyW
  • RegRestoreKeyW
  • RegReplaceKeyW
  • RegQueryInfoKeyW
  • RegLoadKeyW
  • RegFlushKey
  • RegEnumValueW
  • RegEnumKeyExW
  • RegDeleteValueW
  • RegDeleteKeyW
  • RegCreateKeyExW
Uses functions commonly found in keyloggers:
  • MapVirtualKeyW
  • GetForegroundWindow
  • CallNextHookEx
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Has Internet access capabilities:
  • InternetReadFile
  • InternetQueryDataAvailable
  • InternetOpenUrlA
  • InternetOpenA
  • InternetOpenW
  • InternetConnectA
  • InternetConnectW
  • InternetCloseHandle
Can take screenshots:
  • GetDCEx
  • GetDC
  • FindWindowW
  • CreateCompatibleDC
  • BitBlt
Queries user information on remote machines:
  • NetWkstaGetInfo
Reads the contents of the clipboard:
  • GetClipboardData
Info The PE's resources present abnormal characteristics. The binary may have been compiled on a machine in the UTC+2 timezone.
Malicious VirusTotal score: 42/69 (Scanned on 2022-07-08 06:49:35) Bkav: W32.AIDetect.malware1
MicroWorld-eScan: Gen:Variant.Ursu.389733
FireEye: Generic.mg.d12c6fda7ce2f385
ALYac: Gen:Variant.Ursu.389733
Cylance: Unsafe
VIPRE: Gen:Variant.Ursu.389733
K7AntiVirus: Trojan ( 005239691 )
Alibaba: Packed:Win32/NoobyProtect.d86da6df
K7GW: Trojan ( 005239691 )
Cybereason: malicious.a7ce2f
Cyren: W32/Troj_Obfusc.P.gen!Eldorado
Symantec: ML.Attribute.HighConfidence
Elastic: malicious (high confidence)
ESET-NOD32: a variant of Win32/Packed.NoobyProtect.Q suspicious
APEX: Malicious
Paloalto: generic.ml
BitDefender: Gen:Variant.Ursu.389733
Avast: Win32:Malware-gen
Ad-Aware: Gen:Variant.Ursu.389733
Sophos: Mal/Generic-S
Comodo: MalCrypt.Indus!@1qrzi1
McAfee-GW-Edition: BehavesLike.Win32.Injector.vh
Trapmine: malicious.moderate.ml.score
Emsisoft: Gen:Variant.Ursu.389733 (B)
SentinelOne: Static AI - Malicious PE
GData: Gen:Variant.Ursu.389733
MAX: malware (ai score=87)
Antiy-AVL: Trojan/Generic.ASBOL.C6B4
Kingsoft: Win32.Heur.KVMH008.a.(kcloud)
Gridinsoft: Trojan.Heur!.03050021
Microsoft: Trojan:Win32/Emotet!ml
Cynet: Malicious (score: 100)
AhnLab-V3: Malware/Gen.Generic.C3053169
McAfee: Artemis!D12C6FDA7CE2
Malwarebytes: Malware.Heuristic.1003
TrendMicro-HouseCall: TROJ_GEN.R002H0CAD22
Rising: Trojan.Generic@AI.89 (RDMK:6UwuczX6KoxySptK9a+HAQ)
MaxSecure: Trojan.Malware.73877075.susgen
Fortinet: Riskware/Application
BitDefenderTheta: Gen:NN.ZexaF.34786.@x0@aehFuIki
AVG: Win32:Malware-gen
CrowdStrike: win/malicious_confidence_70% (W)

Hashes

MD5 d12c6fda7ce2f385149e497a7cc4158a
SHA1 8761864701183e81c1c07cde0edcd3dae5865362
SHA256 654ef3c241e737e607584d78016fb3a9a266feebae13cf9f42e0966daa7ccff2
SHA3 2fab76cb03296d5f5f37045bec6ef0e230e9d2b70d3bf3d2a19ad1e3b91065c9
SSDeep 98304:gRjOQmTDHYwTa5ZbyVqHITMMw5zAbZ0WaUqNY3c8nomFn:gsQmTDHY3eVQITNwzAbTaUyY3c8nomB
Imports Hash e45c6f6e96ec56a8aeeb4dd65bbeb1ca

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 5
TimeDateStamp 2018-Aug-15 07:24:28
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0
SizeOfInitializedData 0
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0067F942 (Section: .hut3)
BaseOfCode 0
BaseOfData 0
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.0
ImageVersion 0.0
SubsystemVersion 5.0
Win32VersionValue 0
SizeOfImage 0x69e000
SizeOfHeaders 0x400
Checksum 0x6a84cc
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 45a46526004eb590bdee25a3526091cb
SHA1 90e38b69e42f4c0ba335e5e2013e3ef94c167a0d
SHA256 fd89d1ab86ae2013f10daabeaa89a629f4fa7a10b669b412b331607c0b3752f2
SHA3 4d2c0458d88b6d9f395637d18b1f4cccb994c63310ef81fdeb4e63667b2d13dc
VirtualSize 0x342000
VirtualAddress 0x1000
SizeOfRawData 0x342000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.06426

.hut3

MD5 fdd050e42ebfe52cc0377dd8d76907c7
SHA1 961f8a0849fb9e0b7e7dc2d5eed8a4eef6654cb9
SHA256 19caa03656fd3fb6b48bb71f7cffceeec763c45288afc63b654e8d62eb8e98a1
SHA3 cf2fbde4b0c20675f817c86d033bb820d6f20e74a3fc32ddd4b0cb79ed4894dd
VirtualSize 0x33e000
VirtualAddress 0x343000
SizeOfRawData 0x33de00
PointerToRawData 0x342400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.63804

.idata

MD5 98f986961843f8a6fc695c6c70cbed4c
SHA1 4d37751c3b3a6dd9af1478b749717af951ec4fa0
SHA256 5ac0a5269f83db5848fb132634238871ad91928dd230276bf20e02a04e5a1170
SHA3 2e5397d7e58a433e9da43eb88d7c51cd72779913d734355b79c2f0efa5d6a907
VirtualSize 0x3000
VirtualAddress 0x681000
SizeOfRawData 0x3000
PointerToRawData 0x680200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.16188

.rsrc

MD5 eb6e363100e0af513741452c8bfe2d5e
SHA1 9408cffc00f8490f1fc510d8ef08e749998c6220
SHA256 49fe0fb03e8b64e321ea5e270a2b64ab3ed59b507289230bbf7c00e100d41086
SHA3 51d718ac734aae01c23060c4ff3f094371a97ddc3fb74fe442500050665c9310
VirtualSize 0x19000
VirtualAddress 0x684000
SizeOfRawData 0x19000
PointerToRawData 0x683200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.06374

.hut3 (#2)

MD5 94cfdc3f501b670b255e49a35e335254
SHA1 a53efc7d98f2dcfea894c3d858a2236af0a3102c
SHA256 93dfd7f75f0da83bceadbba91fd66ffa95832b3342438e97934a3822e4131f84
SHA3 8c2d4bf6fb5ef9be860ea93c755534109b1c180381772e1e575ff7d1a527b353
VirtualSize 0x1000
VirtualAddress 0x69d000
SizeOfRawData 0x1000
PointerToRawData 0x69c200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.96844

Imports

oleaut32.dll SysFreeString
SysReAllocStringLen
SysAllocStringLen
advapi32.dll RegQueryValueExW
RegOpenKeyExW
RegCloseKey
user32.dll CharNextW
LoadStringW
kernel32.dll Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
kernel32.dll (#2) Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
user32.dll (#2) CharNextW
LoadStringW
gdi32.dll UnrealizeObject
StretchDIBits
StretchBlt
StartPage
StartDocW
SetWindowOrgEx
SetWinMetaFileBits
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetRectRgn
SetROP2
SetPixel
SetEnhMetaFileBits
SetDIBits
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SetAbortProc
SelectPalette
SelectObject
SelectClipRgn
SaveDC
RoundRect
RestoreDC
ResizePalette
Rectangle
RectVisible
RealizePalette
Polyline
Polygon
PolyBezierTo
PolyBezier
PlayEnhMetaFile
Pie
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetWinMetaFileBits
GetTextMetricsW
GetTextExtentPointW
GetTextExtentPoint32W
GetSystemPaletteEntries
GetStockObject
GetRgnBox
GetPixel
GetPaletteEntries
GetObjectW
GetNearestPaletteIndex
GetEnhMetaFilePaletteEntries
GetEnhMetaFileHeader
GetEnhMetaFileDescriptionW
GetEnhMetaFileBits
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
GdiFlush
FrameRgn
ExtTextOutW
ExtFloodFill
ExcludeClipRect
EnumFontsW
EnumFontFamiliesExW
EndPage
EndDoc
Ellipse
DeleteObject
DeleteEnhMetaFile
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePenIndirect
CreatePalette
CreateICW
CreateHalftonePalette
CreateFontIndirectW
CreateDIBitmap
CreateDIBSection
CreateDCW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
CopyEnhMetaFileW
Chord
BitBlt
ArcTo
Arc
AngleArc
AbortDoc
version.dll VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32.dll (#3) Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
advapi32.dll (#2) RegQueryValueExW
RegOpenKeyExW
RegCloseKey
kernel32.dll (#4) Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
netapi32.dll NetWkstaGetInfo
oleaut32.dll (#2) SysFreeString
SysReAllocStringLen
SysAllocStringLen
oleaut32.dll (#3) SysFreeString
SysReAllocStringLen
SysAllocStringLen
ole32.dll OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
IsEqualGUID
comctl32.dll InitializeFlatSB
FlatSB_SetScrollProp
FlatSB_SetScrollPos
FlatSB_SetScrollInfo
FlatSB_GetScrollPos
FlatSB_GetScrollInfo
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Copy
ImageList_LoadImageW
ImageList_GetIcon
ImageList_Remove
ImageList_DrawEx
ImageList_Replace
ImageList_Draw
ImageList_SetOverlayImage
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_SetImageCount
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
user32.dll (#3) CharNextW
LoadStringW
msvcrt.dll memset
memcpy
shell32.dll Shell_NotifyIconW
wininet.dll InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
InternetOpenA
InternetOpenW
InternetConnectA
InternetConnectW
InternetCloseHandle
HttpSendRequestW
HttpQueryInfoW
HttpOpenRequestW
winspool.drv OpenPrinterW
EnumPrintersW
DocumentPropertiesW
ClosePrinter
winspool.drv (#2) OpenPrinterW
EnumPrintersW
DocumentPropertiesW
ClosePrinter
IPHLPAPI.DLL GetInterfaceInfo
PSAPI.DLL GetMappedFileNameW

Delayed Imports

dbkFCallWrapperAddr

Ordinal 1
Address 0x207c5c

TMethodImplementationIntercept

Ordinal 2
Address 0x60128

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 5.41549
MD5 c5ab8ce43c44cb8c9feee5cff54190be
SHA1 b2b088e5191550dd20f157347bfaa14ac92ce489
SHA256 9bd79460cbe59ca0162766e512391d13212187a6f14c8ba7042847e9f047eea3
SHA3 fac2cbb3c83eafce2ddd05d9f6a31b04ab7f5d3ab90398226baec6e7fc2e2327

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 5.43839
MD5 a9c242713a7c99183adfb5e37e919625
SHA1 31f3a78f7586b76f87b32bafbc074dcc80059d91
SHA256 cc665af9d81df902cc8ab6e1da1b14dfc461b74477ba7d6a9b16556ec0d2fe48
SHA3 f4c7c264699f4b094bc703172bb09a47bb902e9be1186908cf35eaf53a0d7712

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 5.28805
MD5 dff2a5770fc7d2dc9a8cb72e39d916f3
SHA1 250bcd21f753680f280106b69b8a9f19bf8ece90
SHA256 1585250210a571b10268fcd3787e9c835082f53157cff8f60fa143537d45af01
SHA3 7f82def2386a0ed0435781ab18d44b85f607be7362eb262019f97373e2690dd8

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 5.12384
MD5 736e1f1cb82ad46d8922e6b3033db3b9
SHA1 77180e70cfab159862264489549c00eb03c617c9
SHA256 687fc172ff0da00dde74693b96ae5e3f7f1a74c351389828bcbe2beb87d273ba
SHA3 cbf33f75c5832aaa10a54ea9c80dc406b21e3159a31e96f9fd0f056d7a5a31fb

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 4.90909
MD5 900f4b595bb82063ff4f06e379b65250
SHA1 a8f9a994731c24ae352dc36dcf2aa64c3b58e3e3
SHA256 f3814c117743c76ed21677e2667b9f49d653b8bbe62e7a340562f509aa7405e3
SHA3 840b28b8c22a52a8549e17c824168d98aad271f885dca627901fc305dca86841

MAINICON

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4c
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 2.80283
Detected Filetype Icon file
MD5 da9b70665374e3394540c51191a2dfd6
SHA1 c91b3f6407149e322850f6a257923abb260adeb5
SHA256 9595be7d246f12c7356d15b8facc45ea482de63d316af484c99156170b9d7362
SHA3 d75e51b150e9bb574412de784a1ecf652c36717a52f920f529a2c01e2dfce6af

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x340
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 3.43643
MD5 b85e35e2f89427f40f26f5e1b14f5c5a
SHA1 ed9f176a3bbf65d1fa0c2b2c78de93858e0bdb55
SHA256 23357325daa83586614bc4e898bcb302ecfadd3dfe4de87694f5b4f24aea2258
SHA3 7855c0ca12c44e700970e0417a19a123e3c4ff260c7b0ad59138b348c485e43c

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x3af
TimeDateStamp 2018-Aug-15 09:24:28
Entropy 4.96472
MD5 96d52087b247d2d4c7834fc436530505
SHA1 b8e02771c29468901a7258bd32bc8b5aa55a0cec
SHA256 0b217924128c613eb9be2c9c71d6962b45704b442f82b79e35c64177929f723e
SHA3 f4f22c0c5dfce96b6e74c6195a1b22f9425469f586f34b4690ee556ed1a0ec10

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 3.5.0.1
ProductVersion 3.5.0.1
FileFlags VS_FF_PRIVATEBUILD
VS_FF_SPECIALBUILD
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName BlackBOX Sistemi
FileDescription BlackBOX Sistemi HUTOOL PRO
FileVersion (#2) 3.5.0.1
InternalName HUTOOL
LegalCopyright BlackBOX Sistemi
LegalTrademarks BlackBOX Sistemi
OriginalFilename HUTOOL3.exe
ProductName BlackBOX Sistemi HUTOOL PRO
ProductVersion (#2) 3.5.0.1
Resource LangID English - United States

TLS Callbacks

Load Configuration

RICH Header

Errors

[!] Error: Could not reach the TLS callback table. [!] Error: Yara error: ERROR_TOO_MANY_MATCHES