264ff65eccf58c8a3501b9dba9282adb807a6c92408dd19bdf1be35021d7b9f4

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2023-Mar-03 17:54:03
Detected languages English - United States
FileVersion 1.0.0.0
ProductVersion 1.0.0.0

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: .itext
Unusual section name found: .didata
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryW
  • LoadLibraryA
  • LoadLibraryExW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegQueryValueExW
  • RegCloseKey
  • RegOpenKeyExW
Info The PE's resources present abnormal characteristics. The binary may have been compiled on a machine in the UTC-6 timezone.
Malicious The PE's digital signature is invalid. Signer: Softouch Development
Issuer: Sectigo Public Code Signing CA R36
The file was modified after it was signed.
Malicious VirusTotal score: 43/71 (Scanned on 2026-03-17 01:54:41) AVG: Other:Malware-gen [Trj]
AhnLab-V3: Infostealer/Win.ACRStealer.R716531
Alibaba: TrojanDownloader:Win32/Rugmi_AGen.da4dcc70
Antiy-AVL: Trojan/Win32.Rugmi
Avast: Other:Malware-gen [Trj]
Avira: TR/Redcap.ntnqp
Bkav: W32.AIDetectMalware
CAT-QuickHeal: Trojan.Ghanarava.17576491727c38d0
CTX: dll.trojan.rugmi
CrowdStrike: win/malicious_confidence_100% (W)
Cylance: Unsafe
DeepInstinct: MALICIOUS
DrWeb: Trojan.Loader.2608
ESET-NOD32: Win32/TrojanDownloader.Rugmi_AGen.AL trojan
Elastic: malicious (high confidence)
F-Secure: Trojan.TR/Redcap.ntnqp
Fortinet: W32/Rugmi_AGen.AL!tr.dldr
GData: Win32.Trojan.Agent.F3ANAA
Google: Detected
Ikarus: Trojan-Downloader.Win32.Rugmi
K7AntiVirus: Trojan-Downloader ( 005c7f8e1 )
K7GW: Trojan-Downloader ( 005c7f8e1 )
Kaspersky: HEUR:Trojan.Win32.LOADER.gen
Lionic: Trojan.Win32.Rugmi.4!c
Malwarebytes: Trojan.HijackLoader
MaxSecure: Trojan.Malware.196649231.susgen
McAfeeD: ti!264FF65ECCF5
Microsoft: Trojan:Win32/Rugmi.HG!MTB
Paloalto: generic.ml
Panda: Trj/Chgt.AD
Rising: Downloader.Rugmi!1.1337F (CLASSIC)
Skyhigh: Artemis!Trojan
Sophos: Mal/Generic-S
Symantec: ML.Attribute.HighConfidence
Tencent: Malware.Win32.Gencirc.10c3cfd1
TrellixENS: Artemis!230313B9885A
TrendMicro: TROJ_GEN.R002C0DHG25
TrendMicro-HouseCall: TROJ_GEN.R002C0DHG25
VBA32: TScope.Trojan.Delf
Varist: W32/ABApplication.IYWH-9197
VirIT: Trojan.Win32.DelphGen.IPD
Yandex: Trojan.DL.Rugmi_AGen!V8E2N69hzfo
alibabacloud: Trojan[downloader]:Win/Rugmi_AGen.AE

Hashes

MD5 230313b9885a7dc703b431730e7c38d0
SHA1 92d9b362e9ef316b97618522b871543155914ea3
SHA256 264ff65eccf58c8a3501b9dba9282adb807a6c92408dd19bdf1be35021d7b9f4
SHA3 40b2f6c29b46ae9f6654c84c986bbb5d23dad0f94a59ae0ba428ad3bf854c750
SSDeep 12288:x8zgke1195Sov270y0JDgycuKg38dB2GIOwAlnZdOcPNlj7FiidAFnvNlT:xQgkkzv27P0Tcu53kB2GIOtZdtQKU7
Imports Hash cc622634234a96fb3cc5a4118667b798

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 10
TimeDateStamp 2023-Mar-03 17:54:03
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0xf3400
SizeOfInitializedData 0x1ec00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000F4E68 (Section: .itext)
BaseOfCode 0x1000
BaseOfData 0xf5000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x11f000
SizeOfHeaders 0x400
Checksum 0x1247e9
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0
SizeofStackCommit 0
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 9d0c3c8b23b94f85a630774651cde460
SHA1 5facf6467af84d09fac2b8170abd2b2bf05b1da1
SHA256 755711d98dcfe0fa4271802cacf168ce4a2be70f8848aca3fcec7421eee99e16
SHA3 e40759e0a4c8178b845eafd35b77fadaa94c3ca818d631366c02a7384eada55a
VirtualSize 0xf2240
VirtualAddress 0x1000
SizeOfRawData 0xf2400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.50263

.itext

MD5 2012684a28a2369545243d3aec1ab5fd
SHA1 5e150da48b2a981e05c9721b3334dc95b4f6d734
SHA256 150f0985e5b33dd58c087265aff6b0a520117f5a0731e353834149e85cf525e7
SHA3 c2cd455a89bc03e732210f815526b2365a8fceb8791b04e71aec909362664fcc
VirtualSize 0xe90
VirtualAddress 0xf4000
SizeOfRawData 0x1000
PointerToRawData 0xf2800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.92175

.data

MD5 5cf1a46503ce94a11d26353d49164d5c
SHA1 f85c7fc0ce88f2c012194ee3a7cabe59a69bcd64
SHA256 5ae95a88246869dd0d9a808ce586f5ec51ca9c5c71934986509d4eb10bff3254
SHA3 453016e89dc08db911d8de935854b954028fb25047d067a7415ba8acf14a544b
VirtualSize 0x3e50
VirtualAddress 0xf5000
SizeOfRawData 0x4000
PointerToRawData 0xf3800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.14281

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x699c
VirtualAddress 0xf9000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 76f4a4e0d499f829a232790edb84e028
SHA1 605ab2b17aea1dbcdb6ed44b2dbbf277d2020042
SHA256 446aff4f757ff02a11f25d37952d2c4d76a589b61869e48cc6f62d8e2bfd705f
SHA3 78e75fb2bbd557683345497bcbc40bca5e6511df3256c1d1e456a8fcc1a177a9
VirtualSize 0xdd6
VirtualAddress 0x100000
SizeOfRawData 0xe00
PointerToRawData 0xf7800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.03742

.didata

MD5 6b5a9f4dfa450098fa2126b61540e9e4
SHA1 32236659f21fd0dd11ac5f7ff68006d6da1b821c
SHA256 51ce1db31a1708edae971814f908acfe8fe11c3fb33e238ff1eebf1737174034
SHA3 f98f42b175afb339145d7ec98eff53853b9d56d7233517bf81ddba2e2b977648
VirtualSize 0x1ea
VirtualAddress 0x101000
SizeOfRawData 0x200
PointerToRawData 0xf8600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.2254

.edata

MD5 2156591670ab92c98eb65c668d1cff3b
SHA1 a43d3654daeb4f40f3d7341830ae36f16524ef8a
SHA256 a3d3e78538cf04b936514e6df6ad50621d450fb621653c9071daae60b8627416
SHA3 b3e41652dadcae59e316ea45f57ff8323a85896e8357b5da640b47fff28f93a5
VirtualSize 0xd9
VirtualAddress 0x102000
SizeOfRawData 0x200
PointerToRawData 0xf8800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.6609

.rdata

MD5 f39142798bef82e46a62bb98c22ace01
SHA1 58b54aae72ef40cb17f87e537746a714472fa363
SHA256 fd6e6de106339989377c16ac6087bc1cc1cda3c178fdb6d4f571266cf13d8ae6
SHA3 bd5e9e9f17ddc79d1f205a456fb39cbaa47c08be830efebdb70d99b2420a1607
VirtualSize 0x45
VirtualAddress 0x103000
SizeOfRawData 0x200
PointerToRawData 0xf8a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.19631

.reloc

MD5 104b7141a58359f621c2d0c24c74442e
SHA1 df5bf98fb318d8f08e2d43f608c2eef67904ee32
SHA256 0ea47cc64c408b990ad1e21bcb75b0d69ece495c35d9682e0713a1d806874408
SHA3 598a5c7737fef59f43659c55a46d050a9019682d28814c81f38268d421efb7d4
VirtualSize 0x16288
VirtualAddress 0x104000
SizeOfRawData 0x16400
PointerToRawData 0xf8c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.70141

.rsrc

MD5 9849a4cb214f022be626088a80f3cfaa
SHA1 1012b35a1920e64aaa752c062b8748d7294d21fc
SHA256 b8b27b9cbcb8c2b0260fbc24767584dc28cdf9abab22531734ea64d262d05c0c
SHA3 25953e97bcf9d188e9bd7a9ec5de049a058a8b0ab9f6609efe75598bd43638f0
VirtualSize 0x3400
VirtualAddress 0x11b000
SizeOfRawData 0x3400
PointerToRawData 0x10f000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.77429

Imports

kernel32.dll EnterCriticalSection
SetFilePointer
GetACP
CloseHandle
LocalFree
GetCurrentProcessId
SuspendThread
TlsAlloc
GetTickCount
QueryPerformanceFrequency
IsDebuggerPresent
GetFullPathNameW
VirtualFree
HeapAlloc
GetStartupInfoW
ExitProcess
InitializeCriticalSection
GetCPInfoExW
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
RtlUnwind
GetCPInfo
GetCommandLineW
GetSystemInfo
ResumeThread
GetProcAddress
LeaveCriticalSection
EnumSystemLocalesW
GetStdHandle
GetVersionExW
VerifyVersionInfoW
GetModuleHandleW
TryEnterCriticalSection
FreeLibrary
HeapCreate
HeapDestroy
ReadFile
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
GetUserDefaultUILanguage
FindFirstFileW
TlsFree
SetLastError
WaitNamedPipeW
GetModuleFileNameW
GetLastError
GetCommTimeouts
SetCommTimeouts
lstrlenW
QueryPerformanceCounter
SetEndOfFile
CompareStringW
CreateThread
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryW
LoadLibraryA
ResetEvent
SetEvent
CreateFileW
GetLocaleInfoW
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetLocalTime
WaitForSingleObject
GetCurrentThread
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
IsValidLocale
TlsSetValue
LoadLibraryExW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
CreateEventW
VirtualQueryEx
GetThreadLocale
Sleep
SetThreadLocale
user32.dll CallNextHookEx
CharLowerBuffW
CharUpperW
PeekMessageW
GetSystemMetrics
SetWindowLongW
PostMessageW
MessageBoxW
SetParent
CharUpperBuffW
SendMessageTimeoutW
GetWindowThreadProcessId
CharNextW
MsgWaitForMultipleObjects
GetClassNameW
LoadStringW
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowPos
oleaut32.dll SafeArrayPutElement
VariantInit
VariantClear
SysFreeString
SafeArrayAccessData
SysReAllocStringLen
SafeArrayCreate
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
advapi32.dll RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32.dll (delay-loaded) EnterCriticalSection
SetFilePointer
GetACP
CloseHandle
LocalFree
GetCurrentProcessId
SuspendThread
TlsAlloc
GetTickCount
QueryPerformanceFrequency
IsDebuggerPresent
GetFullPathNameW
VirtualFree
HeapAlloc
GetStartupInfoW
ExitProcess
InitializeCriticalSection
GetCPInfoExW
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
RtlUnwind
GetCPInfo
GetCommandLineW
GetSystemInfo
ResumeThread
GetProcAddress
LeaveCriticalSection
EnumSystemLocalesW
GetStdHandle
GetVersionExW
VerifyVersionInfoW
GetModuleHandleW
TryEnterCriticalSection
FreeLibrary
HeapCreate
HeapDestroy
ReadFile
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
GetUserDefaultUILanguage
FindFirstFileW
TlsFree
SetLastError
WaitNamedPipeW
GetModuleFileNameW
GetLastError
GetCommTimeouts
SetCommTimeouts
lstrlenW
QueryPerformanceCounter
SetEndOfFile
CompareStringW
CreateThread
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryW
LoadLibraryA
ResetEvent
SetEvent
CreateFileW
GetLocaleInfoW
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetLocalTime
WaitForSingleObject
GetCurrentThread
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
IsValidLocale
TlsSetValue
LoadLibraryExW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
CreateEventW
VirtualQueryEx
GetThreadLocale
Sleep
SetThreadLocale

Delayed Imports

Attributes 0x1
Name kernel32.dll
ModuleHandle 0x101080
DelayImportAddressTable 0x101090
DelayImportNameTable 0x1010bc
BoundDelayImportTable 0x1010e8
UnloadDelayImportTable 0x101108
TimeStamp 1970-Jan-01 00:00:00

dbkFCallWrapperAddr

Ordinal 1
Address 0xfc640

__dbk_fcall_wrapper

Ordinal 2
Address 0x11014

TMethodImplementationIntercept

Ordinal 3
Address 0x6e4a4

UnLoadPowerPointHook

Ordinal 4
Address 0xee350

LoadPowerPointHook

Ordinal 5
Address 0xee308

4084

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x41c
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.25548
MD5 4eb4d530d0068953f7e58cb08482f384
SHA1 cb030025f249df99d47c719a77220107facad9da
SHA256 6d73ee7bf683468ea5363bf191f1125fdbe6a9c66d2f37101214d631a498c768
SHA3 cfb002d76be218430ad8fd019345252575a47c0c98bc4979c9ef0721488ed481

4085

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x228
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.25172
MD5 d9d0da7af0f0504b74589598ff2e1c70
SHA1 4799539662f407a17b00b312aa65f7e06b5eb6e5
SHA256 c430636a95d6e0b1f5589be5f1a05cc61af94b61bbe7146aeb6cd8d42abad591
SHA3 95d9f5c56d8f1773da6b8d5b3b3f3c1cff65bad64fe44bd50c3ae511300d0fab

4086

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x4cc
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.38028
MD5 fce6dab7629ae7580348fbbf1bb5b04b
SHA1 0c22070690da0c2103c5ff8d8c5797300dbf14f5
SHA256 3989fbf3ed67c415015bf4df0c8f33c2b3be821b711338707225822e0faf085c
SHA3 892fe35dec0681e04b569f15d70dfeb9209df820e6f9400bfbfb5058236603a3

4087

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x510
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.23694
MD5 2f6670f009e9d573b84f62a5a22736b2
SHA1 8ee2eba4bdf30306ea69943e384bbd03ba4d408d
SHA256 63cb628a2657ee1c7608dbf9c5fdc5dd5a03c6aa9fb779882a26a1cdb5e03a0a
SHA3 e8214fa295cdb6b45b5069f470bc59dd6edc103c3bd9b1c29990e319400b3ff7

4088

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3b4
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.29737
MD5 3e24da0db879c2655f0038136059ad3f
SHA1 ecfd3a70c52fa776e61b2969044d8453dbc6d029
SHA256 0490da1904760ad09022861727c5067071a4e04370c494828eadd1899546c20a
SHA3 e9d9c4ad3b891c573edf914fc3231c2b3faacc11c63af944337b8d9477b6e223

4089

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x434
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.33409
MD5 a917ae0a49d86e629bef1b271bce8b2f
SHA1 a1654fb83777457d37291f71117e5e33481166a0
SHA256 06e1f68695ce50b662f2f3308af1ce8aec49ad17aeba1dd059a2f256f6c20be0
SHA3 e226aa204283a012c509724e66f6cebaeb79da7f6e8b709a82191ed6a54a5a1d

4090

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x19c
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.33253
MD5 5e944d46bb658646920334eb5fa01c18
SHA1 d13fe77bfd90fb1e0bbc0c9510bd44597eb3d304
SHA256 5ae1c4a51b83a6c208529c0e98eeb95065dc6d6ff69a3918df5fb420e94fa6e8
SHA3 b5359b179df4952263f636d8bcf46d1889bb6469f12cec405c781ce6feb518b7

4091

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xcc
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.33625
MD5 cc22f1ac30dcdeae9cd72ed8abbb02cc
SHA1 9ed70b6c75879d40481e525a275d4b99d75abc56
SHA256 93aef43aba52d60e77b3bbd23dda80f9fe6e1be314a87b02feca051426a10ba7
SHA3 8a7657f317d99f5180257945fed83bf07fa87ee81355373bedd142df395b9a6e

4092

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x198
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.40049
MD5 6f9be8d803d71b2f5a91c2e1b5e3b41a
SHA1 6ad07a197f5f8c10c64cd4ed264de6c26f79aaa5
SHA256 7d3c5b95e9b78743f4e39aadb7d98b0b2c45888c414d582ee36c122e54a26922
SHA3 31a5970ad628bf0fd7448deef15985ae1e0ff3571592cdcc35e03faf9ece277a

4093

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3c8
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.28204
MD5 b98520d446318f4cf809f9fa9bbd5297
SHA1 b13c88cd13623b4954555545fe7e6e2d27a95eb8
SHA256 aad850b9c5a9f29c893905fc7cf3040606e99770ffee0547553587a031ef2616
SHA3 f21f082118960d326ddf8499ca836616e16bc0ca8fdb671ee64f1cbe2b6c0a99

4094

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3b4
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.32432
MD5 c3f68fc76046f7bd8ade21011de5b397
SHA1 99daeeafb9ef980c8246949854be2b0bfcef0121
SHA256 5d335fe242e44b7684bc0f0ca32146615613c69e467acbd747ccc9a02ca5b2fc
SHA3 fc4705bedfef09372a33d25f4e0572a91d19275b6150a921663075c765dd3f1d

4095

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x354
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.32737
MD5 c923d562e6bffdab843dd41743621c2a
SHA1 3581fd1e39f474f0eec94bfca6d1e4857f5a3f79
SHA256 b71dd4c8b1a31e49b72cec2cda5929b8acabbb082dec2397258111e5a9f18556
SHA3 00ca1d0c6d0f1200dca193289c7e5411c8d9e390424a0467d8d050a8420cc068

4096

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2c4
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3.28635
MD5 e7d2f895f1a7c987ab0a409e73a27faf
SHA1 05f2a3523ce28755c06f292621f274ce6fdc501a
SHA256 2dd16187617c031ba06b5ef12e8e5d0af8c5605aa7aef6678a83639c6ff6e3ec
SHA3 8b86851c6723763c2aa622ab470ebd982e46a1a8956f8d6b5f950c233776a541

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x10
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 4
MD5 a40263c75fde7440b1086b7da9c51fc2
SHA1 139a84f87110fb5cb16a386adade21f30cae98b0
SHA256 e7dbe99baa5c1045cdf7004edb037018b2e0f639a5edcf800ec4514d5c8e35b5
SHA3 d3a734fa7d36868d301f9569de92e1bfc551e4b5cf6d7c59eace8d0a554093c0

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x468
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 5.14052
MD5 8ef0343db1026f62cea648da5b179c06
SHA1 72aa82073907a75b7f828bca868cef913916a0cc
SHA256 ed1bda5df104c70ea070728e87543d6e8506a5df89282bb5e0c2e176be7e744d
SHA3 ad0dc363d69dca68795bad012de68432a4e95225e4294d0da3d7b5cffa9ca3b7

PLATFORMTARGETS

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x2
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 1
MD5 598f4fe64aefab8f00bcbea4c9239abf
SHA1 688934845f22049cb14668832efa33d45013b6b9
SHA256 9b4fb24edd6d1d8830e272398263cdbf026b97392cc35387b991dc0248a628f9
SHA3 2951e8c89ecc8e8aa730f646caa10afd48f0be1353aaf5cc35815497dc6ba0db

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x140
TimeDateStamp 2023-Mar-03 11:54:04
Entropy 3
MD5 d7073783a22528cccc420b6e25c7431f
SHA1 f405884e4509147807ca9fc353c9a9037c258b7d
SHA256 bc7ff32be85eeaaf8ceb824d1bcf43498b8e02455430a89cc2805f791924ffa9
SHA3 f15c1f93a4cb7d50be0fe7f4714ba44247fb2dda790f775d8b8b7ff0e5995a04

String Table contents

Windows 8
Windows 8.1
Windows 10
Windows 11
Observer is not supported
Cannot have multiple single cast observers added to the observers collection
The object does not implement the observer interface
No single cast observer with ID %d was added to the observer collection
No multi cast observer with ID %d was added to the observer collection
Invalid date string: %s
Invalid time string: %s
Invalid time Offset string: %s
Must wait on at least one event
Cannot call BeginInvoke on a TComponent in the process of destruction
32-bit Edition
64-bit Edition
Windows
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 2000
Windows XP
Windows Server 2003
Windows Server 2003 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019
Windows Server 2022
Timespan too long
The duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValue
Value cannot be NaN
Negating the minimum value of a Timespan is invalid
Invalid Timespan format
Timespan element too long
Argument out of range
Argument must not be nil
Item not found
Duplicates not allowed
Insufficient RTTI available to support this operation
Parameter count mismatch
Type '%s' is not declared in the interface section of a unit
VAR and OUT arguments must match parameter type exactly
%s (Version %d.%d, Build %d, %5:s)
%s Service Pack %4:d (Version %1:d.%2:d, Build %3:d, %5:s)
Stream write error
Thread creation error: %s
Thread Error: %s (%d)
Cannot terminate an externally created thread
Cannot wait for an externally created thread
Cannot call Start on a running or suspended thread
Cannot call CheckTerminated on an externally created thread
Cannot call SetReturnValue on an externally create thread
Parameter %s cannot be a negative value
Input buffer exceeded for %s = %d, %s = %d
Invalid argument
Length of Strings and Objects arrays must be equal
Source and Destination arrays must not be the same
Class %s is not intended to be constructed
Invalid Timeout value: %s
SpinCount out of range. Must be between 0 and %d
''%s'' is not a valid component name
Invalid property value
Invalid property path
Invalid property value
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
Out of memory while expanding memory stream
%s has not been registered as a COM class
Error reading %s%s%s: %s
Stream read error
Property is read-only
%s.Seek not implemented
Operation not allowed on sorted list
%s not in a class registration group
Property %s does not exist
Invalid destination index (%d)
Invalid code page
Invalid encoding name
No mapping for the Unicode character exists in the target multi-byte code page
Invalid StringBaseIndex
Ancestor for '%s' not found
Cannot assign a %s to a %s
CheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists
List does not allow duplicates ($0%x)
A component named %s already exists
String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format
Wed
Thu
Fri
Sat
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Invalid source array
Invalid destination array
Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Dec
January
February
March
April
May
June
July
August
September
October
November
December
Sun
Mon
Tue
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%s%s
A call to an OS function failed
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Too many custom variant types have been registered
Could not convert variant of type (%s) into type (%s)
Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
Object lock not owned
Monitor support function not initialized
Feature not implemented
Method called on disposed object
No argument for format '%s'
Variant method calls not supported
Read
Write
Execution
Invalid access
Error creating variant or safe array
Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation
Invalid NULL variant operation
Invalid variant operation (%s%.8x)
%s
Custom variant type (%s%.4x) is out of range
Custom variant type (%s%.4x) already used by %s
Custom variant type (%s%.4x) is not usable
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Exception %s in module %s at %p.
%s%s
Application Error
Format '%s' invalid or incompatible with argument
<unknown>
'%s' is not a valid integer value
'%s' is not a valid floating point value
'%d.%d' is not a valid timestamp
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
FileVersion (#2) 1.0.0.0
ProductVersion (#2) 1.0.0.0
Resource LangID English - United States

TLS Callbacks

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0!
Leave a comment

No comments yet.