03d0a383a2170e2dff6d9b7841c6e02d

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 1992-Jun-19 22:22:17
Detected languages Dutch - Netherlands
English - United States
Comments This installation was built with Inno Setup.
CompanyName Xacti, LLC
FileDescription Inbox Translators Toolbar Setup
FileVersion 2.0.1.90
LegalCopyright copyright © Inbox.com
ProductName Inbox Translators Toolbar
ProductVersion 2.0.1.90

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: DATA
Unusual section name found: BSS
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExA
  • GetProcAddress
  • LoadLibraryA
Can access the registry:
  • RegQueryValueExA
  • RegOpenKeyExA
  • RegCloseKey
Possibly launches other programs:
  • CreateProcessA
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Can shut the system down or lock the screen:
  • ExitWindowsEx
Suspicious The PE header may have been manually modified. The resource timestamps differ from the PE header:
  • 2012-Oct-10 13:08:38
Info The PE is digitally signed. Signer: Xacti
Issuer: Thawte Code Signing CA - G2
Malicious VirusTotal score: 31/68 (Scanned on 2018-07-15 08:09:13) Bkav: W32.HfsAdware.7877
CAT-QuickHeal: PUA.Xacti.Gen
McAfee: Artemis!03D0A383A217
Cylance: Unsafe
K7GW: Unwanted-Program ( 00496c421 )
K7AntiVirus: Unwanted-Program ( 00496c421 )
Invincea: heuristic
NANO-Antivirus: Riskware.Win32.InstallToolbar.falasm
Cyren: W32/Trojan.GZDX-5938
Symantec: PUA.InboxToolbar
ClamAV: Win.Adware.Toolbar-6606401-0
Kaspersky: HEUR:Hoax.Win32.Reptile.gen
Emsisoft: Application.InstallBox (A)
DrWeb: Tool.InstallToolbar.269
McAfee-GW-Edition: BehavesLike.Win32.BadFile.vc
Fortinet: Riskware/InnoGenForcAlgo
SentinelOne: static engine - malicious
Jiangmin: WebToolbar.Generic.bv
Webroot: Pua.Xactitoolbar
Avira: PUA/Crawler.Gen
MAX: malware (ai score=98)
Antiy-AVL: GrayWare[AdWare]/Win32.Inbox.k
Endgame: malicious (high confidence)
Microsoft: PUA:Win32/CrossRider
ZoneAlarm: HEUR:Hoax.Win32.Reptile.gen
ESET-NOD32: Win32/Toolbar.Inbox.H potentially unwanted
Yandex: PUA.Toolbar.Inbox!
Ikarus: AdWare.Agent
GData: Win32.Application.ToolbarCrawler.A
CrowdStrike: malicious_confidence_100% (D)
Qihoo-360: Win32/Virus.Adware.5b0

Hashes

MD5 03d0a383a2170e2dff6d9b7841c6e02d
SHA1 36c25ceee2e3a3cf21908a127d86437d676d76b1
SHA256 593afa91a800f26bef99bd5657cdd4107d8c5243c64ae6da85a1b43183d2b3a7
SHA3 cc571c116d23c5e328434780cabd77f17d76cbf84987c83680b419924027a80f
SSDeep 49152:7NEbNP1ZvI8UgPS3N8rsdosWyClGxkJwFFebA5rOYiZnZ:hEnZvRS3NCMoXlykJwFFebSivZnZ
Imports Hash af1caaf10b9dc7a7de723812b83129c8

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 8
TimeDateStamp 1992-Jun-19 22:22:17
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0xba00
SizeOfInitializedData 0x5400
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000C1C0 (Section: CODE)
BaseOfCode 0x1000
BaseOfData 0xd000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 6.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x18000
SizeOfHeaders 0x400
Checksum 0x25a404
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

CODE

MD5 85f494242454a2629159fe1001fc130c
SHA1 2388bf82f2cc5ecaeb19454a0922476f19cd417e
SHA256 d8452c4f7dc84567a470ff20f9c632f4cb6320510752b4ee4521e55651fe0ad2
SHA3 356ed837d9af28390fb89a267cccce2631da5cba5950320a90ff69546c05bdd6
VirtualSize 0xb8e8
VirtualAddress 0x1000
SizeOfRawData 0xba00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.45491

DATA

MD5 4d6b19d4b969623f3898a576acbd987d
SHA1 ac415e00b9496aa249d310e753f7203dee47fb1f
SHA256 b73d48f07ac2069fff7260d71a4de196ed117a62aaec16b37ff8d2cc11a35317
SHA3 4e90f8872652dc8e9dc0582c4c1777d2f3bf6092240ae2346f1f866ecd3822d0
VirtualSize 0x50c
VirtualAddress 0xd000
SizeOfRawData 0x600
PointerToRawData 0xbe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.62282

BSS

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x10f1
VirtualAddress 0xe000
SizeOfRawData 0
PointerToRawData 0xc400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 cac96a33d8d1fc3904d53c82fae87d4d
SHA1 560dbb6772f08bd07acceb34db808693759e5bd7
SHA256 4917def64b43eddc561e8935d4ce5efbbb1d638de3df6a3ecaa087f61a3a6103
SHA3 efa8c3e96f3f65e114740ff0e1518d627729e4f4362a64ad654c3bc499b1cf07
VirtualSize 0xb40
VirtualAddress 0x10000
SizeOfRawData 0xc00
PointerToRawData 0xc400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.65041

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x8
VirtualAddress 0x11000
SizeOfRawData 0
PointerToRawData 0xd000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 0257486909b054dd295a25ee0db8a5f1
SHA1 896706e121dce43b558b629f066189494f07cf76
SHA256 09b856465fbd882715f95711800e692d589a1e33667ce978614145c53ebc3cb2
SHA3 a3f46cee9fec56ee45fc22f7242f0cd4a41e22e9df53932fbd4b18285e29b409
VirtualSize 0x18
VirtualAddress 0x12000
SizeOfRawData 0x200
PointerToRawData 0xd000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
Entropy 0.205446

.reloc

MD5 0ea34a4a19040a8814629749b6cf6cad
SHA1 d17b8b8ce9fe35efff848439f06b9cf8046287a3
SHA256 2fe4bcfbbff0d99dbd21830f58e9ad8513a5bfcbb2235f521fec593f702e81b7
SHA3 766ec7475bbce48ee9fd144abdb93d7c5398effd2064f9ba73cc11a7a2ef9bdd
VirtualSize 0x10c4
VirtualAddress 0x13000
SizeOfRawData 0x1200
PointerToRawData 0xd200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
Entropy 6.44112

.rsrc

MD5 4529e9335302d3019dcc2569d002e57f
SHA1 5496a3569cccbf1dd3d31eb794fa2c0aaee6210c
SHA256 b6015c468210441e3d736887080c87f5c9c33b0918f17711bb8c61f4c8864aec
SHA3 a0c03b8d0fc881eb5a0017911b74392dbcb3698c443741404e340285e90703d6
VirtualSize 0x2e00
VirtualAddress 0x15000
SizeOfRawData 0x2e00
PointerToRawData 0xe400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
Entropy 4.48649

Imports

kernel32.dll DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
WideCharToMultiByte
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
user32.dll GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
advapi32.dll RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32.dll SysFreeString
kernel32.dll (#2) DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
WideCharToMultiByte
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32.dll (#2) RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32.dll (#3) DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
WideCharToMultiByte
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
user32.dll (#2) GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
comctl32.dll InitCommonControls
kernel32.dll (#4) DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
WideCharToMultiByte
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32.dll (#3) RegQueryValueExA
RegOpenKeyExA
RegCloseKey

Delayed Imports

1

Type RT_ICON
Language Dutch - Netherlands
Codepage UNKNOWN
Size 0x128
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 3.25755
MD5 c5af786bfd9fd1c53c8fe9f0bd9ce38b
SHA1 4f6f7d9973b47063aa5353225a2bc5a76aa2a96a
SHA256 f59f62e7843b3ff992cf769a3c608acd4a85a38b3b302cda8507b75163659d7b
SHA3 e178a71f02edb18e31bf550d484b2cba8d865e1e9796065addb07855ce5627f9

2

Type RT_ICON
Language Dutch - Netherlands
Codepage UNKNOWN
Size 0x568
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 3.47151
MD5 0a451222f7037983439a58e3b44db529
SHA1 6881cba71174502883d53a8885fb90dad81fd0c0
SHA256 dc785b2a3e4ea82bd34121cc04e80758e221f11ee686fcfd87ce49f8e6730b22
SHA3 d5599c242df5383add3fb330d42b31f1751594b36bbf52195e7d1dd564e7f0e3

3

Type RT_ICON
Language Dutch - Netherlands
Codepage UNKNOWN
Size 0x2e8
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 3.91708
MD5 90ed3aac2a942e3067e6471b32860e77
SHA1 b849a2b9901473810b5d74e6703be78c3a7e64e3
SHA256 ca8fc96218d0a7e691dd7b95da05a27246439822d09b829af240523b28fd5bb3
SHA3 3f02085a0d69091556ede0b585f45145adce9849e175d8177c2f0fe0891a1bd8

4

Type RT_ICON
Language Dutch - Netherlands
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 3.91366
MD5 af05dd5bd4c3b1fc94922c75ed4f9519
SHA1 f54685a8a314e6f911c75cf7554796212fb17c3e
SHA256 3bbacbad1458254c59ad7d0fd9bea998d46b70b8f8dcfc56aad561a293ffdae3
SHA3 150dba8cc825d5c0e9ff3c59015533288d19931847210338a3ef7cdc390c0e78

4091

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x34
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 1.17487
MD5 c652126029efac069fd7ffaf2c0e0fe6
SHA1 8512b0668320bb95cf641b0d23b6f54357442f2a
SHA256 7514f304669b8170a2aec97f71023a23713db1ea560c839a3fca00f11f19d8c3
SHA3 4e86979e07a05621d89881a6a414d242b5e32a70644e8c0f3564528271ae99ad

4092

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xec
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 2.94991
MD5 76b269d85b322790b6a99e3f8b603311
SHA1 1361ca26f29c62b7b591f79ea677c71a38aa98b8
SHA256 369c5223029ea6d1b17b7f24a8d84c10f528457e79be3349a6c55efd0e8f0e02
SHA3 5ef9310cf2c895a94d39a4f7bab21bb432404fd4ded0240fe78a324936bac55e

4093

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xd0
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 2.94916
MD5 24f859ee6a1b2a0281d58e744c4d931c
SHA1 d0768e52c1cd646ea9ad0e752d71dcb2709ea74e
SHA256 968bbd325d5403ab654fd9308ea2497bce206395d77c4729d07b638480b7cc47
SHA3 4df3e7394f0291d46352f6b60d17d78c8da7ff6d1e3deb8e52dd43c51ab1e2da

4094

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2ac
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 3.20102
MD5 6d23860410b37f4940724213597c805d
SHA1 dba8f5756cf2edfa589a7ff9241580d991e45606
SHA256 7f2417b8c0143b58d4c57185af7d3f835fffb574a698897323f8ac5d8d901289
SHA3 d3c9dd14347dd82cfc881a51ef0de31bde21d2ed7aecd590dc212126b3bcc291

4095

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x34c
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 3.25711
MD5 94a041e6fd551beb52d5d77543a11256
SHA1 52f7b5cf4c2dbdc798e998eb811bf281b0e9d684
SHA256 f7badbb540cc3db11c2f0b7e8dde18d38eef26a6a7492dfa714b18354054a741
SHA3 03fce36541b6390d1c206dbb4cc87829d9b0920bc66a1e58e0ff65a6288839f8

4096

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2a0
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 3.18442
MD5 a19b1759bcc86855f5be32ce48767672
SHA1 4e75052a5967d31e7bfc1c5d6570fe70fdd1b44e
SHA256 49273389801a1f2231e5dd94be7ba0b019b4939ff4689134e11dd0e0d9f98a04
SHA3 017b27c7b2821a17d9615322d36ea0e8083958ed828dd3f060d48e56e1186c67

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x10
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 4
MD5 a40263c75fde7440b1086b7da9c51fc2
SHA1 139a84f87110fb5cb16a386adade21f30cae98b0
SHA256 e7dbe99baa5c1045cdf7004edb037018b2e0f639a5edcf800ec4514d5c8e35b5
SHA3 d3a734fa7d36868d301f9569de92e1bfc551e4b5cf6d7c59eace8d0a554093c0

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x138
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 5.1562
MD5 ca202da0b81417686b859378e833705f
SHA1 4a50eb1a426af7a146f78919240f0bebca05d385
SHA256 a45a5614de7bcd1ea4524437d36a5ff67e6416cc217650cb64be7a8562bec80f
SHA3 7f21513e42b6b1725e74689c2959d64dd0624d6c3b701a938e8779cc8008d529

11111

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x2c
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 4.56808
MD5 3150c8c701625b0795ec04b43b8f030b
SHA1 c5998ca0bf51629fe26c4eee5482a7456883a278
SHA256 cff4bafe4fe0481deb45a020ffe7825a8a31c280d3b5d082c18cf4f98da5fa6b
SHA3 177f0873ccb634206240a4d1a5f583cf1b95a899fc8ed5c00869a9778416c46c

MAINICON

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x3e
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 2.64576
Detected Filetype Icon file
MD5 f6262f462f61a1af1cac10cf4b790e5a
SHA1 4aa3239c2c59fa5f246b0dd68da564e529b98ff4
SHA256 44b095a62d7e401671f57271e6cada367bb55cf7b300ef768b3487b841facd3c
SHA3 f2a1d165133c29eba349014fa5f8059ddebe1aba5b220fb89f1a474e95c482ca

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x4b8
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 2.88756
MD5 aacd52f919e6a5713e87c20214fdc198
SHA1 6aa3804376c6f647a190f1c5f668d5cef9f77d03
SHA256 56929683ec876837c0cebe80a0f01d9fbdbb9ce4b19a75a8e5cf624b235ab4b0
SHA3 c898b3d0450254669bea803902a050c2abba781931e76d79efe2daac6480316a

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x560
TimeDateStamp 2012-Oct-10 13:08:38
Entropy 5.05007
MD5 8d7accca43bc3864983dbbb9af490005
SHA1 07ae72350bcbfedb5015a78efd74fcfd3bab11ac
SHA256 ec233469005d39f4f2673be991a0415318631a59c5976c35d4dd22db45226fd0
SHA3 d340127cbdd815e5c2dd4b44e8755c28512ad5e969b757cfcec6612b00e9d186

String Table contents

Saturday
October
November
December
Sun
Mon
Tue
Wed
Thu
Fri
Sat
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Jun
Jul
Aug
Sep
Oct
Nov
Dec
January
February
March
April
May
June
July
August
September
Variant or safe array index out of bounds
Invalid variant type conversion
Invalid variant operation
Invalid argument
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
Jan
Feb
Mar
Apr
May
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Operation aborted
Exception %s in module %s at %p.
%s%s
Application Error
Format '%s' invalid or incompatible with argument
No argument for format '%s'
Variant method calls not supported
Read
Write
Error creating variant or safe array
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 2.0.1.90
ProductVersion 2.0.1.90
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments This installation was built with Inno Setup.
CompanyName Xacti, LLC
FileDescription Inbox Translators Toolbar Setup
FileVersion (#2) 2.0.1.90
LegalCopyright copyright © Inbox.com
ProductName Inbox Translators Toolbar
ProductVersion (#2) 2.0.1.90
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x411000
EndAddressOfRawData 0x411008
AddressOfIndex 0x40d090
AddressOfCallbacks 0x412010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section BSS has a size of 0! [*] Warning: Section .tls has a size of 0! [*] Warning: [plugin_authenticode] Hashing algorithm 1.2.840.1015.13.2.5 is not supported.