39679ee4de6993c82b73bcf8ab58d86b9551da860ef242f5d3c8ebf577bfbd77

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2023-Mar-03 17:53:48
Detected languages English - United States
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
ProgramID com.embarcadero.ezwHookpp
FileDescription ezwHookpp
ProductName ezwHookpp

Plugin Output

Info Interesting strings found in the binary: Contains domain names:
  • embarcadero.com
  • www.embarcadero.com
Suspicious The PE is possibly packed. Unusual section name found: .itext
Unusual section name found: .didata
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • FindWindowW
  • SwitchToThread
Code injection capabilities (PowerLoader):
  • GetWindowLongW
  • FindWindowW
Can access the registry:
  • RegSetValueExW
  • RegEnumKeyExW
  • RegEnumKeyW
  • RegLoadKeyW
  • RegDeleteKeyW
  • RegOpenKeyExW
  • RegQueryInfoKeyW
  • RegUnLoadKeyW
  • RegSaveKeyW
  • RegDeleteValueW
  • RegReplaceKeyW
  • RegFlushKey
  • RegEnumValueW
  • RegQueryValueExW
  • RegCloseKey
  • RegCreateKeyExW
  • RegRestoreKeyW
Possibly launches other programs:
  • ShellExecuteW
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Uses functions commonly found in keyloggers:
  • CallNextHookEx
  • MapVirtualKeyW
  • GetForegroundWindow
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Can take screenshots:
  • GetDC
  • GetDCEx
  • FindWindowW
  • BitBlt
  • CreateCompatibleDC
Reads the contents of the clipboard:
  • GetClipboardData
Info The PE's resources present abnormal characteristics. The binary may have been compiled on a machine in the UTC-6 timezone.
Info The PE is digitally signed. Signer: Softouch Development
Issuer: Sectigo Public Code Signing CA R36
Safe VirusTotal score: 0/72 (Scanned on 2025-06-09 01:05:35) All the AVs think this file is safe.

Hashes

MD5 76c6fa6bec0ecc08d33a2f2b7360f2c0
SHA1 a749c8eb4afa8f818baf12ed36d2dfa8ce9a36b5
SHA256 39679ee4de6993c82b73bcf8ab58d86b9551da860ef242f5d3c8ebf577bfbd77
SHA3 70df65c62b2c62aab99e2a4be51aaecd546d43528519f4aa263cc6dd7817101b
SSDeep 98304:NVafJ4ANErzqBFi4up9ZP1SEmlie/iXflijzJk:SMzig39+EmlCXf6
Imports Hash a0ac662802f2668cfba18a2a55caa638

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 11
TimeDateStamp 2023-Mar-03 17:53:48
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x608000
SizeOfInitializedData 0x32ea00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x006093D0 (Section: .itext)
BaseOfCode 0x1000
BaseOfData 0x60a000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x959000
SizeOfHeaders 0x400
Checksum 0x93cc9e
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 a54a51ec30949c4b0e05be72479da56f
SHA1 aa37d15f63d58e764ef33fcfccc188bbfcab01c8
SHA256 20991fd0c3ccae3154e3ea33cb2fcb4924cd152a17148f501ff7c049802725cb
SHA3 6405cae7e19c64aa38a23df9be298a41b00815157c66d8dd97745ac32a0e42e1
VirtualSize 0x6048e4
VirtualAddress 0x1000
SizeOfRawData 0x604a00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.52328

.itext

MD5 3b97b557d1e4cba321f99f9d7bb42ea5
SHA1 9db79ec84c8d1d16be390f1c7e729c6588c5ca75
SHA256 9a5e71c4bbcbc1a64c58d4b550a346d98402bd17a05fb6bae0e8fd023b80ebc7
SHA3 50c45b9100e4ad0c38b6182eb36f743da22a46aae3d8836e8b113016fa4af66b
VirtualSize 0x3538
VirtualAddress 0x606000
SizeOfRawData 0x3600
PointerToRawData 0x604e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.34854

.data

MD5 f267fd21a6a84502996a90c6b7107601
SHA1 18440352c691bc791239cf2f4822922b46c8d3b3
SHA256 79b14694ed92d643775e966118a9969f761544d7ca17e1a22b37bdb5edd37904
SHA3 0baee3b33ab9dde6ee8fe42daf66264432e5dd6109a75612231d7bc41db4f544
VirtualSize 0x1cda8
VirtualAddress 0x60a000
SizeOfRawData 0x1ce00
PointerToRawData 0x608400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.28178

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x1b304
VirtualAddress 0x627000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 85b5d759796461e38266b671a2aa9c4a
SHA1 d3f08720aa0b8e6a439f80bd9d60b3cfe0400828
SHA256 2ed201bb8e31a9c676aed5a229e0d8bb4d046f500490229b06dc729596c68753
SHA3 e1f0b3699f946e8d9c045a23fcf32516f76c46d8496db0f61007d67dc6aadc6b
VirtualSize 0x3a40
VirtualAddress 0x643000
SizeOfRawData 0x3c00
PointerToRawData 0x625200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.96685

.didata

MD5 763245772580961115b121821572f149
SHA1 30b99f7af1ac349bb821f252fa443410bdb05c72
SHA256 c3a0e024d714dc47ec2f6ba83b114774380a9f19148e6211e074f30af9069a42
SHA3 5b849453ac26002b5dd89ef94e57be8c056c86c8790f5296686fcc81c10400ec
VirtualSize 0x6ba6
VirtualAddress 0x647000
SizeOfRawData 0x6c00
PointerToRawData 0x628e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.89636

.edata

MD5 f01021e54a124c7de468efeaa4603ccf
SHA1 3219d2d81b8668a88991ca95800da89eaf01b51f
SHA256 611c14325560aadb6f1d88213f1aabc80695111d6d8ed1087ca9b230e449366d
SHA3 74d2d831ced93e275085b63dcb39a526f43f3895af4ac142699b9d22889dc6fd
VirtualSize 0x9e
VirtualAddress 0x64e000
SizeOfRawData 0x200
PointerToRawData 0x62fa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.95259

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x54
VirtualAddress 0x64f000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 cb9ab8ac01ea50647ebba27fdc681b42
SHA1 27b15db3e1095c894601a2d9de2b791a45290e61
SHA256 d8f850f441977d1114f3e618515a31d5beaea74ee16653abcb3183b84e8c9073
SHA3 751809d7ef1dfce2e814162392dca49b74216596ed0e0183521f656b4db4020e
VirtualSize 0x5d
VirtualAddress 0x650000
SizeOfRawData 0x200
PointerToRawData 0x62fc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.37962

.reloc

MD5 566aadc5cbc81b5c26e97c1fd127eaa7
SHA1 77493daa44285e6c913aa58f5efcb0c464719be1
SHA256 aedd136e1d926c0e1a07a63e0f44a98be9e5efc1c6b59b865cfb4094762c10d5
SHA3 7a1c2d96183ea68e9d7a01ad5faca1533dae0b9483ebc9cc763e55ec124b4fba
VirtualSize 0x8a6b8
VirtualAddress 0x651000
SizeOfRawData 0x8a800
PointerToRawData 0x62fe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.67971

.rsrc

MD5 c71bbe201d934ed653e456bac3854ff2
SHA1 159553899d61c09d7fdbbdfb6eb082d6e48c4aa9
SHA256 2ac31517b93353d91381f833e1f617720867d7719977b715ed6a81fa2751cfc8
SHA3 b674bac4383637c54f7588595fa3ec2ac4edb9cac8633652fd2fee349bd6f448
VirtualSize 0x27c800
VirtualAddress 0x6dc000
SizeOfRawData 0x27c800
PointerToRawData 0x6ba600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.45197

Imports

winmm.dll timeGetTime
d3d9.dll Direct3DCreate9
winspool.drv DocumentPropertiesW
ClosePrinter
DeviceCapabilitiesW
OpenPrinterW
GetPrinterW
SetPrinterW
GetDefaultPrinterW
EnumPrintersW
comdlg32.dll PageSetupDlgW
GetSaveFileNameW
GetOpenFileNameW
PrintDlgW
comctl32.dll ImageList_GetImageInfo
FlatSB_SetScrollInfo
InitCommonControls
ImageList_DragMove
ImageList_Destroy
_TrackMouseEvent
ImageList_DragShowNolock
ImageList_Add
FlatSB_SetScrollProp
ImageList_GetDragImage
ImageList_Create
ImageList_EndDrag
ImageList_DrawEx
ImageList_SetImageCount
FlatSB_GetScrollPos
FlatSB_SetScrollPos
InitializeFlatSB
ImageList_Copy
FlatSB_GetScrollInfo
ImageList_Write
ImageList_DrawIndirect
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_BeginDrag
ImageList_GetIcon
ImageList_Replace
ImageList_GetImageCount
ImageList_DragEnter
ImageList_GetIconSize
ImageList_SetIconSize
ImageList_Read
ImageList_DragLeave
ImageList_LoadImageW
ImageList_Draw
ImageList_Remove
ImageList_ReplaceIcon
ImageList_SetOverlayImage
shell32.dll DragQueryFileW
Shell_NotifyIconW
SHAppBarMessage
ShellExecuteW
user32.dll CopyImage
SetMenuItemInfoW
GetMenuItemInfoW
DefFrameProcW
GetDlgCtrlID
GetUpdateRgn
FrameRect
RegisterWindowMessageW
GetMenuStringW
FillRect
SendMessageA
IsClipboardFormatAvailable
EnumWindows
ShowOwnedPopups
GetClassInfoW
GetScrollRange
SetActiveWindow
GetActiveWindow
IsMenu
DrawEdge
GetKeyboardLayoutList
LoadBitmapW
EnumChildWindows
UnhookWindowsHookEx
SetCapture
GetCapture
ShowCaret
CreatePopupMenu
GetMenuItemID
CharLowerBuffW
PostMessageW
SetWindowLongW
IsZoomed
SetParent
DrawMenuBar
GetClientRect
IsChild
IsIconic
CallNextHookEx
ShowWindow
GetWindowTextW
SetForegroundWindow
GetWindowTextLengthW
IsDialogMessageW
DestroyWindow
RegisterClassW
EndMenu
CharNextW
GetFocus
GetDC
SetFocus
ReleaseDC
GetClassLongW
SetScrollRange
DrawTextW
PeekMessageA
MessageBeep
SetClassLongW
RemovePropW
GetSubMenu
DestroyIcon
IsWindowVisible
DispatchMessageA
UnregisterClassW
GetTopWindow
SendMessageW
GetMessageTime
SendMessageTimeoutW
LoadStringW
CreateMenu
CharLowerW
SetWindowRgn
SetWindowPos
GetMenuItemCount
GetSysColorBrush
GetWindowDC
DrawTextExW
GetScrollInfo
SetWindowTextW
GetMessageExtraInfo
GetSysColor
EnableScrollBar
TrackPopupMenu
DrawIconEx
GetClassNameW
GetMessagePos
GetIconInfo
SetScrollInfo
GetKeyNameTextW
GetDesktopWindow
SetCursorPos
GetCursorPos
SetMenu
GetMenuState
GetMenu
SetRect
GetKeyState
ValidateRect
GetCursor
KillTimer
WaitMessage
TranslateMDISysAccel
GetWindowPlacement
CreateIconIndirect
CreateWindowExW
GetDCEx
PeekMessageW
MonitorFromWindow
GetUpdateRect
SetTimer
WindowFromPoint
BeginPaint
RegisterClipboardFormatW
MapVirtualKeyW
IsWindowUnicode
DispatchMessageW
CreateAcceleratorTableW
DefMDIChildProcW
GetSystemMenu
SetScrollPos
GetScrollPos
DrawFocusRect
ReleaseCapture
LoadCursorW
ScrollWindow
GetLastActivePopup
MessageBoxIndirectW
GetSystemMetrics
CharUpperBuffW
SetClipboardData
GetClipboardData
ClientToScreen
SetWindowPlacement
GetMonitorInfoW
CheckMenuItem
CharUpperW
DefWindowProcW
GetForegroundWindow
EnableWindow
GetWindowThreadProcessId
RedrawWindow
EndPaint
MsgWaitForMultipleObjectsEx
TrackMouseEvent
LoadKeyboardLayoutW
ActivateKeyboardLayout
GetParent
MonitorFromRect
InsertMenuItemW
GetPropW
MessageBoxW
SetPropW
UpdateWindow
MsgWaitForMultipleObjects
DestroyMenu
SetWindowsHookExW
EmptyClipboard
AdjustWindowRectEx
IsWindow
DrawIcon
EnumThreadWindows
InvalidateRect
GetKeyboardState
ScreenToClient
DrawFrameControl
SetCursor
CreateIcon
RemoveMenu
AppendMenuW
GetKeyboardLayoutNameW
OpenClipboard
TranslateMessage
MapWindowPoints
EnumDisplayMonitors
CallWindowProcW
CloseClipboard
DestroyCursor
UpdateLayeredWindow
CopyIcon
PostQuitMessage
ShowScrollBar
EnableMenuItem
HideCaret
WINNLSEnableIME
FindWindowExW
MonitorFromPoint
LoadIconW
SystemParametersInfoW
GetWindow
GetWindowRect
GetWindowLongW
InsertMenuW
IsWindowEnabled
IsDialogMessageA
FindWindowW
GetKeyboardLayout
DeleteMenu
version.dll GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
oleaut32.dll SafeArrayPutElement
GetErrorInfo
VariantInit
VariantClear
SysFreeString
SafeArrayAccessData
SysReAllocStringLen
SafeArrayCreate
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetUBound
SafeArrayGetLBound
VariantChangeType
VariantCopyInd
kernel32 InterlockedPopEntrySList
QueryDepthSList
InterlockedFlushSList
InitializeSListHead
InterlockedPushEntrySList
advapi32.dll RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegEnumKeyW
RegLoadKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegEnumValueW
RegQueryValueExW
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExW
SetSecurityDescriptorDacl
RegRestoreKeyW
msvcrt.dll isupper
isalpha
isalnum
toupper
memchr
memcmp
memcpy
memset
isprint
isspace
iscntrl
isxdigit
ispunct
isgraph
islower
tolower
kernel32.dll GetACP
LocalFree
CloseHandle
GetCurrentProcessId
SizeofResource
VirtualProtect
TerminateThread
QueryPerformanceFrequency
IsDebuggerPresent
FlushInstructionCache
GetFullPathNameW
VirtualFree
ExitProcess
HeapAlloc
GetCPInfoExW
GlobalSize
GetLongPathNameW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
DisconnectNamedPipe
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
ReadFile
GetUserDefaultLCID
GetLastError
GetModuleFileNameW
SetLastError
GlobalAlloc
GlobalUnlock
FindResourceW
OpenMutexW
CreateThread
CompareStringW
CreateMutexW
LoadLibraryA
ResetEvent
MulDiv
FreeResource
GetVersion
RaiseException
GlobalAddAtomW
FormatMessageW
SwitchToThread
GetExitCodeThread
OutputDebugStringW
GetCurrentThread
ExpandEnvironmentStringsW
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
GlobalFindAtomW
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
ReleaseMutex
FlushFileBuffers
LoadResource
SuspendThread
GetTickCount
WaitForMultipleObjects
GetStartupInfoW
GlobalDeleteAtom
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
GlobalLock
VirtualAlloc
GetTempPathW
GetSystemInfo
GetCommandLineW
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
lstrlenW
QueryPerformanceCounter
SetEndOfFile
InitializeCriticalSectionAndSpinCount
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
CreateMutexA
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
EnumResourceNamesW
GetSystemDirectoryW
DeleteFileW
ConnectNamedPipe
GetLocalTime
WaitForSingleObject
WriteFile
CreateNamedPipeW
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
WaitForMultipleObjectsEx
GetThreadLocale
SetThreadLocale
ole32.dll RevokeDragDrop
CoCreateInstance
CoUninitialize
ReleaseStgMedium
RegisterDragDrop
IsEqualGUID
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
OleRegEnumFormatEtc
CoGetClassObject
CoInitialize
CoTaskMemFree
OleDraw
CoTaskMemAlloc
DoDragDrop
gdi32.dll Pie
SetBkMode
CreateCompatibleBitmap
BeginPath
GetEnhMetaFileHeader
RectVisible
AngleArc
SetAbortProc
SetTextColor
StretchBlt
GetCharABCWidthsFloatW
RoundRect
RestoreDC
SetRectRgn
GetTextMetricsW
GetWindowOrgEx
CreatePalette
PolyBezierTo
CreateICW
CreateDCW
GetStockObject
CreateSolidBrush
Polygon
MoveToEx
PlayEnhMetaFile
Ellipse
StartPage
GetBitmapBits
StartDocW
AbortDoc
GetSystemPaletteEntries
GetEnhMetaFileBits
GetRegionData
GetEnhMetaFilePaletteEntries
CreatePenIndirect
SetMapMode
CreateFontIndirectW
PolyBezier
EndDoc
GetObjectW
GetWinMetaFileBits
SetROP2
GetEnhMetaFileDescriptionW
ArcTo
Arc
TextOutW
SelectPalette
ExcludeClipRect
MaskBlt
SetWindowOrgEx
EndPath
EndPage
DeleteEnhMetaFile
Chord
SetDIBits
SetViewportOrgEx
CreateRectRgn
RealizePalette
SetDIBColorTable
GetDIBColorTable
CreateFontW
CreateBrushIndirect
PatBlt
SetEnhMetaFileBits
Rectangle
SaveDC
DeleteDC
BitBlt
FrameRgn
GetDeviceCaps
GetTextExtentPoint32W
GetClipBox
IntersectClipRect
Polyline
CreateBitmap
CombineRgn
SetWinMetaFileBits
GetStretchBltMode
CreateDIBitmap
SetStretchBltMode
GetDIBits
CreateDIBSection
ExtCreateRegion
LineTo
GetRgnBox
EnumFontsW
CreateHalftonePalette
SelectObject
DeleteObject
ExtFloodFill
UnrealizeObject
CopyEnhMetaFileW
SetBkColor
CreateCompatibleDC
GetObjectA
GetBrushOrgEx
GetCurrentPositionEx
SetTextAlign
GetTextExtentPointW
ExtTextOutW
SetBrushOrgEx
GetPixel
GdiFlush
SetPixel
EnumFontFamiliesExW
StretchDIBits
GetPath
GetPaletteEntries
kernel32.dll (delay-loaded) GetACP
LocalFree
CloseHandle
GetCurrentProcessId
SizeofResource
VirtualProtect
TerminateThread
QueryPerformanceFrequency
IsDebuggerPresent
FlushInstructionCache
GetFullPathNameW
VirtualFree
ExitProcess
HeapAlloc
GetCPInfoExW
GlobalSize
GetLongPathNameW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
DisconnectNamedPipe
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
ReadFile
GetUserDefaultLCID
GetLastError
GetModuleFileNameW
SetLastError
GlobalAlloc
GlobalUnlock
FindResourceW
OpenMutexW
CreateThread
CompareStringW
CreateMutexW
LoadLibraryA
ResetEvent
MulDiv
FreeResource
GetVersion
RaiseException
GlobalAddAtomW
FormatMessageW
SwitchToThread
GetExitCodeThread
OutputDebugStringW
GetCurrentThread
ExpandEnvironmentStringsW
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
GlobalFindAtomW
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
ReleaseMutex
FlushFileBuffers
LoadResource
SuspendThread
GetTickCount
WaitForMultipleObjects
GetStartupInfoW
GlobalDeleteAtom
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
GlobalLock
VirtualAlloc
GetTempPathW
GetSystemInfo
GetCommandLineW
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
lstrlenW
QueryPerformanceCounter
SetEndOfFile
InitializeCriticalSectionAndSpinCount
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
CreateMutexA
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
EnumResourceNamesW
GetSystemDirectoryW
DeleteFileW
ConnectNamedPipe
GetLocalTime
WaitForSingleObject
WriteFile
CreateNamedPipeW
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
WaitForMultipleObjectsEx
GetThreadLocale
SetThreadLocale

Delayed Imports

Attributes 0x1
Name kernel32.dll
ModuleHandle 0x647260
DelayImportAddressTable 0x6472ac
DelayImportNameTable 0x647d24
BoundDelayImportTable 0x64879c
UnloadDelayImportTable 0x6491cc
TimeStamp 1970-Jan-01 00:00:00

dbkFCallWrapperAddr

Ordinal 1
Address 0x62a63c

__dbk_fcall_wrapper

Ordinal 2
Address 0x1194c

TMethodImplementationIntercept

Ordinal 3
Address 0x79ac4

1

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.80231
MD5 2e87b3c111e3073a841775c1f8ec5a90
SHA1 20292304fa2ef1bfdc4a1000e90a1c16d4765a96
SHA256 ce19ace18e87b572e6912306776226af5b8e63959c61cde70a8ff05b3bbdcc41
SHA3 9527f09e739c2064835800a7e5c317cb422bdd7237f00fca079a1c62f58a2612

2

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.80231
MD5 2e87b3c111e3073a841775c1f8ec5a90
SHA1 20292304fa2ef1bfdc4a1000e90a1c16d4765a96
SHA256 ce19ace18e87b572e6912306776226af5b8e63959c61cde70a8ff05b3bbdcc41
SHA3 9527f09e739c2064835800a7e5c317cb422bdd7237f00fca079a1c62f58a2612

3

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.00046
MD5 a04c3c368cb37c07bd5f63e7e6841ebd
SHA1 699300bceaa1256818c43fecfc8cad93a59156b2
SHA256 ee1c9c194199c320c893b367602ccc7ee7270bd4395d029f727e097634f47f8c
SHA3 58722e3138aad1382e284c1605ecd665ced536de4906749ac8d6e11252cc9558

4

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.56318
MD5 9929115b21c2c59348058d4190392e75
SHA1 626fba1825d572ea441d36363307c9935de3c565
SHA256 9d9edf87ca203ecc60b246cc783d54218dd0ce77d3a025d0bafc580995a4abd8
SHA3 fea156e872544252c625076a6bf3baa733ee5b3d5399716e156734af7a841369

5

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.6949
MD5 f321ad13d1c3f35a05d67773b4bc27d6
SHA1 30aded8525417e2531d5eb88bf2f868172945baa
SHA256 99676c52310db365580965ea646ece86c62951bfd97ec0aae9f738a202a90593
SHA3 04c839da98a8c50a36697076af5bc6d527560a69153b2f718f065908fd4fe3ad

6

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.62527
MD5 5ca217e52bdc6f23b43c7b6a23171e6e
SHA1 d99dc22ec1b655a42c475431cc3259742d0957a4
SHA256 11726dcf1eebe23a1df5eb0ee2af39196b702eddd69083d646e4475335130b28
SHA3 b358d8a5b0f400dd2671956ec45486ae1035556837b5289df5f418fe69348b3f

7

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.91604
MD5 6be7031995bb891cb8a787b9052f6069
SHA1 487eb59fd083cf4df02ce59d9b079755077ba1b5
SHA256 6f938aab0a03120de4ef8b27aff6ba5146226c92a056a6f04e5ec8d513ce5f9d
SHA3 0f1c6c0378a3646c9fbf3678bbeeccf929d32192f02d1ea9d6ba0be5c769e6ab

8

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.00046
MD5 a04c3c368cb37c07bd5f63e7e6841ebd
SHA1 699300bceaa1256818c43fecfc8cad93a59156b2
SHA256 ee1c9c194199c320c893b367602ccc7ee7270bd4395d029f727e097634f47f8c
SHA3 58722e3138aad1382e284c1605ecd665ced536de4906749ac8d6e11252cc9558

9

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.62527
MD5 5ca217e52bdc6f23b43c7b6a23171e6e
SHA1 d99dc22ec1b655a42c475431cc3259742d0957a4
SHA256 11726dcf1eebe23a1df5eb0ee2af39196b702eddd69083d646e4475335130b28
SHA3 b358d8a5b0f400dd2671956ec45486ae1035556837b5289df5f418fe69348b3f

10

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.91604
MD5 6be7031995bb891cb8a787b9052f6069
SHA1 487eb59fd083cf4df02ce59d9b079755077ba1b5
SHA256 6f938aab0a03120de4ef8b27aff6ba5146226c92a056a6f04e5ec8d513ce5f9d
SHA3 0f1c6c0378a3646c9fbf3678bbeeccf929d32192f02d1ea9d6ba0be5c769e6ab

11

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.6633
MD5 ff4e5862f26ea666373e5fab2bddfb11
SHA1 cfa13c0ab30f1bbd566900dee3631902f9b6451c
SHA256 b8e6fc93d423931acbddae3c27dd3c4eb2a394005d746951a971cb700e0ee510
SHA3 91dae12a9f43c5443e0661091a336f882fa1482f75fa9a57c9298d1d70c8ae69

1 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.11762
MD5 0a19c58faa1b4d4d3abba0c44c0ba0a0
SHA1 433e3684595bd01ee5b7af0e5f9e7cec0a1a2bbc
SHA256 8594348b0f4f96c0a7867fadfcdd643c5bc81ee1660d66e5099cc122e54b9a34
SHA3 5bfa7b164590a2a95b8c09b9617a703c52c301411f6552892e4e87b210a3a035

2 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xbd9
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 7.60281
Detected Filetype PNG graphic file
MD5 442142dc2b0917799b6b27cc2a9a6cef
SHA1 d7b11f836b8fc39422eba8717122c280c16dc508
SHA256 3d1d16e28a21d1f9fdf93a97775c87f85438c9a0644f229d5ef07d2b23bd8bd0
SHA3 0fd57beb093b283283f5a96b2bf661e59f9c227e84063f86c2e3bf22c06c2799

4062

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x11c
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.22271
MD5 ef0530f10514aa25710abd054ed5e0ef
SHA1 ff701c207da48e3c86e7f5e9343190761b7ec066
SHA256 756df6ec0027ed514fdfd3e3a66efe6ae0bd89683b021929365649cca427f998
SHA3 1cee0152497e77d88826c9eb44bf2bda3650033c183ab2d116d5225d894738af

4063

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x7d4
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.23096
MD5 a98ff27a70130695c6b6bbceb7631fe3
SHA1 19faadaa5db3604c7ab6833c9f4416a3c1a85ea4
SHA256 9e3a1fbb6e93c091ceec082bf09c60ce5cb2e4c3b9c23da3438318e8a17b478b
SHA3 5d3471cfbfd298640eadb0a9851f62377ea00973ce226c163a8a27925327cb73

4064

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x304
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.34215
MD5 9fe32f76c3af92bc824538462e61a45e
SHA1 eab4166efb6432979922e88026581cb6de892b45
SHA256 89bd5c8a0638b6e6456555416c1aea95c8c6d308ae74b10b8d144f0acd3ccfd7
SHA3 ad76f8462d8450599a4f807d5b2b82932ed4d88b07014c8b01d39f5ecb006fb0

4065

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x5cc
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.29879
MD5 c355cd43af3c4a34174910f84f1f217d
SHA1 29884f57f2f86abcefa4c53a762c28bbeddea80d
SHA256 908bbb5672185272ec5d531cd626ad9d4c595b045371f37ec9b1b0b0d4af4af3
SHA3 5de779f71c2c0fe913fd592952cb6d6da87e84fe02d253352e5ad63abc10c4f6

4066

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x430
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.36575
MD5 867013dd5ebd51cfa137fc7954fe9991
SHA1 238ca0eef76457d26d1797741e5ebbaf4249a726
SHA256 914cad6c386655e4ed61a4b0f6355d464e4b444d5df44cc17e1d06ee62b71f08
SHA3 ad58bb378b42b5de8ca535f641eca8825f82b82ad02ffc97363a01df6e1f2572

4067

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x26c
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.37365
MD5 e99f836fa4147c9194ec69ef6bc77af8
SHA1 f908e6db9f4874a3b7f38764baf13c75d5ba4264
SHA256 d4612351040325141519da7a662f0cfc2ed5aba460e8e1691b836dc3f862fe88
SHA3 5a1964faef8f8ecd7b0c9179953fb8953415c0daeb9b6e12035eda7676b4d8a1

4068

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x128
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.43636
MD5 1d9f85589df9af0bc854702b3abd8feb
SHA1 fac458c939e2ea335901cb1c79c8366149b5b965
SHA256 73869d886fe0a161aded1dd0ab7a21e3919c11a08045f8cc52ef6ae8230a263b
SHA3 23ee6ea258baa21833a6b71b38d982b11c6bde19d68fca62df585061ca2864b7

4069

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x39c
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.35247
MD5 7855b262100a21656cc7517df36a54aa
SHA1 4415c23081fe7ec1a146c6ef562aeae50e67f82d
SHA256 0aecc0b10528c6a1a7ca192fcafb3e5b0d63c9d09921385a76538da584f444cd
SHA3 c971963e68e3ed68d50b64725e7a8e1f586c661f5018f8735a98c965ba55ee25

4070

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x4dc
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.34251
MD5 c42fea8e04264ba0870737fa62e9f443
SHA1 0648f6ea1cd598c05eb297363ece06e2affa7d76
SHA256 159f2f24e6cc390de3acd1beaa098f1d2f9cbcf0676d67429b8f95117b180d9a
SHA3 83ae43d6f05e2f1cbafbef26c5590879bd2a394ef7680a8c9e6091701108af7b

4071

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x5a4
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.27253
MD5 a3de5eb4555fe1a0df956f9659b34a4a
SHA1 c00e8ed842525f423a601491855cd9ad2959c8eb
SHA256 04c90078de498f41102832c757cfb9bc613015f9e5b36d15fc766a001cae87ad
SHA3 7ed011eef80d55e7e072783100feff04a2c9c297f4db11b502a2308701e39ac4

4072

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x500
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.22532
MD5 86429e5ef12f66e665ef27d498d0b9b9
SHA1 484f0f528fb789d7fe83fc79b3c17c1258866801
SHA256 7ce33898e5cf367cf7473963103a213e323858fe913c08db8b95c244d9ae7883
SHA3 347f29fcecb31c4cc32e289d554cacf992a174ee2bc78bb728721e61b4b88263

4073

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x398
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.18862
MD5 3dec8a8fc2112f1b522c27b633a14b99
SHA1 3e815ae95cbd040ffadb8feb2dfb33fc08e0184f
SHA256 6161a82da2a07fee6b5d039b9efda45b96e9ce4f8f0c85aa1e47a3dbd4c5b562
SHA3 a2d11d01cd078c9c4398fcc557bfc42338e88b72bee7407a09b636ea2ade6a07

4074

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3a0
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.34358
MD5 6c47d61433d5fd198db81366487d3f29
SHA1 4d99884ca3459a9558e7f5fc277db069ec05552a
SHA256 48c05b6abf5a87dd472ec4e9174458a4f5066be0e56c88eb24bc4a9bf4385075
SHA3 158d95216718e5e98a978b9b2f506a33bf3224c7cfe49ff8ef13a59debcd0930

4075

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x1d8
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.34045
MD5 be1f91964f6ac0df9898aa78a663831c
SHA1 4028cb71d2106fdff1cd96fd98693a9f47d7e43a
SHA256 c65bd3857edba9d1236c49ce34c622a38ff89d6f5beb155899b78234af8b2c15
SHA3 cf3f0014e60f2a797fb00e5a164b206b96489c37da28e165b9b13d0e85d72a49

4076

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xcc
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.44749
MD5 8f4c350205eeb5123c7d1677adcd8122
SHA1 e770c0fe1c87b940391f133e81d60d5dcddd4cda
SHA256 61cd7802614e0f37f75ac4683ff6cc07a6307c0731f514ff63d64968a34c1b0e
SHA3 c898abf8dd3cb4ffcd79ef008c3d38dc31a30ec36d78fb9d7397cc9cd5408451

4077

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x1a8
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.3765
MD5 a6b9e308fff2589fb5cd161941fe48c5
SHA1 8a0d1b1fc5fb145732300aa624a84b7eae6e2e4b
SHA256 3c79cc4e86fe7af2344f1d88c00ebcb79a2e64a20ce643d410b35f497027d52f
SHA3 b2a92bd36158d00e7f46f4dd63978e85a7729a739f4432ffbc649a7fe847f120

4078

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x410
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.27727
MD5 34a751b213dbdd62ac4b21ff2dad01c0
SHA1 8f186b843a8028143ac56022a918267df311cbde
SHA256 3523758aa0107d6b267cccaa9bad1eee165620e1b09a3c9eddfc01ba5b22e319
SHA3 179a27cfabefa40f4232b574e96ef62bbef20dff0400b24371ad3b6c8fb63509

4079

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3f4
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.34031
MD5 12bf6fad7db49215ff9ceb0d8b5d92c4
SHA1 850d039fd32245a018e5c2007839089084f92ecb
SHA256 9f7d944176cb4118eeb7e3ab3dd1142e4ba5c0e7d0fea3ff40c1346796288eb0
SHA3 991b533956b350c994f92c0828247bc4665ab4a3d78b98bdbd52ba6948e27e90

4080

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3e8
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.29563
MD5 1fd9f3e1b3a48f7a923476c1acc3caeb
SHA1 fd61feeddb4d1c2862ded470b7b21c425df3e5bc
SHA256 347930a90f9c373b5a282ba85e2a86df1cf469e906fbd33b0b44d881a0e930ce
SHA3 be6cb07fa7ebd3bf7b914bc1bad8fad86662a0491baf2f8e746074e2a8804fe4

4081

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x458
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.28861
MD5 4192c6f8afc812af087f4dc6909f660e
SHA1 73456deb5741da13b9725e86bae04f67f647a7f0
SHA256 dbbef4e833bc9e44f62d247ab709f026d5893fffdd70f8d8c86f47e656a8c3ff
SHA3 e5938dd1cd2a187118e5967a6117719227fdfc2df97f8adabf63db1acc59737e

4082

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x274
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.40617
MD5 5afade7d8d8238c5372cc280e614d7b9
SHA1 369cff2a9e285915dd8cbb10ef103589e80ccf70
SHA256 965566f5d1a67892ca692e12cdff9e29b59a4586c5866a7d34405dffcf10fb76
SHA3 94534db654d1ca6d871d759398af704e8f2ab3c3d1ed3a963e9043eb0f43a115

4083

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x42c
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.36791
MD5 48de3f435bf872b54a26503404f7475d
SHA1 113fae8b6774a392751509000be0ed8ad6b216b2
SHA256 5b7c9a1fa8e2017f2fea704ed420c8fa8f17cc8db03ee1004b77dd41c41a8952
SHA3 d6ef759c47d37e0cd6ad7ccd3dc25f038dd0aa56e3c6d62fa62a65bfb4ff1482

4084

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x6a0
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.31419
MD5 55ff5325c280002187b89b05a818dd48
SHA1 f7ad1ae800c0770f5350df21891b16b8db8dfeb0
SHA256 43bd027130ea711393fd83f6d3193577e3c862fb47a66279db12b476afcb5089
SHA3 9e2977fde3b08fec9a00ade6a9539116fce7a0a2accf5052b63e10a3e745fa92

4085

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x460
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.29569
MD5 2360842d158bdc59d01b95f58a317e6f
SHA1 c5ea86b61b15c6133bb7d8fc9604c444e215a234
SHA256 d684032fd33cfbff4cb93c3051fc0afa024eeaf3276e6c2af71a73f3f5514d42
SHA3 b734bae7a440db4d3d87cbf633406a3d14a97a38afa88faebf923e644d7d559d

4086

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3a0
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.2153
MD5 45d0c74a879200f41a040fb16f25f85b
SHA1 fb7664de81a05527c4b75aaf0a81848852678f7a
SHA256 0e9e82e7968116b76cba057708f054bced7db5be489f311b9d3bde1572af2023
SHA3 3494a040e9eff3badac1744d61031cf3f20f880374e08938c3901430930e9725

4087

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x340
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.36664
MD5 9b7494c6f96ea0f6f980f6fc796f9b57
SHA1 1906b3826b69b7a1ce74e6f63b1d5068bc3e88b5
SHA256 4cf78780c21da3c3cc5d22d05fee20a31fc256c2c44c76fff5259833ad85f499
SHA3 e2e278ea0faddbd51873dc09c422873ff6a263b988601322e6a74624eac20b9a

4088

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3d0
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.27228
MD5 a12f5c129839584d9ddab91c79cf0584
SHA1 2f4bbc1c20eadf352bc8632ff7e1114c452f94cb
SHA256 3aee03a223b7fc985815d8058bdd6cfad3a377cb0fad77ca09c8223929eca1f2
SHA3 10cb16fe0664c188490813c96ef123807c6eb4ba57ea627077987a90bf95558e

4089

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x400
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.34344
MD5 fe3def5e869d5a963937e114337ee4c3
SHA1 9407ec55e2ab24527d35669461f0af8ef1eda108
SHA256 1fa0ecac35271f80628691d8b2f0661e0cff2c9c248d259c15e749ea8d4079dd
SHA3 c735d80f9ef208fe68a1af2b0875890491b2020d18cbf6b212539407beb4950a

4090

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xe8
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.23392
MD5 c82c5bd41f34467617721afba76f3941
SHA1 5a9d07eb437d2bd3defbbb25216eb000b19ee64e
SHA256 fe86f912026ade5d1862e4f3e706c6ce1cf2ce1a41371d9ae5c9e1e9a8ee2a28
SHA3 a761387a82620c650e42951341e00bb51657ec8fa21650a882b8af728c95f357

4091

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xc4
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.34269
MD5 62810907e7b23a396bd760ac66e05fff
SHA1 770c9eaee9795b7a88330d03f4237ea99fff17c1
SHA256 125ebf3d2ac46fce44b67cf20f794c2e00469b914797b7f0f4a4493ffee6f032
SHA3 9db19dd09d08b97172a4dba0186da341ed05b6d21741f42f88c0a4c70f44ef6e

4092

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x268
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.36509
MD5 28a4fd939e665abf56c6c90b82565581
SHA1 b38b26657b48bf4810da231f748fd331ef95335a
SHA256 a0cb00cfad7518f622b59dc841113ce2670d90810062a7548179e940b4e551b3
SHA3 a28d062d2b072c1f0199853f0ee5e4cbecc47e79940ff0ab18c9d0004c84f4ae

4093

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x434
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.32447
MD5 68303e64e30781029563b91abf90fcc5
SHA1 9315ab33dfb5e998e8b250b6d98601e120eb29b0
SHA256 509dadc9bfcae7562d3675bfa84145214b77c7c395f3b85b47c020345fabf504
SHA3 6d720919e3098b992279522a2cadc8970921c884562cddf6ddb8dd78ce867c5d

4094

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x354
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.32158
MD5 e5d7fa9ad470b861f37389212b280652
SHA1 8ef24d1738a3782256b3b409332ee9ab0d8c4bdf
SHA256 82880e961d655ff3b4e51c22332c5103ccbc911638515c36fcf0779f8412771d
SHA3 2c23efe439936f9d8955f820c73a14e704b7e595df9de9fb2772122254f773c0

4095

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2dc
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.30273
MD5 2296ca841f813b1d0507e8b5e92dd278
SHA1 8755bfe02084305bae93d96096b1c30ae9bc9660
SHA256 ec29aad9abf12a64725105f7b9bf251e5a4d52d7c6a0a6d233767fb86b2f50af
SHA3 8996c3c547fcf7ef441735886e550c57fbc94c7b68e8fb47c32399ac3b8e4b5b

4096

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x340
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.23988
MD5 9eea977c338a703e55d8f056766abcfd
SHA1 2a47c92aa13aab0637cc84396cae7e37d4a7020a
SHA256 64819818351a98ec67813c9126096d35134c2f6cec89bfc80845f54f54f87bdf
SHA3 9536162f5277ba9594a582ab92b8ec890b840bb57e530ccbcc6baf6699cdd1fa

CLOUDS

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x627e
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 7.95047
Detected Filetype JPEG graphic file
MD5 a9a76e657c68bbe61b0667afc071f558
SHA1 432306f9fbfe2d950122a5bbb4437dee603a7af8
SHA256 7d48ed9d28f88cb99894f602ba05dc847d78c54094c7add1247c9d1b20136387
SHA3 a24864a546abf0bfcbb2d57e38cb7dcf0824d309aa7327674960acbc4f27b2e9

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x10
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 4
MD5 a40263c75fde7440b1086b7da9c51fc2
SHA1 139a84f87110fb5cb16a386adade21f30cae98b0
SHA256 e7dbe99baa5c1045cdf7004edb037018b2e0f639a5edcf800ec4514d5c8e35b5
SHA3 d3a734fa7d36868d301f9569de92e1bfc551e4b5cf6d7c59eace8d0a554093c0

MSG_ERROR

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x148b
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 7.93139
Detected Filetype PNG graphic file
MD5 50ea148a8b3f8e6e0bcf6b37918f4a93
SHA1 4d4a0a69e7f3f1a234cf4edcf3a897e18531b07e
SHA256 e74432afd4c7fe4cfb0cf8425ae298fcf425e0f0437510bde8546dbd02da0a2d
SHA3 de40febb93ab240fba58daff4f662e8f6889974a0fbadb23d2009c6efa445253

MSG_INFO

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x111e
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 7.90721
Detected Filetype PNG graphic file
MD5 51ffac6dde5a49e226a5435dc08656a0
SHA1 2d4a625ab8c1c45ed5f0e2a4e4138077d5ee89e6
SHA256 25e3ec43b207e22a0ee7701b9525975043ec2817e492dd07eb40306b944374c4
SHA3 becc7f28397fc80e9d96cdd13bb0a732ea8935cbde51c448e367e6bdbcbf464e

MSG_WARNING

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd8c
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 7.89203
Detected Filetype PNG graphic file
MD5 481232c3ddd70cc57011d3d8ed8191ca
SHA1 8722e588f04dab44a4ec94e248d74d058f269220
SHA256 636f368c9f42323b69cdf2463823eadd363e91df7f37a9d0eb863708a7f3fb83
SHA3 1efc85d96c9733bb8129189eb537e3c4658563f0336bb33eba34707378eb9205

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x123c
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 5.36874
MD5 2ca441d3cbf4c5f32bd9c53c06edbff3
SHA1 7ccc617c403dec315519cf32595d2141442e6142
SHA256 d91e6bc04f76c5f9685bfe893b50531ad956594d9484ed1ab4a5171ec0abdaa7
SHA3 bb5d6c0b9ba0353b80d9cfcd3a363a9812aa34ed4cdf13b33a0c37fc5459ea2f

PLATFORMTARGETS

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x2
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 1
MD5 598f4fe64aefab8f00bcbea4c9239abf
SHA1 688934845f22049cb14668832efa33d45013b6b9
SHA256 9b4fb24edd6d1d8830e272398263cdbf026b97392cc35387b991dc0248a628f9
SHA3 2951e8c89ecc8e8aa730f646caa10afd48f0be1353aaf5cc35815497dc6ba0db

TFORMEASYWORSHIPHOOKPP

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x172
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 5.41899
MD5 2793fd28576b94530a6b0b7c9582be22
SHA1 fb4093511b267c6027b46f028055cc2c1b3f17e0
SHA256 3dbbc06766c38c6505adcf1c9da01e8957f779ef8578855af204f475fbf818a0
SHA3 6a5d437884a2429a4e5af5ad15b1aae8aa615f3b1d05eaf0094f6ff4790fea00

WIN10STYLE

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd7a5c
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 6.56638
MD5 e80a57188cf30fb3ee13f96cc8b7ab12
SHA1 f7ee6ee2d72eecd3c1364fb97d4aa757b8493fbb
SHA256 c759f89d0cd33c0c8fd7af5be7949ba7b568c2936dd390facaf178d5643b6bca
SHA3 889464187c35f74083a5bff218999be0d18ad38d3775f2d3ff7a8a2c7e09302e

WIN7STYLE

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xb5ff4
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 6.15771
MD5 fd50d6167f86eabae3d13d14d3595081
SHA1 98464d8659df6f7a6c9e7a2b2881e4be8ed734d4
SHA256 a43fe4b9d41b9209f5690e8094ff56ec34b07900a4ad86d555530e6490762f56
SHA3 a953d9018d07eab0fbce0dff0cdfb41eea05058c23608e7f7f6a5adfac1188fb

WIN8STYLE

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd5583
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 6.55249
MD5 afbe30476bae1b1af0847d9b069ec19d
SHA1 ebbbd07bcc3e2e6ffe87a90ebae3bf82f30de31a
SHA256 d3a0718d135504d46669f2cdb5eacce582ce9c98bc09e48131ab2bec4800201f
SHA3 a6f4cd04774f62f06b117302da31ba8d771d3b7eabb0ff9768a06deaef55788b

32755

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 1.83876
Detected Filetype Cursor file
MD5 a2baa01ccdea3190e4998a54dbc202a4
SHA1 e8217df98038141ab4e449cb979b1c3bbea12da3
SHA256 c53efa8085835ba129c1909beaff8a67b45f50837707f22dfff0f24d8cd26710
SHA3 8874564c406835306368adf5e869422e1bb97109b97c1499caa8af219990e8dc
Preview

32756

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 b3dbdfe1835416bbc3f5065baca9aca9
SHA1 334d5af1355f6a13c35be4ad16e76baaecf209f1
SHA256 ec26c438d10e3e84ec855c47f07a176e6c11bbfae1557d526490711b80f087fe
SHA3 2409b439f48a139d3764b226eda46c6a629d5bd208991369ae0c85e37c17c71d
Preview

32759

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 ebb32ed08b06ab16f79c997b7963c57c
SHA1 c87e290caff3cf222d5ec678a51927ff22637949
SHA256 9c17b4621412d6ded24a76aed74d4425ae61f86b6d4092ca1e28ca66b7c71399
SHA3 fb70f94bf4a64a26f2d83b588fe2a233796083fd03aae7835387aeba2646b847
Preview

32760

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 e6a3323fcb21bc5b90ee077f41a24061
SHA1 91e468b891f8306afeb6ac33bc31d67efb2cbe9d
SHA256 a92f60b25322592e7ddd13d88e4006c097666f4d87c8cb0c21ffdccd53b31d78
SHA3 ffc4266780334ccca3790e5f703fab0a138d252e16d1ad1145c1929f51d31d38
Preview

32761

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 5df05404b0dab444d7bc0fe0bee0d519
SHA1 ecbc2591eaf234bcc87df4731b5e26266728ff6d
SHA256 28b8110695851e5280ff55cb78507b03e8b74dd370b8e122179c82b56f7e5f37
SHA3 f18323f0f4e67af79d43a527df26273c9f7e53e73b1ba51cd426cff3412927d2
Preview

32762

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 1.91924
Detected Filetype Cursor file
MD5 aff0f5e372bd49ceb9f615b9a04c97df
SHA1 e3205724d7ee695f027ab5ea8d8e1a453aaad0dd
SHA256 b07e022f8ef0a8e5fd3f56986b2e5bf06df07054e9ea9177996b0a6c27d74d7c
SHA3 9cb042121a5269b80d18c3c5a94c0e453890686aedade960097752377dfa9712
Preview

32763

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 48e064acaba0088aa097b52394887587
SHA1 310b283d52aa218e77c0c08db694c970378b481d
SHA256 43f40dd5140804309a4c901ec3c85b54481316e67a6fe18beb9d5c0ce3a42c3a
SHA3 38753084b0ada40269914e80dbacf7656dc94764048bd5dff649b08b700f3ed5
Preview

32764

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 1ae28d964ba1a2b1b73cd813a32d4b40
SHA1 8883cd93b8ef7c15928177de37711f95f9e4cd22
SHA256 ff47a48c11c234903a7d625cb8b62101909f735ad84266c98dd4834549452c39
SHA3 a85dadd416ce2d22aa291c0794c45766a0613b853c6e3b884a2b05fc791427b8
Preview

32765

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 0893f6ba80d82936ebe7a8216546cd9a
SHA1 0754cbdf56c53de9ed7fbd47859d20b788c6f056
SHA256 a0adcedb82b57089f64e2857f97cefd6cf25f4d27eefc6648bda83fd5fef66bb
SHA3 ce6148ade08ef9b829f83cb13b4c650d9d4a7012bfd1ab697a7870a05f4104f8
Preview

32766

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 dcaa3c032fe97281b125d0d8f677c219
SHA1 58fe36409f932549e2f101515abee7a40cf47b2c
SHA256 6e1e7738a1b6373d8829f817915822ef415a1727bb5bb7cfe809e31b3c143ac5
SHA3 02ef292e1b4a70e439e362af6b4fa213e3816ade45222b78dabab712b6afba54
Preview

32767

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.01924
Detected Filetype Cursor file
MD5 a95c7c78d0a0b30b87e3c4976e473508
SHA1 b19f3999f1b302a2d28977cb18a3416c918d486c
SHA256 326c048595bbc72e3f989cb3b95fbf09dc83739ced3cb13eb6f03336f95d74f1
SHA3 8157b4e6afa7ed2e2ffc174d655bec9fb81db609e4c5864faa5ead931ff60689
Preview

MAINICON

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x22
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 2.02162
Detected Filetype Icon file
MD5 f87c0c64bf5021ea82a0e3c1fa1e8f1d
SHA1 3f6cd06b4fa505fa132bf8cb7960aa051cc083c3
SHA256 a2f4d068cd3c6eb603bb9eb30ef55827fdcfd0313c7c82d5e6994e7a9f41492f
SHA3 950ed4ecfae9efa1404e2d117c4848c7fdc6f9a9b1283a98b0292dc69612c935

1 (#3)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x200
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 3.20543
MD5 b98da4bbc7a2a82e99ef6218c68a8376
SHA1 4a85c195988a0f362145f5c976073bbe7c4e9133
SHA256 223c6a160cf010b2179f68508888a0f97a5492a677b8e5cb071b10a0dd5ac884
SHA3 23ad91c732fc207da6d0aaa07ad7e897ac180d98e2775292be3cc3cdd138a506

1 (#4)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x5d7
TimeDateStamp 2023-Mar-03 11:53:48
Entropy 5.25898
MD5 8987187dc1c08fbc811bc645f53b0d16
SHA1 5f4bc866b210b402b3dbfdfa2abb841bb653bbca
SHA256 7ec65b0312c33ba88e3a18b3f611651f4db480766f67272400c9e25344b424d0
SHA3 592ec05bc6284e81ee6703f6ee84049aa0a77461bcf415bf24e6f95f9030ee38

String Table contents

Invalid index type
Index out of bounds (%d)
Invalid group name (%s)
This control requires version 4.70 or greater of COMCTL32.DLL
[%] parameter cannot be nil
AControlClass cannot be nil. Factory cannot generate presentation name.
Cannot create presentation proxy with nil model or PresentedControl. Use overloaded version of constructor with parameters and pass correct values.
APresentationProxyClass is nil. Factory cannot register presentation with a nil presentation proxy class.
APresentationName is empty. Factory cannot register presentation with an empty presentation name
Presentation Proxy class [%s] for this presentation name [%s] has already been registered.
Key cannot be empty. Data model cannot set or get data by key with an empty name.
Custom clipboard format with name "%s" is already registered
Custom clipboard format with name "%s" is not registered
Cannot find parent by specified criteria
Edge browser engine is unavailable
A regular expression specified in RegEx is required
Error in regular expression at offset %d: %s
Error studying the regex: %s
Successful match required
Strings parameter cannot be nil
'%d' is not a valid span
Row index, %d, out of bounds
Column index, %d, out of bounds
ControlItem.Control cannot be set to owning GridPanel
Cannot delete a column that contains controls
You cannot delete a column by default
Cannot delete a row that contains controls
Member
Size Type
Value
Auto
Percent
Absolute
Column%d
Row%d
Model is not valid class. Expected [%s], but received [%s]
Could not retrieve surface contents.
Invalid calling conditions for '%s'.
Cannot find a suitable pixel format for '%s'.
Cannot find a suitable shader for '%s'.
Cannot determine Direct3D support level.
Cannot create Direct2D Factory object for '%s'.
Cannot create DirectWrite Factory object for '%s'.
Cannot create WIC Imaging Factory object for '%s'.
Cannot create rendering target for '%s'.
Cannot create Direct3D device for '%s'.
Cannot acquire DXGI factory from Direct3D device for '%s'.
Cannot create texture for '%s'.
Cannot create render target view for '%s'.
Cannot create a swap chain for '%s'.
It is not possible to perform rendering. BeginScene was not invoked.
Cannot add columns or rows when ExpandStyle is TExpandStyle.FixedSize
WMP Images
The "%s" cannot be modified (Fixed = True)
Duplicate scale value %s
Other scale
Normal
Cannot register bitmap codec. Codec file extension cannot be empty.
Cannot register bitmap codec. Codec class cannot be nil.
Cannot register bitmap codec. Codec for specified file extension "%s" has already existed.
Incorrect size of bitmap parameter(s).
Loading bitmap failed.
Loading bitmap failed (%s).
Bitmap size too big.
Invalid call of GetParameter.
Loading thumbnail failed (%s).
Saving bitmap failed.
Saving bitmap failed (%s).
Copy
Cut
Paste
Delete
Select All
Cannot create a circular dependency between components
Active printer DPI cannot be changed while printing
Error occurred while reading printer settings: %s
Error occurred while writing printer settings: %s
All Files
Bitmaps
Icons
TIFF Images
JPEG Images
PNG Images
GIF Images
OK
Cancel
Help
Abort
Retry
Ignore
All
No to All
Yes to &All
Close
%s requires Windows Vista or later
&Username
&Password
&Domain
Login
application
The main menu can be only a single instance
A main menu only supports TMenuItem children
No %s implementation found
Bitmap size must be equal in copy operation
Invalid IScene.DisableUpdating/IScene.EnableUpdating call pair
No platform styles found
No platform style found for the current platform
Required IDeviceBehavior is not registered
Messages must be shown in the main UI thread.
'%s' is used on a not main thread
Warning
Error
Information
Confirm
Yes
No
Handled null exception
Cannot create timer: systemErrorCode=%d
An unknown combination of keys %s
You can use only the inheritors of class "%s"
Cannot create menu ID. All IDs have already been assigned
Invalid gesture ID (%d)
Value must be between %d and %d
Unable to add IStylusAsyncPlugin: %s
Unable to add IStylusSyncPlugin: %s
Unable to remove IStylusAsyncPlugin: %s
Unable to remove IStylusSyncPlugin: %s
Unable to get or set window handle: %s
Unable to enable or disable IRealTimeStylus: %s
Unable to enable or disable IGestureRecognizer: %s
Unable to retrieve initial gesture point
Unable to set stylus gestures: %s
Cannot focus this control
The function '%s' must not return nil value
The style you have chosen is not available for your currently selected target platform. You can select a custom style or remove the stylebook to allow FireMonkey to automatically load the native style at run time
Cannot load style from stream
Cannot load style from resource
Cannot load style from file %s
Invalid printer class: %s
Length of value array must be >= length of prompt array
Prompt array must not be empty
Invalid FMX Handle: %s%.*x
Unsupported platform service: %s
Service %s already registered
Unsupported OS version: %s
Instance of "%s" not created
Class of flashing control is not registered
Class %0:s does not support interface %1:s
Cannot call BeginInvoke on a control with no parent or window handle
OLE error %.8x
Method '%s' not supported by automation object
Variant does not reference an automation object
Dispatch methods do not support more than 64 parameters
License information for %s is invalid
License information for %s not found. You cannot use this control in design mode
OLE control activation failed
Could not obtain OLE control window handle
Operation not supported on selected printer
Selected printer is not valid
Printer index out of range
%s on %s
There is no default printer currently selected
Printer is not currently printing
Printing in progress
Caption cannot be empty
Unable to load style '%s'
Unable to load styles: %s
Style '%s' already registered
Style class '%s' already registered
Style '%s' not found
Style class '%s' not found
Invalid style handle
Invalid style format
Class '%s' is already registered for '%s'
Class '%s' is not registered for '%s'
%s parameter cannot be nil
Feature not supported by this style
Style '%s' is not registered
Cannot unregister the system style
Style not registered
Menu '%s' is already being used by another form
Docked control must have a name
Error removing control from dock tree
- Dock zone not found
- Dock zone has no control
Error loading dock zone from the stream. Expecting version %d, but found %d.
Length of value array must be >= length of prompt array
Prompt array must not be empty
&Username
&Password
&Domain
Login
Cannot remove shell notification icon
%s requires Windows Vista or later
Button%d
RadioButton%d
Home
Left
Up
Right
Down
Ins
Del
Shift+
Ctrl+
Alt+
Value must be between %d and %d
All
Clipboard does not support Icons
Cannot open clipboard: %s
Operation not supported on selected printer
There is no default printer currently selected
&Help
&Abort
&Retry
&Ignore
&All
N&o to All
Yes to &All
&Close
BkSp
Tab
Esc
Enter
Space
PgUp
PgDn
End
A control cannot have itself as its parent
Control '%s' is used on a not main thread
Cannot drag a form
Metafiles
Enhanced Metafiles
Icons
Bitmaps
TIFF Images
Warning
Error
Information
Confirm
&Yes
&No
OK
Cancel
Cannot change Visible in OnShow or OnHide
Cannot make a visible window modal
Scrollbar property out of range
%s property out of range
Menu index out of range
Menu inserted twice
Sub-menu is not in menu
Not enough timers available
Printer is not currently printing
Printing in progress
Printer index out of range
Printer selected is not valid
%s on %s
GroupIndex cannot be less than a previous menu item's GroupIndex
Cannot create form. No MDI forms are currently active
Can only modify an image if it contains a bitmap
Text format flag '%s' not supported
Invalid image frame index %d: there are %d frames (0-%d)
Invalid image size
Invalid ImageList
Unable to Replace Image
Unable to Insert Image
Invalid ImageList Index
Failed to read ImageList data from stream
Failed to write ImageList data to stream
Error creating window device context
Error creating window class
Cannot focus a disabled or invisible window
Control '%s' has no parent window
. Path:
%s
Parent given is not a parent of '%s'
Cannot hide an MDI Child Form
Attribute '%s' already exists
Device '%s' already exists
Must wait on at least one event
Cannot call BeginInvoke on a TComponent in the process of destruction
Bitmap image is not valid
Icon image is not valid
Metafile is not valid
Invalid pixel format
Scan line index out of range
Cannot change the size of an icon
Cannot change the size of a WIC Image
Unknown picture file extension (.%s)
Unsupported clipboard format
Unsupported stream format
Out of system resources
Canvas does not allow drawing
Windows Server 2022
Windows 8
Windows 8.1
Windows 10
Windows 11
Cannot create instance of class %s
Observer is not supported
Cannot have multiple single cast observers added to the observers collection
The object does not implement the observer interface
No single cast observer with ID %d was added to the observer collection
No multi cast observer with ID %d was added to the observer collection
Observer is not available
Invalid date string: %s
Invalid time string: %s
Invalid time Offset string: %s
Manual construction of TDeviceInfo is not supported
%s Service Pack %4:d (Version %1:d.%2:d, Build %3:d, %5:s)
32-bit Edition
64-bit Edition
Windows
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 2000
Windows XP
Windows Server 2003
Windows Server 2003 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019
Unable to open Index
Unable to open Search
Unable to find a Table of Contents
No topic-based help system installed
No help found for %s
Argument out of range
Argument must not be nil
Item not found
Duplicates not allowed
Insufficient RTTI available to support this operation
Parameter count mismatch
Type '%s' is not declared in the interface section of a unit
VAR and OUT arguments must match parameter type exactly
Specified Login Credential Service not found
%s (Version %d.%d, Build %d, %5:s)
%s (Version %s, OS Build %d.%d, %s)
Invalid UTF32 character value. Must be >= 0 and <= $10FFFF, excluding surrogate pair ranges
High surrogate char without a following low surrogate char at index: %d. Check that the string is encoded properly
Low surrogate char without a preceding high surrogate char at index: %d. Check that the string is encoded properly
Length of Strings and Objects arrays must be equal
Source and Destination arrays must not be the same
Class %s is not intended to be constructed
Invalid Timeout value: %s
SpinCount out of range. Must be between 0 and %d
Timespan too long
The duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValue
Value cannot be NaN
Negating the minimum value of a Timespan is invalid
Invalid Timespan format
Timespan element too long
No context-sensitive help installed
No help found for context %d
Cannot call CheckTerminated on an externally created thread
Cannot call SetReturnValue on an externally create thread
Parameter %s cannot be nil
Parameter %s cannot be a negative value
Input buffer exceeded for %s = %d, %s = %d
Invalid characters in path
Path is empty
The specified path is too long
The specified path was not found
The path format is not supported
The specified file was not found
?
No help viewer that supports filters
Invalid argument
Index out of range (%d). Must be >= 0 and < %d
String index out of range (%d). Must be >= %d and <= %d
Failed to create key %s
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented
Operation not allowed on sorted list
String expected
%s expected
%s not in a class registration group
Property %s does not exist
Stream write error
Thread creation error: %s
Thread Error: %s (%d)
Cannot terminate an externally created thread
Cannot wait for an externally created thread
Cannot call Start on a running or suspended thread
Invalid property path
Invalid property value
Invalid data type for '%s'
Invalid string constant
Line too long
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
Out of memory while expanding memory stream
%s has not been registered as a COM class
Number expected
ANSI or UTF8 encoding expected
%s on line %d
Error reading %s%s%s: %s
Stream read error
Property is read-only
A class named %s already exists
List does not allow duplicates ($0%x)
A component named %s already exists
String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Identifier expected
The client can not be an instance of class %s
Class %s does not support the action
Invalid binary value
Invalid filename - %s
Invalid stream format
'%s' is an invalid mask at (%d)
''%s'' is not a valid component name
Invalid property value
Invalid property element: %s
Invalid destination array
Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid destination index (%d)
Invalid code page
Invalid encoding name
No mapping for the Unicode character exists in the target multi-byte code page
Invalid StringBaseIndex
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range
Can't write to a read-only resource stream
''%s'' expected
CheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
December
Sun
Mon
Tue
Wed
Thu
Fri
Sat
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Invalid source array
Aug
Sep
Oct
Nov
Dec
January
February
March
April
May
June
July
August
September
October
November
Object lock not owned
Monitor support function not initialized
Feature not implemented
Method called on disposed object
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%s%s
A call to an OS function failed
Jan
Feb
Mar
Apr
May
Jun
Jul
Invalid variant operation (%s%.8x)
%s
Custom variant type (%s%.4x) is out of range
Custom variant type (%s%.4x) already used by %s
Custom variant type (%s%.4x) is not usable
Too many custom variant types have been registered
Could not convert variant of type (%s) into type (%s)
Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
Operation aborted
Exception %s in module %s at %p.
%s%s
Application Error
Format '%s' invalid or incompatible with argument
No argument for format '%s'
Variant method calls not supported
Read
Write
Execution
Invalid access
Error creating variant or safe array
Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation
Invalid NULL variant operation
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
<unknown>
'%s' is not a valid integer value
'%s' is not a valid integer value for %s type
'%s' is not a valid floating point value
'%s' is not a valid date and time
'%d.%d' is not a valid timestamp
'%s' is not a valid GUID value
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
FileVersion (#2) 1.0.0.0
ProductVersion (#2) 1.0.0.0
ProgramID com.embarcadero.ezwHookpp
FileDescription ezwHookpp
ProductName ezwHookpp
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0xa4f000
EndAddressOfRawData 0xa4f054
AddressOfIndex 0xa0ac20
AddressOfCallbacks 0xa50010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0! [*] Warning: Section .tls has a size of 0!
Leave a comment

No comments yet.