27716820c3ae32999284dd0425748949

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2024-Oct-09 15:00:33
Detected languages English - United Kingdom
FileVersion 3.3.16.1
Comments AdobeGenP
FileDescription AdobeGenP
ProductName AdobeGenP
ProductVersion 3.3.16.1
CompanyName AdobeGenP
LegalCopyright AdobeGenP
LegalTradeMarks AdobeGenP

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Is an AutoIT compiled script:
  • AutoIt Error
  • reserved for AutoIt internal use
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses known Mersenne Twister constants
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryW
  • LoadLibraryExW
Functions which can be used for anti-debugging purposes:
  • CreateToolhelp32Snapshot
  • FindWindowW
Code injection capabilities:
  • OpenProcess
  • VirtualAllocEx
  • WriteProcessMemory
  • VirtualAlloc
Code injection capabilities (PowerLoader):
  • GetWindowLongW
  • FindWindowW
Can access the registry:
  • RegisterHotKey
  • RegEnumValueW
  • RegDeleteValueW
  • RegDeleteKeyW
  • RegEnumKeyExW
  • RegOpenKeyExW
  • RegCloseKey
  • RegQueryValueExW
  • RegSetValueExW
  • RegCreateKeyExW
Possibly launches other programs:
  • CreateProcessW
  • CreateProcessAsUserW
  • CreateProcessWithLogonW
  • ShellExecuteW
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Uses functions commonly found in keyloggers:
  • GetAsyncKeyState
  • AttachThreadInput
  • MapVirtualKeyW
  • GetForegroundWindow
Has Internet access capabilities:
  • InternetCloseHandle
  • InternetOpenW
  • InternetSetOptionW
  • InternetCrackUrlW
  • InternetQueryOptionW
  • InternetConnectW
  • InternetOpenUrlW
  • InternetReadFile
  • InternetQueryDataAvailable
Functions related to the privilege level:
  • AdjustTokenPrivileges
  • OpenProcessToken
  • DuplicateTokenEx
  • CheckTokenMembership
Enumerates local disk drives:
  • GetDriveTypeW
  • GetVolumeInformationW
Manipulates other processes:
  • OpenProcess
  • WriteProcessMemory
  • ReadProcessMemory
  • Process32FirstW
  • Process32NextW
Can take screenshots:
  • FindWindowW
  • GetDC
  • CreateCompatibleDC
Reads the contents of the clipboard:
  • GetClipboardData
Can shut the system down or lock the screen:
  • ExitWindowsEx
  • InitiateSystemShutdownExW
Info The PE's resources present abnormal characteristics. Resource SCRIPT is possibly compressed or encrypted.
Suspicious The file contains overlay data. 12755180 bytes of data starting at offset 0x13a400.
Overlay data amounts for 90.8337% of the executable.
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 27716820c3ae32999284dd0425748949
SHA1 7f6384a99de0aa538d18d37951433ab06b5c8099
SHA256 e8f92d1ec1f40e59578ce7abc2ceb710aad6c809c61829184fa7088da486fb93
SHA3 7d1be4473c11247bde4f48d600702689876c37ee03c8f0e12d4313eadaec2701
SSDeep 49152:N2EYTb8atv1orq+pEiSDTj1VyvBa8Heqta7x:MXbIrq4to
Imports Hash fadc5a257419d2541a6b13dfb5e311e2

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x130

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2024-Oct-09 15:00:33
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xb3400
SizeOfInitializedData 0x86c00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000000000002549C (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.2
ImageVersion 0.0
SubsystemVersion 5.2
Win32VersionValue 0
SizeOfImage 0x142000
SizeOfHeaders 0x400
Checksum 0x13d54a
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x400000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x400000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 507a8505198e35cc9675301d53e3b1c4
SHA1 4475f0b38c6921083c1f099fe0696cd7d82eb187
SHA256 e68a64054a77dcb04324217cfa0cca3c8c57814b977decb58e5e9ec772db2a9f
SHA3 14c077a48e64808b03a75b267ccecb9e5130d16f14f863d86fa0a5c1912736e3
VirtualSize 0xb3328
VirtualAddress 0x1000
SizeOfRawData 0xb3400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.5213

.rdata

MD5 9eda36be0cf076085a2f9772c1ee5803
SHA1 aa0018160834c39aa77d89dd98e9e9b4783c33dc
SHA256 e17e3f826542838547410b8fa05bd7983f1e0a612f3791786b5837dc3a78583c
SHA3 236c45281ffc2188319264080ffdc942eba7cf3486c6cffaabe2a30a47f78d32
VirtualSize 0x34204
VirtualAddress 0xb5000
SizeOfRawData 0x34400
PointerToRawData 0xb3800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.36059

.data

MD5 ec6b77d6ef8898b0d3b7d48c042d66a0
SHA1 ae2d0564eab0244a333aa2fd168a9fe54b6c4377
SHA256 d34d1f685805904a55f186e4b215d69495cc81c427562d917e0aac3b5aa8fc57
SHA3 3b8260f529ae3334780479a47181daebe6d1a4e479904364a0b8bb92ef3c5e49
VirtualSize 0x9120
VirtualAddress 0xea000
SizeOfRawData 0x5000
PointerToRawData 0xe7c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.574924

.pdata

MD5 4416e27f8be9f9271c439d2fd34d1b2d
SHA1 6c22013d212c2d3b8d455f73b7fca00f301d2edf
SHA256 27a9d6b4c5e4a8df5f93d28647a74fc2c5b72a0f25368e0ef4ac0d8c63e23e88
SHA3 2295722c89864353efd13f0ff7531865b3cb421cd2ba2b78203dc6f6e222502b
VirtualSize 0x6f48
VirtualAddress 0xf4000
SizeOfRawData 0x7000
PointerToRawData 0xecc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.91148

.rsrc

MD5 2c3ebd899bd317e214e78540c82397a9
SHA1 a340c2cd8ce018ad4c970b05cd9cfc86aeacf0a7
SHA256 2e7c7ce0395b6243167cd7742249e206b1405ab54dfa1978e75d83d048fb684d
SHA3 b917c57d54c7c90ad90ac410c42f3bb041efcacdc9fae63eb119cc1c54b6e471
VirtualSize 0x45bac
VirtualAddress 0xfb000
SizeOfRawData 0x45c00
PointerToRawData 0xf3c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.17829

.reloc

MD5 5ddb0e422ace102fe530e589a0cbec6f
SHA1 0bfd3a8a134847a73f17668d586186181a6a960c
SHA256 5757c1fe2c9000d4abbababe0449151c354dc9ac73321992695414fc867ab99f
SHA3 e8337e2919503c60ba656959421ae73f46d4c9a38ad30170d0b7a7202aae20f5
VirtualSize 0xa74
VirtualAddress 0x141000
SizeOfRawData 0xc00
PointerToRawData 0x139800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.13985

Imports

WSOCK32.dll gethostbyname
recv
send
socket
inet_ntoa
setsockopt
ntohs
WSACleanup
WSAStartup
sendto
htons
__WSAFDIsSet
select
accept
listen
bind
inet_addr
ioctlsocket
recvfrom
WSAGetLastError
closesocket
gethostname
connect
VERSION.dll GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
WINMM.dll timeGetTime
waveOutSetVolume
mciSendStringW
COMCTL32.dll ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Remove
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
InitCommonControlsEx
ImageList_Create
MPR.dll WNetGetConnectionW
WNetCancelConnection2W
WNetUseConnectionW
WNetAddConnection2W
WININET.dll HttpOpenRequestW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetQueryOptionW
InternetConnectW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetReadFile
InternetQueryDataAvailable
PSAPI.DLL GetProcessMemoryInfo
IPHLPAPI.DLL IcmpSendEcho
IcmpCloseHandle
IcmpCreateFile
USERENV.dll DestroyEnvironmentBlock
LoadUserProfileW
CreateEnvironmentBlock
UnloadUserProfile
UxTheme.dll IsThemeActive
KERNEL32.dll WaitForSingleObject
HeapAlloc
GetProcessHeap
HeapFree
Sleep
GetCurrentThreadId
MultiByteToWideChar
MulDiv
GetVersionExW
IsWow64Process
GetSystemInfo
FreeLibrary
LoadLibraryA
GetProcAddress
SetErrorMode
GetModuleFileNameW
WideCharToMultiByte
lstrcpyW
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
SetEndOfFile
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
GetLongPathNameW
GetShortPathNameW
DeleteFileW
FindNextFileW
CopyFileExW
GetFullPathNameW
CreateDirectoryW
RemoveDirectoryW
SetSystemPowerState
QueryPerformanceFrequency
LoadResource
LockResource
SizeofResource
OutputDebugStringW
GetTempPathW
GetTempFileNameW
DeviceIoControl
LoadLibraryW
GetLocalTime
CompareStringW
EnterCriticalSection
DuplicateHandle
GetStdHandle
CreatePipe
TerminateThread
LoadLibraryExW
FindResourceExW
CopyFileW
VirtualFree
FormatMessageW
GetExitCodeProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
SetFileAttributesW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
HeapReAlloc
HeapSize
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
GetProcessId
SetPriorityClass
VirtualAlloc
SetCurrentDirectoryW
IsDebuggerPresent
GetCurrentDirectoryW
lstrcmpiW
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
CreateThread
GetCurrentProcess
GetCurrentThread
LeaveCriticalSection
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
TlsAlloc
ResetEvent
WaitForSingleObjectEx
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
ExitProcess
GetModuleHandleExW
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetACP
GetDateFormatW
GetTimeFormatW
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
GetConsoleCP
GetConsoleMode
ReadConsoleW
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
CloseHandle
WriteConsoleW
MoveFileW
RtlCaptureContext
USER32.dll GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
GetWindowLongW
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongPtrW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
SetWindowLongPtrW
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
CallWindowProcW
ReleaseCapture
SetCapture
BlockInput
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
GetInputState
UnregisterHotKey
CharLowerBuffW
MonitorFromPoint
MonitorFromRect
LoadImageW
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
IsCharUpperW
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
GetClipboardData
keybd_event
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
IsCharLowerW
IsCharAlphaNumericW
IsCharAlphaW
GetKeyboardLayoutNameW
ClientToScreen
RegisterHotKey
GetCursorInfo
SetWindowPos
CopyImage
AdjustWindowRectEx
SetRect
SetClipboardData
EmptyClipboard
CountClipboardFormats
SetMenuDefaultItem
CloseClipboard
GetWindowRect
SetUserObjectSecurity
IsClipboardFormatAvailable
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
SystemParametersInfoW
OpenClipboard
GetWindowLongPtrW
GDI32.dll EndPath
DeleteObject
GetDeviceCaps
ExtCreatePen
StrokePath
SetPixel
CloseFigure
LineTo
AngleArc
MoveToEx
Ellipse
PolyDraw
GetTextExtentPoint32W
CreateCompatibleBitmap
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
CreateFontW
GetTextFaceW
GetStockObject
CreateDCW
GetPixel
DeleteDC
GetDIBits
StretchBlt
SelectObject
CreateCompatibleDC
StrokeAndFillPath
COMDLG32.dll GetSaveFileNameW
GetOpenFileNameW
ADVAPI32.dll GetAce
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetTokenInformation
RegSetValueExW
GetSecurityDescriptorDacl
GetAclInformation
RegCreateKeyExW
AddAce
SetSecurityDescriptorDacl
InitiateSystemShutdownExW
GetUserNameW
SHELL32.dll DragFinish
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHEmptyRecycleBinW
SHGetPathFromIDListW
SHBrowseForFolderW
SHCreateShellItem
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetFolderPathW
SHFileOperationW
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
ole32.dll CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoCreateInstance
IIDFromString
StringFromGUID2
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitialize
CoUninitialize
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
OLEAUT32.dll VariantChangeType
DispCallFunc
CreateStdDispatch
CreateDispTypeInfo
UnRegisterTypeLib
UnRegisterTypeLibForUser
RegisterTypeLibForUser
RegisterTypeLib
LoadTypeLibEx
VariantCopyInd
VariantTimeToSystemTime
SysFreeString
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayUnaccessData
VariantInit
VariantClear
VariantCopy
SysAllocString
SafeArrayCreateVector
VarR8FromDec
SafeArrayAllocDescriptorEx
SafeArrayAllocData
SysStringLen
SafeArrayGetVartype
OleLoadPicture
QueryPathOfRegTypeLib
SysReAllocString
SafeArrayAccessData

Delayed Imports

1

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.25499
MD5 ad424f5f5d5ff4460343686c61e4f75e
SHA1 29a1f0faadc42f1b9f9767d8c724fdc58dd165c8
SHA256 245fc49e4e955e1db3975b826dcf27ad2eb32a6831caa4cb6b501a3914bcfaa9
SHA3 4f3a627ee7d533397f7f5c70bb2dafa8857150e674cb31edd96949c7905de509

2

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0xb2e3
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.97714
Detected Filetype PNG graphic file
MD5 0c37941de0245d487410a9a5b0db02f2
SHA1 e0255c5dff0dc51df423871e4ea50773447eb61c
SHA256 e0b54a9310507938e46d1d6d5c96bf7f5f83a4362f85d09df8643ce446ee1034
SHA3 de8233a1bc0408988f76a19d557a404dea502cebcd0f465143d9c766e75ebe43

3

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.18364
MD5 c2aed7a54b7c314944f22fcd62fbefec
SHA1 a1201c37b6a45847687554c29b570e38d6270486
SHA256 8483bef66610a575ba42d241ec80f6f090d86c5a7a3982d97b02b4d333e1b91a
SHA3 38ecece4f88ea41142e5dc8ba58722b2a90f87f3693be7f6122b77d85b8cc039

4

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x94a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.3288
MD5 efbdeac43e86e1cdfdaf41189bab3358
SHA1 80792a34623681531f427f4a6b0a7c8239e2b956
SHA256 06f7340d07fafd9e92e854ef5fca252d9066868c698787b4bd5a952e24401c0c
SHA3 08efe4ae1c9ff58d4454018b63fcbb2add018b60633fa1a42f3459e0013c4bb7

5

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x5488
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.31438
MD5 a49f6dda0872e770dcc59be9c3a8fe6b
SHA1 68fc5323eb52cd054251dc7f1d1bbb9d6dca62c7
SHA256 2ff882c47c9c6a0351d36455755f76a01d311ba8237a9bc8c5a78f0a91581f86
SHA3 fb3fb95facbc3b3786c37098811ca57eb7d9fa50b0d0071a6768eab8d71452b9

6

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.29203
MD5 8f8eb66fdf7e3c83d4407c03f8836139
SHA1 26dc535760827dd47d922580900414de2732cd21
SHA256 c2fa47b3fc9f050da2f01ade9d36a5b424d61767260e008142452c94a1630e27
SHA3 c663f9b4e55f0cd6c37917f9812b0282177e063a2b874d6c311a3b159687e814

7

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.42742
MD5 b70cfbd8a456d3bb9d478d656d91f10f
SHA1 7be494f898a7f1d1d2ae836be386a554fb903dbf
SHA256 14731cfe72dd2f6eded60d1ccf2fd34abd136b56eeba040a779e727a40475b78
SHA3 8cd5e1fbf3ed5e8e140df380b34970c09dc797ee60ec8420d47bca137c77cbf4

8

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.49091
MD5 e52773e13a25f295290172b4bc82c7ad
SHA1 27c958c0fcb0195b78470b71a2fc660162facfe4
SHA256 4e2dd1c29cf7f6a85077ee1f0fd15697c55d4e50f7aa400f84c869c0cdc9400e
SHA3 82a76f6dcda2b88af36b3eb51cbe0cc3b9edea120d08a613fbd3e938f24900ca

9

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x988
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.58918
MD5 a8691fcbea1ed4d4443b312ada7aee7f
SHA1 a8b6fa82931468455ea40957eb011fb20ad9c4b7
SHA256 0a920845bd95f53146a2b5777a13163d64d750b886784fbf5d145a6fe9fd059a
SHA3 a0bcbb8450875484b6d639f186b50bfefde774d6326afe32d050cdf20a8cc6d9

10

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.71104
MD5 9a6c84389d5d9933287610a672a31a0b
SHA1 1b94b4ab6ba3aec9bdb9f1b13201e8381c02938c
SHA256 11cb638ff2e30f9b0a63bbd72ef6e630acc7de32c4760e4b2245d04c715bd69a
SHA3 5bbdd2357732cd8524c05efd5df384317962bffac9b01b1589f30409e6c3c0c5

7 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x594
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34702
MD5 d1f824f98742295a66a25225701dd6d8
SHA1 5b2075b778387182bf97314b593e73f30853435d
SHA256 4fe35e21717d34ceb4717f9e9de8fde1b3de80d76a59bb87405910c2f1d6284b
SHA3 294fc9961bf6eddc1dc7c5b525832f8aa8d3e90dac608e6421398510ab9c15b1

8 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x68a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.2804
MD5 bb4ecf238536d913c938bad6dbb30ba4
SHA1 c820a1144cda29a77ff4a4d63b95a64e10e65a99
SHA256 c05eaf94e886a38a0d9f2f0aefee32bea4d21af7a9524361d04e3a7ce99a96ec
SHA3 8effd7dded7aa58dbe27ce77307408270ee44e51961e7cbb7aa2d2052706e4c1

9 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x490
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28849
MD5 6b12d17c7622d8215889a2288098fa15
SHA1 a511bf459e5043fcb234829bf66a99565c244652
SHA256 e47fa3aec12353f6370b941bc5855e5551530c7b26f925b5a2e2692a0201450c
SHA3 8e3541de418e1046806ffb977c8babecd093b9816c92883261b074d1c47d96fb

10 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x5fc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28373
MD5 949955dbda367f0c790615f7817e7886
SHA1 ee0370fb4ad59a4cebc3dbfc83bb437343fb803b
SHA256 4854e5abce2237256df24b69c9759fc1e8caa423a54bfe661ba7031afd8375eb
SHA3 5e36df684c6f2c4058d1a2507989eb5fc3c873159d006088d40f4da3804f56f2

11

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x65c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.26322
MD5 9bc568a6176f738ffb3109e53235b579
SHA1 b97786555bfa05f958f174e294080e235d91b571
SHA256 d38369002e36f73866a0d40b13e069b9ffdbda50957f4c88d52a72fecb9b4e45
SHA3 94318c553eb0928412a92e8cf9913ca5c35a03aa8c24bf151a6764793b2f6f90

12

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x466
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.25812
MD5 899b8766aea5f88410c721620925754b
SHA1 53ba98192d7ea4fa9051ac220ed18960ab0507a6
SHA256 58ea125e6b5fa2cbc5a8ed819c7f50c9bca1cfe55f94c7cff3feb60f25ac6073
SHA3 7ad4457a556ba648b1d46e62549fdc4c7d093bbad286f9123daf6a94f0e5af62

313

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x158
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.08572
MD5 193a9143563395ad14c6dac83d32e2ad
SHA1 87ca08eb609f9ceabbd8ea7a64263de9a05bbb22
SHA256 b3711acbe8e01fee7fd362112b4e42da05c728e98b85c0a3b4cb075977849cee
SHA3 7634b4daca191c6fa53de1d5964fa47f382afccebf5744e70a702fd179fad715

SCRIPT

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.99723
MD5 33ebc8b3699b412aed3e97d4b8e7e993
SHA1 b2ac735098bc0f3810b65e4dc25e30f4f6afc852
SHA256 206605b9dd7a806a51584c0e9c1cf81ba5b8366af1834bc07c73e03925855516
SHA3 bcefb383570a825b9eba496959c8145f675987bf730dc8a7592bbe5e5d04a069

99

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.07228
Detected Filetype Icon file
MD5 8eac2011460c1b8252d467c3533830c4
SHA1 ba4a313aeb41df7d0bfa09453f367cb4468235f1
SHA256 5f7c39bbfd3078dd5b3e60f5bc20b5229d239a8370b91e03b711baac5039b4a3
SHA3 294a77ed726682a5e79d339919ca5f9b97066658c71e47d329475f5c76773156

169

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.84274
Detected Filetype Icon file
MD5 f64c60b749269fcf6659c450dda98486
SHA1 42945c3496bc4e1943a1a05926a9b5ee31d3e450
SHA256 ae172a9a2fd008910b537c92a95b38bfba0e5bbdaaca719bf686e6415a7a2ba1
SHA3 443830acdeb37f2b7f844756492b2b11f9fb93e9171617d8c799cebfd05cb37f

1 (#2)

Type RT_VERSION
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x28c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34269
MD5 b30299a927b5034eb81e2b15d526cf2b
SHA1 1dd3ac3c70d51bbe32d9431142907ae60ab28b46
SHA256 07760b8f258c8aeb4841876b196c6bd9282e1768a401d7764aa0781e4c2e581a
SHA3 b8862f34bd765777654837e6a52de71e6f209dc917ad3c67d88b761a28ef55f6

1 (#3)

Type RT_MANIFEST
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x3fa
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.39264
MD5 79ff2b6cfbaed20d0761e88f8b47dc80
SHA1 7ef2897a5a54be6eb3e82c3a936d070dc001e537
SHA256 2fb51dac382441e19215b5016eddd256a4fdf99d325fe691d77a6e450988ecbe
SHA3 02bda12ac26ccf7986d96ff43cdceb70ea576bb4a29fba484a5200fb71103412

String Table contents

(Paused)
AutoIt Error
AutoIt has detected the stack has become corrupt.
Stack corruption typically occurs when either the wrong calling convention is used or when the function is called with the wrong number of arguments.
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
"EndWith" missing "With".
Badly formatted "Func" statement.
"With" missing "EndWith".
Missing right bracket ')' in expression.
Missing operator in expression.
Unbalanced brackets in expression.
Error in expression.
Error parsing function call.
Incorrect number of parameters in function call.
"ReDim" used without an array variable.
Illegal text at the end of statement (one statement per line).
"If" statement has no matching "EndIf" statement.
"Else" statement with no matching "If" statement.
"EndIf" statement with no matching "If" statement.
Too many "Else" statements for matching "If" statement.
"While" statement has no matching "Wend" statement.
"Wend" statement with no matching "While" statement.
Variable used without being declared.
Array variable has incorrect number of subscripts or subscript dimension range exceeded.
Variable subscript badly formatted.
Subscript used on non-accessible variable.
Too many subscripts used for an array.
Missing subscript dimensions in "Dim" statement.
No variable given for "Dim", "Local", "Global", "Static" or "Const" statement.
Expected a "=" operator in assignment statement.
Invalid keyword at the start of this line.
Array maximum size exceeded.
"Func" statement has no matching "EndFunc".
Duplicate function name.
Unknown function name.
Unknown macro.
Unable to get a list of running processes.
Invalid element in a DllStruct.
Unknown option or bad parameter specified.
Unable to load the internet libraries.
"Struct" statement has no matching "EndStruct".
Unable to open file, the maximum number of open files has been exceeded.
"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.
Expected a variable in user function call.
"Do" statement has no matching "Until" statement.
"Until" statement with no matching "Do" statement.
"For" statement is badly formatted.
"Next" statement with no matching "For" statement.
"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.
"For" statement has no matching "Next" statement.
"Case" statement with no matching "Select"or "Switch" statement.
"EndSelect" statement with no matching "Select" statement.
Recursion level has been exceeded - AutoIt will quit to prevent stack overflow.
Cannot make existing variables static.
Cannot make static variables into regular variables.
Badly formated Enum statement
This keyword cannot be used after a "Then" keyword.
"Select" statement is missing "EndSelect" or "Case" statement.
"If" statements must have a "Then" keyword.
Badly formated Struct statement.
Cannot assign values to constants.
Cannot make existing variables into constants.
Only Object-type variables allowed in a "With" statement.
"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.
Object referenced outside a "With" statement.
Nested "With" statements are not allowed.
Variable must be of type "Object".
The requested action with this object has failed.
Variable appears more than once in function declaration.
ReDim array can not be initialized in this manner.
An array variable can not be used in this manner.
Can not redeclare a constant.
Can not redeclare a parameter inside a user function.
Can pass constants by reference only to parameters with "Const" keyword.
Can not initialize a variable with itself.
Incorrect way to use this parameter.
"EndSwitch" statement with no matching "Switch" statement.
"Switch" statement is missing "EndSwitch" or "Case" statement.
"ContinueCase" statement with no matching "Select"or "Switch" statement.
Assert Failed!
Obsolete function/parameter.
Invalid Exitcode (reserved for AutoIt internal use).
Variable cannot be accessed in this manner.
Func reassign not allowed.
Func reassign on global level not allowed.
Unable to parse line.
Unable to open the script file.
String missing closing quote.
Badly formated variable or macro.
Missing separator character after keyword.

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 3.3.16.1
ProductVersion 3.3.16.1
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United Kingdom
FileVersion (#2) 3.3.16.1
Comments AdobeGenP
FileDescription AdobeGenP
ProductName AdobeGenP
ProductVersion (#2) 3.3.16.1
CompanyName AdobeGenP
LegalCopyright AdobeGenP
LegalTradeMarks AdobeGenP
Resource LangID English - United Kingdom

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2022-Sep-19 18:34:27
Version 0.0
SizeofData 1172
AddressOfRawData 0xdf000
PointerToRawData 0xdd800

TLS Callbacks

StartAddressOfRawData 0x1400df4b8
EndAddressOfRawData 0x1400df4c0
AddressOfIndex 0x1400eefc8
AddressOfCallbacks 0x1400b6208
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x100
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1400ea020

RICH Header

XOR Key 0xb847502b
Unmarked objects 0
241 (40116) 21
243 (40116) 156
242 (40116) 33
199 (41118) 1
C++ objects (VS 2015/2017 runtime 26706) 46
C objects (VS 2015/2017 runtime 26706) 17
ASM objects (VS 2015/2017 runtime 26706) 8
C objects (VS2008 SP1 build 30729) 8
135 (VS2008 SP1 build 30729) 1
Imports (VS2008 SP1 build 30729) 37
Total imports 557
C++ objects (POGO O) (27045) 80
ASM objects (27045) 1
Resource objects (27045) 1
151 1
Linker (27045) 1

Errors

[*] Warning: Yara callback received an unhandled message (6).