MZ Header

DOS stub

00000000: ba 10 00 0e 1f b4 09 cd  21 b8 01 4c cd 21 90 90  |........!..L.!..|
00000010: 54 68 69 73 20 70 72 6f  67 72 61 6d 20 6d 75 73  |This program mus|
00000020: 74 20 62 65 20 72 75 6e  20 75 6e 64 65 72 20 57  |t be run under W|
00000030: 69 6e 33 32 0d 0a 24 37  00 00 00 00 00 00 00 00  |in32..$7........|
00000040: 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
000001c0:

PE Header

Packer / Compiler

Sections

Data Directory

offsetsizetypecomment
052736EXE12/26/2004 15:34:24#
ce00398775RAR#
6e3b75402BINoverlay data past EOF#
Type = Rar
Characteristics = Solid Recovery
Solid = +
Blocks = 1
Multivolume = -
Volumes = 1

   Date      Time    Attr         Size   Compressed  Name
------------------- ----- ------------ ------------  ------------------------
2005-04-06 15:01:26 .R..A         2315         1001  license.txt
2005-04-06 15:04:18 ....A         2526          802  readme.txt
2004-05-01 18:47:14 .R...          982          389  Examples/test_call_vulnerability.cpp
2004-05-01 18:47:06 .R...          870          189  Examples/test_ret_vulnerability.cpp
2003-11-21 14:15:04 .R...        24576         7552  Examples/test_call_vulnerability.exe
2003-11-19 13:12:52 .R...        24576          399  Examples/test_ret_vulnerability.exe
2006-07-29 17:54:12 ....A        44288        23304  acshield.sys
2002-10-28 02:29:00 .R...        58168        32780  attack.wav
2004-05-31 21:11:06 DR...            0            0  Examples
2006-06-05 21:28:10 ....A       109056        36962  acshield.dll
2004-04-21 17:56:02 .R...         2028          789  Examples/client_remote_vulnerability.cpp
2004-04-22 11:29:50 .R...         2742          585  Examples/server_remote_vulnerability.cpp
2004-04-22 11:19:30 .R...        22016         2719  Examples/client_remote_vulnerability.exe
2004-04-22 11:29:50 .R...        22016         1241  Examples/server_remote_vulnerability.exe
2004-06-18 11:52:44 .....          196          103  Examples/add_test_apps.reg
2004-04-22 11:33:40 .R...        16439        15991  Examples/Examples.zip
2006-06-12 15:04:18 ....A       336384        65134  DefencePlus.exe
2005-04-03 15:07:08 ....A        69632         4050  uninstall.exe
2005-03-10 21:36:22 .....          650          315  DefencePlus.exe.manifest
2005-04-20 09:04:42 ....A       209894       203168  DefencePlus.chm
------------------- ----- ------------ ------------  ------------------------
                                949354       397473  19 files, 1 folders
offset:( 0x )size:( 0x )hotkeys:-=[]<>, offset/size fields are also editable

[?] ignoring invalid PEdump::BITMAPINFOHEADER

[!] string size(90138) > stringtable size(556). truncated to 554

[!] cannot convert "E\x11\xF7\xC61V\xD8\xB0\x02U,\xD1\xE0S\xA4Z"... to UTF-16

[!] string size(63168) > stringtable size(886). truncated to 884

[!] cannot convert "\x11j\xC7\xDA\x17\xB8\x10A\x02\xF9\x9B\xB7:\x16\x9F\x83"... to UTF-16

[!] string size(46156) > stringtable size(530). truncated to 528

[!] cannot convert "\"\xDE\a\xF5\xFF\x87\x05\xF8\x88\xF0\x06\x88\x95\x12\n3"... to UTF-16

[!] string size(20452) > stringtable size(638). truncated to 636

[!] cannot convert "\x18T\x17\xE8l#\xE6[;\xC6\v\xB4\xF6_cs"... to UTF-16