928655082e7d2e16e4c3b47e8d601b7f

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Jan-09 17:17:25
Detected languages English - United States
FileVersion 5.3.109.125
ProductVersion 5.3.109
ProgramID com.embarcadero.freepcaudit
FileDescription freepcaudit
ProductName freepcaudit

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ v6.0 DLL
Suspicious Strings found in the binary may indicate undesirable behavior: Looks for VMWare presence:
  • VMWARE
  • VMware
Looks for Qemu presence:
  • QEMU
Accesses the WMI:
  • ROOT\CIMV2
  • root\CIMV2
  • root\WMI
Contains domain names:
  • api.ipify.org
  • http://api.ipify.org
  • http://www.misutilities.com
  • https://www.misutilities.com
  • https://www.misutilities.com/cgi-bin/freepcupdate.pl?version
  • ipify.org
  • misutilities.com
  • www.misutilities.com
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Suspicious The PE is possibly packed. Unusual section name found: .itext
Unusual section name found: .didata
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • FindWindowW
  • SwitchToThread
Code injection capabilities (PowerLoader):
  • GetWindowLongW
  • FindWindowW
Can access the registry:
  • RegSetValueExW
  • RegEnumKeyExW
  • RegLoadKeyW
  • RegDeleteKeyW
  • RegOpenKeyExW
  • RegQueryInfoKeyW
  • RegUnLoadKeyW
  • RegSaveKeyW
  • RegDeleteValueW
  • RegReplaceKeyW
  • RegFlushKey
  • RegQueryValueExW
  • RegEnumValueW
  • RegCloseKey
  • RegCreateKeyExW
  • RegRestoreKeyW
Possibly launches other programs:
  • ShellExecuteW
Uses functions commonly found in keyloggers:
  • CallNextHookEx
  • GetAsyncKeyState
  • MapVirtualKeyW
  • GetForegroundWindow
Has Internet access capabilities:
  • InternetCloseHandle
  • InternetGetLastResponseInfoW
  • InternetReadFile
  • InternetOpenW
  • InternetOpenUrlW
Can take screenshots:
  • GetDC
  • GetDCEx
  • FindWindowW
  • BitBlt
  • CreateCompatibleDC
Reads the contents of the clipboard:
  • GetClipboardData
Suspicious The PE is possibly a dropper. Resource WINDOWSMODERNDARK is possibly compressed or encrypted.
Resource WINDOWSWHITESMOKE is possibly compressed or encrypted.
The binary may have been compiled on a machine in the UTC+1 timezone.
Resources amount for 75.0478% of the executable.
Info The PE is digitally signed. Signer: Volodymyr Karpus
Issuer: Certum Code Signing 2021 CA
Safe VirusTotal score: 0/71 (Scanned on 2026-01-24 07:58:38) All the AVs think this file is safe.

Hashes

MD5 928655082e7d2e16e4c3b47e8d601b7f
SHA1 66f38adc36111b765fd1dab6402fdae1533f7243
SHA256 e61fc511b6c793fb5207ddb7ced661a392b44f03b7ae825479453035074a704a
SHA3 aca0ffb881b2115bfdeffed388cc23d48bb7eb40ef0b38d9feb6d776d7d204fb
SSDeep 393216:2OeaAZteZuaBnaCOWwj59o5/ZkUXCzGAL9n:wtGlnaCOWg59o5/ZkUSzGABn
Imports Hash 08ab36c698a7988c8ea5aed5e800242f

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 11
TimeDateStamp 2026-Jan-09 17:17:25
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x312200
SizeOfInitializedData 0xa94600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0031368C (Section: .itext)
BaseOfCode 0x1000
BaseOfData 0x314000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xdc7000
SizeOfHeaders 0x400
Checksum 0xdaa25a
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 a7a8267c2ad9dd37825ddc178df2895a
SHA1 f31fbfc899673240e118a88255598f884a3d1595
SHA256 ffb0ad183b49bc44a7f50862c09a00864c25161bec770ee476c0d0568c36f3e8
SHA3 7d76e0dccdab854ab6c3530b7fde4153e070d7e5dfa6caeb2ccdfe3c7ac5028b
VirtualSize 0x30f8f0
VirtualAddress 0x1000
SizeOfRawData 0x30fa00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.47919

.itext

MD5 6500cd8e91bb3a46529e6cfbdf48d522
SHA1 31206e19b93851c60296b4d12c9f9939ee39bf15
SHA256 3873348040b66176fabc9380bc5f481157d91d336490d377d4ec5c8dcfa80aac
SHA3 c13ce4db78cd59440bfc02e59b9fe3481a239eb249338589542d1be439869861
VirtualSize 0x27ec
VirtualAddress 0x311000
SizeOfRawData 0x2800
PointerToRawData 0x30fe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.27377

.data

MD5 4f833a2636d36ac089f7cf2a3ce3e2a2
SHA1 982f48eff7210ab03c01166d7b4b085466985280
SHA256 90f7b267122efe06ec8b4b1eb49e5d844f1247bbb1f2b4964aed2f9bfab7d2e3
SHA3 874481d36cb55a3096461552cd25891cdfa61107ebb557c67ca5c177936b3d11
VirtualSize 0xaa3c
VirtualAddress 0x314000
SizeOfRawData 0xac00
PointerToRawData 0x312600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 6.1798

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x1a7d4
VirtualAddress 0x31f000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 196037a89a306297d2ef67b43a42666f
SHA1 89a4c38958c870e7b136c785e95cc9dedd37893c
SHA256 4ed704d8449569189e85df018f6dc2ebea16d54093172409245313e707ed3be2
SHA3 8228ecb0ed5d2d3704f62ba19d0ac5a4eb49d5fe5e055568e2157a5c8f0f6219
VirtualSize 0x38e4
VirtualAddress 0x33a000
SizeOfRawData 0x3a00
PointerToRawData 0x31d200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.21704

.didata

MD5 eda62894fe132407d7b124d9827946de
SHA1 48e3dcb913c641fbaf66744689e312e59239a0f0
SHA256 cc81234381dbffdd5aa35c999bbc09504956219f8f4c85a67566eecf07b3b663
SHA3 79ccd3b28cb08ad6571d064fa89871901600b7f74f0b86fa990567c92f21b058
VirtualSize 0xca8
VirtualAddress 0x33e000
SizeOfRawData 0xe00
PointerToRawData 0x320c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.146

.edata

MD5 9660bf6492b805da3c1d024dcac0e7fe
SHA1 bc622b9dd7a46ca8682b35ad26968c4e19b166b9
SHA256 8f91769e00dc762d3f6bcb2e544c3f25e6b781b6133214ed5e95d37e6810f01c
SHA3 93a2be3ec5ddc0ccf71c35e0b26542a0efb49cbe5e5d3857cdb41b25b5fe4735
VirtualSize 0x74
VirtualAddress 0x33f000
SizeOfRawData 0x200
PointerToRawData 0x321a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.38371

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0xcc
VirtualAddress 0x340000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 74039f8b0905013dda3537ea2d274b4a
SHA1 c58e446f729659ae776e354057a322708bb11e7a
SHA256 c1846a20abeb971521ad8ca5d67288ccc266621cd42fc39d406654d6979c833e
SHA3 7e2a56b5adbf7f57a7d000ae7bf6cc46ff5b887970c28a66af05599e91afbbcc
VirtualSize 0x5d
VirtualAddress 0x341000
SizeOfRawData 0x200
PointerToRawData 0x321c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.35499

.reloc

MD5 30aa47d96168dade1d2e80cbedf7934c
SHA1 fed3000fc3481f0e39d393b90eeb2f46b947e20b
SHA256 999b970b1777e1a5667fc862ad16a1454b45ee59efdfb259d830b4460d0e47d6
SHA3 67046e01e0ccb8aa2cac6dde97aad3c7ee5b29ebf3c6c230d9443325f7d3c9fb
VirtualSize 0x42cc8
VirtualAddress 0x342000
SizeOfRawData 0x42e00
PointerToRawData 0x321e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.70071

.rsrc

MD5 6177de8ea67af25ab0c77c0b523483fb
SHA1 5f72a987ad66c0679bd94f37bcfae61f200f5ce5
SHA256 fbd38b46e5362612d134aae1dc8fb18ab182c30e0506f760927da331d22547ed
SHA3 aab8361a4e842862ce02fb55c35c8f89131df8726b46b750e69449f0151ce775
VirtualSize 0xa42000
VirtualAddress 0x385000
SizeOfRawData 0xa42000
PointerToRawData 0x364c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.64952

Imports

winmm.dll sndPlaySoundW
oleacc.dll LresultFromObject
wininet.dll InternetCloseHandle
InternetGetLastResponseInfoW
InternetReadFile
InternetOpenW
InternetOpenUrlW
HttpQueryInfoW
winspool.drv DocumentPropertiesW
ClosePrinter
OpenPrinterW
GetDefaultPrinterW
EnumPrintersW
comdlg32.dll GetSaveFileNameW
GetOpenFileNameW
comctl32.dll ImageList_GetImageInfo
FlatSB_SetScrollInfo
InitCommonControls
ImageList_DragMove
ImageList_Destroy
_TrackMouseEvent
ImageList_DragShowNolock
ImageList_Add
FlatSB_SetScrollProp
ImageList_GetDragImage
ImageList_Create
ImageList_EndDrag
ImageList_DrawEx
ImageList_SetImageCount
FlatSB_GetScrollPos
FlatSB_SetScrollPos
InitializeFlatSB
ImageList_Copy
FlatSB_GetScrollInfo
ImageList_Write
ImageList_DrawIndirect
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_BeginDrag
ImageList_GetIcon
ImageList_Replace
ImageList_GetImageCount
ImageList_DragEnter
ImageList_GetIconSize
ImageList_SetIconSize
ImageList_Read
ImageList_DragLeave
ImageList_LoadImageW
ImageList_Draw
ImageList_Remove
ImageList_ReplaceIcon
ImageList_SetOverlayImage
shell32.dll Shell_NotifyIconW
SHAppBarMessage
ShellExecuteW
user32.dll CopyImage
SetMenuItemInfoW
GetMenuItemInfoW
DefFrameProcW
GetDlgCtrlID
FrameRect
RegisterWindowMessageW
GetMenuStringW
FillRect
SendMessageA
IsClipboardFormatAvailable
EnumWindows
ShowOwnedPopups
GetClassInfoExW
GetClassInfoW
GetScrollRange
SetActiveWindow
GetActiveWindow
DrawEdge
GetKeyboardLayoutList
LoadBitmapW
EnumChildWindows
GetScrollBarInfo
UnhookWindowsHookEx
SetCapture
GetCapture
ShowCaret
CreatePopupMenu
GetMenuItemID
CharLowerBuffW
PostMessageW
SetWindowLongW
IsZoomed
SetParent
DrawMenuBar
GetClientRect
IsChild
IsIconic
CallNextHookEx
ShowWindow
GetWindowTextW
SetForegroundWindow
GetAsyncKeyState
IsDialogMessageW
DestroyWindow
RegisterClassW
EndMenu
CharNextW
GetFocus
GetDC
SetFocus
ReleaseDC
GetClassLongW
SetScrollRange
DrawTextW
PeekMessageA
MessageBeep
SetClassLongW
RemovePropW
GetSubMenu
DestroyIcon
IsWindowVisible
PtInRect
DispatchMessageA
UnregisterClassW
GetTopWindow
SendMessageW
NotifyWinEvent
GetComboBoxInfo
LoadStringW
CreateMenu
CharLowerW
SetWindowRgn
SetWindowPos
GetMenuItemCount
GetSysColorBrush
GetWindowDC
DrawTextExW
EnumClipboardFormats
GetScrollInfo
SetWindowTextW
GetMessageExtraInfo
GetSysColor
EnableScrollBar
TrackPopupMenu
DrawIconEx
GetClassNameW
GetMessagePos
GetIconInfo
SetScrollInfo
GetKeyNameTextW
GetDesktopWindow
SetCursorPos
GetCursorPos
SetMenu
GetMenuState
GetMenu
SetRect
GetKeyState
IsRectEmpty
ValidateRect
GetCursor
KillTimer
WaitMessage
TranslateMDISysAccel
GetWindowPlacement
GetMenuItemRect
CreateIconIndirect
CreateWindowExW
ChildWindowFromPoint
GetDCEx
PeekMessageW
MonitorFromWindow
GetUpdateRect
SetTimer
WindowFromPoint
BeginPaint
DrawStateW
RegisterClipboardFormatW
MapVirtualKeyW
OffsetRect
IsWindowUnicode
DispatchMessageW
CreateAcceleratorTableW
DefMDIChildProcW
GetSystemMenu
SetScrollPos
GetScrollPos
InflateRect
DrawFocusRect
ReleaseCapture
LoadCursorW
ScrollWindow
GetLastActivePopup
GetSystemMetrics
CharUpperBuffW
SetClipboardData
GetClipboardData
ClientToScreen
SetWindowPlacement
GetMonitorInfoW
CheckMenuItem
CharUpperW
DefWindowProcW
GetForegroundWindow
EnableWindow
GetWindowThreadProcessId
RedrawWindow
EndPaint
MsgWaitForMultipleObjectsEx
LoadKeyboardLayoutW
ActivateKeyboardLayout
GetParent
MonitorFromRect
InsertMenuItemW
GetPropW
MessageBoxW
SetPropW
UpdateWindow
MsgWaitForMultipleObjects
DestroyMenu
SetWindowsHookExW
EmptyClipboard
GetDlgItem
AdjustWindowRectEx
IsWindow
DrawIcon
EnumThreadWindows
InvalidateRect
GetKeyboardState
ScreenToClient
DrawFrameControl
SetCursor
CreateIcon
RemoveMenu
GetKeyboardLayoutNameW
OpenClipboard
TranslateMessage
MapWindowPoints
EnumDisplayMonitors
CallWindowProcW
CountClipboardFormats
CloseClipboard
DestroyCursor
CopyIcon
PostQuitMessage
ShowScrollBar
EnableMenuItem
HideCaret
FindWindowExW
MonitorFromPoint
LoadIconW
SystemParametersInfoW
GetWindow
GetWindowRect
GetWindowLongW
InsertMenuW
IsWindowEnabled
IsDialogMessageA
FindWindowW
GetKeyboardLayout
DeleteMenu
version.dll GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
oleaut32.dll SafeArrayPutElement
GetErrorInfo
VariantInit
VariantClear
SysFreeString
SafeArrayAccessData
SysReAllocStringLen
SafeArrayCreate
SafeArrayGetElement
GetActiveObject
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopyInd
VariantChangeType
WTSAPI32.DLL WTSUnRegisterSessionNotification
WTSRegisterSessionNotification
advapi32.dll RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegQueryValueExW
RegEnumValueW
RegCloseKey
RegCreateKeyExW
RegRestoreKeyW
msvcrt.dll memcpy
memset
kernel32.dll GetFileType
GetACP
CloseHandle
LocalFree
GetCurrentProcessId
SizeofResource
QueryPerformanceFrequency
IsDebuggerPresent
GetFullPathNameW
VirtualFree
GetProcessHeap
ExitProcess
HeapAlloc
GetCPInfoExW
GlobalSize
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
FileTimeToLocalFileTime
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
ReadFile
GetLastError
GetModuleFileNameW
SetLastError
GlobalAlloc
GlobalUnlock
FindResourceW
CreateThread
CompareStringW
CopyFileW
LoadLibraryA
ResetEvent
MulDiv
FreeResource
GetVersion
RaiseException
MoveFileW
GlobalAddAtomW
FormatMessageW
SwitchToThread
GetExitCodeThread
OutputDebugStringW
GetCurrentThread
LoadLibraryExW
LockResource
FileTimeToSystemTime
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
GlobalFindAtomW
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetFileSize
GetStartupInfoW
GlobalDeleteAtom
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
GlobalLock
VirtualAlloc
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
GetConsoleCP
lstrlenW
QueryPerformanceCounter
SetEndOfFile
lstrcmpW
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
GetLocaleInfoW
CreateFileW
SystemTimeToFileTime
EnumResourceNamesW
DeleteFileW
IsDBCSLeadByteEx
GetLocalTime
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
WaitForMultipleObjectsEx
GetThreadLocale
SetThreadLocale
wsock32.dll WSAStartup
WSACleanup
gethostbyname
inet_ntoa
ole32.dll IsEqualGUID
ProgIDFromCLSID
OleInitialize
CLSIDFromProgID
OleUninitialize
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
StringFromCLSID
gdi32.dll Pie
SetBkMode
CreateCompatibleBitmap
GetEnhMetaFileHeader
RectVisible
AngleArc
SetAbortProc
SetTextColor
GetTextColor
StretchBlt
RoundRect
SelectClipRgn
RestoreDC
SetRectRgn
GetTextMetricsW
GetWindowOrgEx
CreatePalette
PolyBezierTo
CreateICW
CreateDCW
GetStockObject
CreateSolidBrush
GetBkMode
Polygon
MoveToEx
PlayEnhMetaFile
Ellipse
StartPage
GetBitmapBits
StartDocW
AbortDoc
GetSystemPaletteEntries
GetEnhMetaFileBits
GetEnhMetaFilePaletteEntries
CreatePenIndirect
CreateFontIndirectW
PolyBezier
EndDoc
GetObjectW
GetCurrentObject
GetWinMetaFileBits
SetROP2
GetEnhMetaFileDescriptionW
ArcTo
Arc
SelectPalette
SetGraphicsMode
ExcludeClipRect
MaskBlt
SetWindowOrgEx
EndPage
DeleteEnhMetaFile
Chord
SetDIBits
GetViewportOrgEx
SetViewportOrgEx
CreateRectRgn
RealizePalette
SetDIBColorTable
GetDIBColorTable
CreateBrushIndirect
PatBlt
SetEnhMetaFileBits
Rectangle
SaveDC
DeleteDC
BitBlt
SetWorldTransform
FrameRgn
GetDeviceCaps
GetTextExtentPoint32W
GetClipBox
IntersectClipRect
Polyline
CreateBitmap
CombineRgn
SetWinMetaFileBits
GetStretchBltMode
CreateDIBitmap
SetStretchBltMode
GetDIBits
CreateDIBSection
ExtCreateRegion
LineTo
GetRgnBox
EnumFontsW
CreateHalftonePalette
SelectObject
DeleteObject
ExtFloodFill
UnrealizeObject
CopyEnhMetaFileW
SetBkColor
CreateCompatibleDC
GetBrushOrgEx
GetCurrentPositionEx
SetDCPenColor
CreateRoundRectRgn
GetTextExtentPointW
ExtTextOutW
SetBrushOrgEx
GetPixel
GdiFlush
SetPixel
EnumFontFamiliesExW
StretchDIBits
GetPaletteEntries
kernel32.dll (delay-loaded) GetFileType
GetACP
CloseHandle
LocalFree
GetCurrentProcessId
SizeofResource
QueryPerformanceFrequency
IsDebuggerPresent
GetFullPathNameW
VirtualFree
GetProcessHeap
ExitProcess
HeapAlloc
GetCPInfoExW
GlobalSize
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
FileTimeToLocalFileTime
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
ReadFile
GetLastError
GetModuleFileNameW
SetLastError
GlobalAlloc
GlobalUnlock
FindResourceW
CreateThread
CompareStringW
CopyFileW
LoadLibraryA
ResetEvent
MulDiv
FreeResource
GetVersion
RaiseException
MoveFileW
GlobalAddAtomW
FormatMessageW
SwitchToThread
GetExitCodeThread
OutputDebugStringW
GetCurrentThread
LoadLibraryExW
LockResource
FileTimeToSystemTime
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
GlobalFindAtomW
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetFileSize
GetStartupInfoW
GlobalDeleteAtom
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
GlobalLock
VirtualAlloc
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
GetConsoleCP
lstrlenW
QueryPerformanceCounter
SetEndOfFile
lstrcmpW
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
GetLocaleInfoW
CreateFileW
SystemTimeToFileTime
EnumResourceNamesW
DeleteFileW
IsDBCSLeadByteEx
GetLocalTime
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
WaitForMultipleObjectsEx
GetThreadLocale
SetThreadLocale

Delayed Imports

Attributes 0x1
Name kernel32.dll
ModuleHandle 0x33e1a0
DelayImportAddressTable 0x33e1d4
DelayImportNameTable 0x33e30c
BoundDelayImportTable 0x33e444
UnloadDelayImportTable 0x33e54c
TimeStamp 1970-Jan-01 00:00:00

dbkFCallWrapperAddr

Ordinal 1
Address 0x322644

__dbk_fcall_wrapper

Ordinal 2
Address 0x12550

WINDOWSMODERNDARK

Type VCLSTYLE
Language English - United States
Codepage UNKNOWN
Size 0x1de46
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.94202
MD5 38d38cdaf024c2f470f73c8162e18ea3
SHA1 01f91b6a0e35c7005f1f10fa3af5553450e120d6
SHA256 29569ba4614d2b4cce93fac44908b0216b09ecea18cefd5300b2e2029ed1ac99
SHA3 b9cd359a5b2fe16211836a205583afdbab987803b0ff20948194414cc4e5d6d2

WINDOWSWHITESMOKE

Type VCLSTYLE
Language English - United States
Codepage UNKNOWN
Size 0x1fea8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.95214
MD5 83edca8d263cbf3dcb4b695332c95ad6
SHA1 480329d1c38a163724403aca2ae4a2aa5a419c42
SHA256 32818b2b6a5fab029d310bc270c39c5a01b5e8e66a24b1b359a99843e5ffc280
SHA3 36b57c61379aa63a28e49f9123f328c42f173e5dba77dece4626b1b1f6852c5d

1

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.61679
MD5 c68fb06fd82eca9bfbf1ac7bd2c9140c
SHA1 ed6692f8bc77ea73fad92d754ede56781769ea23
SHA256 30df4ddb7d7ff020b05c161b16bafa7002c89871d8b05d132b9c06af0a21b693
SHA3 82c58a119e8e2a673482c184b659246eef0213f392df7af92269c62ff73d66a8

2

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.80231
MD5 2e87b3c111e3073a841775c1f8ec5a90
SHA1 20292304fa2ef1bfdc4a1000e90a1c16d4765a96
SHA256 ce19ace18e87b572e6912306776226af5b8e63959c61cde70a8ff05b3bbdcc41
SHA3 9527f09e739c2064835800a7e5c317cb422bdd7237f00fca079a1c62f58a2612

3

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.00046
MD5 a04c3c368cb37c07bd5f63e7e6841ebd
SHA1 699300bceaa1256818c43fecfc8cad93a59156b2
SHA256 ee1c9c194199c320c893b367602ccc7ee7270bd4395d029f727e097634f47f8c
SHA3 58722e3138aad1382e284c1605ecd665ced536de4906749ac8d6e11252cc9558

4

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.56318
MD5 9929115b21c2c59348058d4190392e75
SHA1 626fba1825d572ea441d36363307c9935de3c565
SHA256 9d9edf87ca203ecc60b246cc783d54218dd0ce77d3a025d0bafc580995a4abd8
SHA3 fea156e872544252c625076a6bf3baa733ee5b3d5399716e156734af7a841369

5

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.6949
MD5 f321ad13d1c3f35a05d67773b4bc27d6
SHA1 30aded8525417e2531d5eb88bf2f868172945baa
SHA256 99676c52310db365580965ea646ece86c62951bfd97ec0aae9f738a202a90593
SHA3 04c839da98a8c50a36697076af5bc6d527560a69153b2f718f065908fd4fe3ad

6

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.62527
MD5 5ca217e52bdc6f23b43c7b6a23171e6e
SHA1 d99dc22ec1b655a42c475431cc3259742d0957a4
SHA256 11726dcf1eebe23a1df5eb0ee2af39196b702eddd69083d646e4475335130b28
SHA3 b358d8a5b0f400dd2671956ec45486ae1035556837b5289df5f418fe69348b3f

7

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.91604
MD5 6be7031995bb891cb8a787b9052f6069
SHA1 487eb59fd083cf4df02ce59d9b079755077ba1b5
SHA256 6f938aab0a03120de4ef8b27aff6ba5146226c92a056a6f04e5ec8d513ce5f9d
SHA3 0f1c6c0378a3646c9fbf3678bbeeccf929d32192f02d1ea9d6ba0be5c769e6ab

8

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.6633
MD5 ff4e5862f26ea666373e5fab2bddfb11
SHA1 cfa13c0ab30f1bbd566900dee3631902f9b6451c
SHA256 b8e6fc93d423931acbddae3c27dd3c4eb2a394005d746951a971cb700e0ee510
SHA3 91dae12a9f43c5443e0661091a336f882fa1482f75fa9a57c9298d1d70c8ae69

PREVIEWGLYPH

Type RT_BITMAP
Language English - United States
Codepage UNKNOWN
Size 0xe8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.85172
MD5 48276e8432af5a23af78e1d23de8ef5a
SHA1 12fb57606d03e3fe28263e3e9e96b4eedc79aef7
SHA256 78507a772de646626b196a743cee75b298a68c33a0fd482842071519d59037b2
SHA3 1cf31d53c7ea5dbe90181cb2db39ce6cd21484f5495b0af59f5c6164d9b3d3d0
Preview

1 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.81149
MD5 6945bbaac124908bacda5b997a88a97b
SHA1 2428256429603d5f37ff81fd9c4008bdd8a6f8fa
SHA256 7943127263c206c744dcde5da237cd828c48b63b0a83a9a8a2d2af4506cec382
SHA3 a79af86fdbdae9255cd2e50910b8ee76dcb2ea747c1d2fe494770e26e360efaa

2 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 6.44321
MD5 e3374c9b5bc4297899b1b4d1b0c257a4
SHA1 bc6da0a3a7d53e3f8aae90ae83fe686e7adfb0bb
SHA256 104a6b1ec425da237aabef266e8ae708ae9f0697e1fa92e7f0e588b88f9d8c05
SHA3 e2553368a1751dee2e7c0d67fc3c7958e5ecb59a883d9ae12146de607841ce67

3 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x568
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.78079
MD5 6be30c8c1c500866372826292c7e6769
SHA1 06cad09ee9109a443cff11bcd93b57b0c3b3b3c4
SHA256 f4e28c4888d0a63d845f489d7d2de791a5ea891a28b415681b8aac26e91736c0
SHA3 8f41f3535b3938c85059ac6dada1bd9c9711f4777c450f8d0aff1e7466499257

4 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.72004
MD5 ce368909389d824887d35b8db4b62838
SHA1 c6e4f4675c71f121521b1cc248d12fe731bdb178
SHA256 4fc98a641a5986cd74b5938fc46949d993c7abb45b1f003be91a9183c5cf32ab
SHA3 ffc0b52803b748411760c7c228d8b1cc446dc7d77c12ed3f37dfbd7aa15637ce

5 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 6.00978
MD5 c35175f120272ce0129ced1d918f35e8
SHA1 a5f532de62836e7a537dab9a5343742378003bba
SHA256 eb7b1098eb94bd84e780082860c6f958a83fc849eb996ede074a7f1d0f945b66
SHA3 f57a40c6eb2267e380b7b85c3155c18ca3a749adde0000675ecd21765b777553

6 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.50081
MD5 f65db8949d77b9fdc1d770c828414f02
SHA1 9567360af9e284562ab757122f04af1815e0d943
SHA256 2b066cd20670d0dd9ef87b05ba4d0c8eed153287cbeeaba97246495f4afaaa63
SHA3 fb7f8747ca82b9cd162886db26952ff892ee27b172543394e18e6e3d8753f876

DLGTEMPLATE

Type RT_DIALOG
Language UNKNOWN
Codepage UNKNOWN
Size 0x52
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.5627
MD5 db949b51eec31f37281a7fa424a3e158
SHA1 f61214ce31a91d174e77f12c90f18ddd4e265a1d
SHA256 771f64afb45a9edc8c4f6c5b2039f9b32623cea53bf0cab5bf1f371cc5d1abe4
SHA3 4a2bc09771734352d594a48fe2249ca0697c471d80a4001f60c6d86c46b6319e

TEXTFILEDLG

Type RT_DIALOG
Language UNKNOWN
Codepage UNKNOWN
Size 0x52
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.61605
MD5 ac5eefd684bd75f9ded1d0e368f566da
SHA1 33dd756799618130fd3c1097be1638f47ada0f90
SHA256 26be3f5d9e8788884e3d857861b2666da59e7e80dfaa6e7e52832428980204fc
SHA3 bb30afb20c2bc5d31729c46212a31568a47a85da5d4bed5e936bee775915da30

4068

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x1dc
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.19334
MD5 fbe9673bc15658ee2edbbc6c2fcc5182
SHA1 934190d6f16c42bb171bb5de3f22df4e27d9d9ee
SHA256 8309e7eaba1540b07039d088cf88834a9e2915665ca0e6a55bb7bb4984b0d681
SHA3 72bdffa39d95289323ba430e311339d7b39b4806b4d86460c23c2dbda478d8aa

4069

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x444
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.24937
MD5 c1b679ac93d3e32ebafdf62e67834a9e
SHA1 6d04b0aa06f74be6ba91bb25eefccbd286e10fc0
SHA256 30c297dbbf661c6382d61c37c73ce95cbca5b718cb475dc95db2551919feb023
SHA3 bcfac98b116b75715c4a88394e377b9155960857573b31a87ceb14eec0d620f7

4070

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x40c
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.22115
MD5 5d151e4d0d2bcd907c29312c57516883
SHA1 fbb5633a4c7d702cd92932b07a63b7d62f1904a3
SHA256 95f76f38167b1e5517af4e62c7a7b490f987e206e7a59b39562fbd447fa3629d
SHA3 f0f9931ffdd7b27284307e3905e2e6bed93e3859ea254879b195f979eff8894a

4071

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x310
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.32539
MD5 d8abd6de253dd4cd9e2124f37cf15577
SHA1 30286adc0cb02c5754b7f3b0c8e4367683eb4101
SHA256 f5538085e3c1e54091501a49527fda67f7e7ec4eb1bcc7901a04409f576d14e8
SHA3 19b475f451a4548384e4c05a6131fd7a93a665fa28585363b28cca0b3da68159

4072

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x4c8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.33037
MD5 3b82d835cdd8acd8395e3f14b3906fba
SHA1 f8aa589c34fb5217a3925f29f4f294a31a76e3dd
SHA256 1e941dcdb80e86937e5508ce447b54182c085295e97fb2bc7695d0531cd21cca
SHA3 69991e590d852f5e5fedcf84cdb797a1c12be5a07312c0577d55e27d5f96a36f

4073

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x420
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.30089
MD5 7be312e7eca2ebf0a063d90cc9867f83
SHA1 ef28102344d049ebbfc21d15d536946ebee3e214
SHA256 ef842d412eb2111541fbe1fc735511814494d7e63741c92f3165d3b86d940d1b
SHA3 377a05fd38bfd4f23e39f1d20af8d5cf7deebf7a7766007395a6548037c05bbc

4074

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2fc
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.31352
MD5 4111ae8acbe637540bdbad262fe8145d
SHA1 7b167fd2e7413c30fe54ce5111fc715bd93e3b8f
SHA256 dd4e619b9809c65a4d493d09fe72043cb555d0688bbea12b35b0e942081eb31f
SHA3 fc66fee1793c6d0f5a7df46f83e14079a57a6a3880313687c0828b314409638e

4075

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xbc
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.50983
MD5 2968a5915693807f6b5e25722a327903
SHA1 f04269ceac52f7cf6cb52d2cf006e1c32cf9a856
SHA256 f0ed993a800a0734324ff72d3878bab61053c5bd5bfe1a989badd1d369bfe7ba
SHA3 4175c0b5cd1283eb5c5c4177ee29b3cb444e09913aabbee3cc7671c2cfb6017d

4076

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xe0
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.45201
MD5 bbfcd6bcccf82cd4e3302f5d1822d463
SHA1 f52b5f851fb8cfb41ed5afd51bb4c97642aa527b
SHA256 cf9211bc7b7e68f54bf63ac1e074ee5b079027dc0a190685d3a15a3da9d6f603
SHA3 0d0bbd424403140f8c37156c4b3575bfb491434c6b84cdec62e17f8cb740cc70

4077

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x1e0
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.3513
MD5 11f9ffdd19c24c698403ad4253e56f55
SHA1 3b8aa4298dac3e217b9d1031f2d30a49faa24023
SHA256 69d8fea26db96ca04f433f0435f6daaee300e598df14718c98cc7b93af03f8bb
SHA3 e1f0f04fa364b22ed9f7572b4c14ffe8fff14939fd6a1a7b922bae78e26d941e

4078

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x42c
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.29429
MD5 2d844011e1afd1c9abb3186061fe8206
SHA1 379b9a047ad7c1f0ad8db10c7898850a44697cc1
SHA256 c5633b91ec65c19ead9bf7d857dcd185dba2cf241f5f7e406d69af8b502890a9
SHA3 a5c5040bcccbc344ae8ba03ed9dff6201325041ffab2d99a8eb7ba05e90bfdf5

4079

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x400
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.34143
MD5 2cf67808b99780c904b278eb59918dd0
SHA1 89df763c7ee4c8f4963dfe7d49427c97be6e4992
SHA256 be70acc3728e63fddb5459e762b83c8f360dd8cdc7f34141da48aeb65b7981ae
SHA3 23b763763a8e865bebbed87b60c90e37008efc084aed5cea73afddec549697b8

4080

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3d0
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.30607
MD5 6aba224760748aa1d9ce40a313b743bc
SHA1 290476b61488e45cb2dfa3993a6b046e91059a8c
SHA256 7953696ea83f583fb2bcf5b19f95d7ca023c4972c22f670fec840a606daf89ba
SHA3 7114b9e12e5f3a3dbd7847ef5c4700f10b675b16a8555a95b6fa676373213d20

4081

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x494
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.25423
MD5 f9a0c43a7ea01984fd9db4cb4e7a19f4
SHA1 60f05d41554e575a48f3effc75103df40ea2f50e
SHA256 4521f2e775df2bc680a431664c1f969b4bd05ee52c7990deb7dc4ec7562efe89
SHA3 9fe3898e374d457976228c9e715041397aa8e8c933d47334c97ed88019176495

4082

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x228
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.25172
MD5 d9d0da7af0f0504b74589598ff2e1c70
SHA1 4799539662f407a17b00b312aa65f7e06b5eb6e5
SHA256 c430636a95d6e0b1f5589be5f1a05cc61af94b61bbe7146aeb6cd8d42abad591
SHA3 95d9f5c56d8f1773da6b8d5b3b3f3c1cff65bad64fe44bd50c3ae511300d0fab

4083

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x4a8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.42342
MD5 88d5f5d4e648ab6cf2393bef4bbd94f5
SHA1 4a2d952ee02431673e836f8dc9192e8929c88f2e
SHA256 230badb5d25523b733dae26fcfb1d24c5e1dac23144cef629658b7547977a438
SHA3 dd414aa967a5efe299d5147dee788d1be43dac5321020f0d25f79afbadfd8d42

4084

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x4b4
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.27144
MD5 56f1691ac141e0526063600ccd68d14d
SHA1 1100958122a9c02ba1d7c3a93c1b650ed0069c8b
SHA256 0651fd099b014cff054922a9677a87d5a6f3bd5ae2db06eb209e48d0ffedf90c
SHA3 e5be586b00f633f053ddce0dd967d65cf1f4284b27f88496d6ddc88f46df3e9c

4085

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x5a8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.31423
MD5 2be5611a61fddf1c8f1369b7a6afd79a
SHA1 fa2e9ab8e0b03457eaed40411d32dc92ed049e87
SHA256 2fc52a88b76696719ec0afb6fed2d661d8c1bea6cf1c0cabe1398b1c3f1dfb75
SHA3 6e6921aef19793551e67a367caab9f3651dc436f0973d09d8b2e3a723b3dbef1

4086

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x424
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.18688
MD5 7051685c8b6fac8e8e89117f33441207
SHA1 4d8573a2af1d3ff9c697634b19e69abd12a95ff1
SHA256 18510f6e9cec6d4622d23657a382393e248f73c1c1626fb8e47b524e2d25af92
SHA3 49db0f9c21426833c9c9123d360958d719ba3640328a53d69eb5042727e39a21

4087

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x34c
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.34127
MD5 dd1bb0a984bf95e762733ba774e8c812
SHA1 351d6be3e3d93927faf67f050c31545c1865294c
SHA256 f003ee33435b3f3d72bc699bd154eb596b2f9ac66d00aeb81a944c7200e695d5
SHA3 86a046d88c5a53862fc79d49c58c387b5cc14b767652c759bdf5f416183f0796

4088

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x360
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.29421
MD5 e4e682b5fb1e83fa3196c6213461ae38
SHA1 a23aa3014e67c6b4f4b5fba07d62af0c0b28e4ab
SHA256 ca6f4cc47a7b2f97143cabfd410af557e2c697fe9de0c19ef3a5e3faabe9df74
SHA3 d6062b54ae7bd9ad57c1c6d045980b329c08e834a55c81e38c9cecb83626524f

4089

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x414
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.33564
MD5 4f415c2a0043afd59dcd478f624006ca
SHA1 bf0909d37b631342a59a4a8b0c31289e5f79b2e8
SHA256 65f2fa7a993694749c739086ff4a6dfe7a111824b4185cd2aa237a0431bbd1de
SHA3 0dd5c2a28010d90fda69e27dedc4c0eab61807bd778cd95e34472a5cb806e0ac

4090

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x108
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.21998
MD5 9933ed9224c4c2e91380fef66a0e1beb
SHA1 26461c98544d572657722892b0f079fa93d444cb
SHA256 1da5614fbdcded0b9a021776217b90bc6ef0e83e962fef10f2bc60486937b438
SHA3 151865d066075f5a9be27c72388efe077be1cd3398bf13bde032f04efc23497e

4091

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xcc
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.34426
MD5 6884c8135d8822921b30f5ada0bd1a09
SHA1 8ba1ace07e09fcba5bc138e02a611b83609923f7
SHA256 c6ec1e31e5a3b39db364ef98b5f44727eb821481518601e0d62a61a597231363
SHA3 f9e3f673b25f489b83723c8d7f067c5c05f8cb8d1baa72e14cedc27cac20bce0

4092

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x244
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.35987
MD5 fd85762bbaac2dc7f99c7444ffaa0605
SHA1 577530b4d3631907674332fafc253ebbe0544a43
SHA256 a89734b91c14b8c0cfbe0267595c3e3192392a1cb7dab7870de37cfc0fbe33c9
SHA3 3ffc80910aba1e124bbed2d71c45576ae2acd343ea459040428428af17040855

4093

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x414
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.32985
MD5 841394712bdddbb9ab326971df10ba5c
SHA1 2e14a56e86eff2c643166f8a11bce2115607d7be
SHA256 a994360204f893513d5d8bf822748f74103155283d449c5c21457ad419ca607a
SHA3 9d5598522c98251f996ef21b17fdae90797f2ea2a3392eb5053b9fe5e15f8dc6

4094

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x358
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.30562
MD5 b29cee4e699cc0fb800baeb9bc52dfc8
SHA1 b19b71aceb4931fb5980b9131a25660deec5c928
SHA256 25833c4e54acc8c20deaec620cb0bf2173cf2b37874050517d4b98846975255a
SHA3 292a1d57a9956e8c95889e4eaa39e0b648353fc5b900fd8548ef3689d6909562

4095

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x318
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.33405
MD5 0cce9b165b6494fb6ca6af28cf356fa8
SHA1 623aafe23d80141cd55f913fd059d56bfa5cc37c
SHA256 91a1a79d1c5d33e5840ae5847f3e4e9dda646078e189940237ba3840c2c899fb
SHA3 af4b6e56b3bfdc31ffd148c554a46c800b70824578fa7bd3bc28aaa7d11d24b6

4096

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2f8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.25972
MD5 2c9b6b2f92f74e85c3d1dc2e9cfd701b
SHA1 5e6a87702dd20725f767348b1100397be1bb4ae0
SHA256 ecff3ce369fa9ad8858a64c590c4f314ea068e700afa64bb81ceea9d1a50f3e0
SHA3 52bd52f7f81266fe9a122a3b4b4354b2853e0f9565363fb8fd9e530a6aff178e

AMDCPU

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x6fa0
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.26704
MD5 902c701b6d8c9a3076b1c6cd5c034b44
SHA1 d0c1fd5714bfe1c178b7b22c37cce19f6a530c15
SHA256 3fb9562842a2b18c49344e866469f63420a583b0ca5ea3acdc63a6c3f81f893c
SHA3 b6f2af1992925ab9d6746251dad4b6f4057a5af65fa04a386fc8d04fc4a14ce5

BBABORT

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd5d
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89162
Detected Filetype PNG graphic file
MD5 99b78a6d60ad5bbba00abcda7c828118
SHA1 c4f87a24d3cc5f04ce7eba36c3288c7c236600a1
SHA256 3ac8f7519752b957391eb7fd849f189c98d4776f6db5dba2ff695c318bb8d250
SHA3 1644ba86cf4452ef097c5b1e7949d71f40d4da4a77e5219c084fd5bce786c5e1

BBABORT_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd57
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89925
Detected Filetype PNG graphic file
MD5 d6aef017df81b91cf894f5ad249ae636
SHA1 11912ad210fbd633d8533cfd8cb32972a454435c
SHA256 a7370b9224d35ecaba7006c72fd69d91383dd614efb531f3731088eadfba5847
SHA3 ca27648919401713c045ced4d64e3ffaa9f9cfee302269a5fcb4204a625201af

BBALL

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xcfc
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88971
Detected Filetype PNG graphic file
MD5 fc86e3262da3c43f6464c6222fb6a0b3
SHA1 efd744e2ad7b8f1fb71d2ca865496b60d5774bd5
SHA256 8241bdc2a181b30df7923f8a971ed1d8651aba3a7f92b2c0e1175879e5c7e454
SHA3 04df9f16d2c5c4bf0605d58bc110287c4d0a08437b1e6a31ca21e4f789dad9bd

BBALL_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xcd9
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88726
Detected Filetype PNG graphic file
MD5 7df91faa4045eb7842aded81610d3743
SHA1 2e5d6f6eb75a89e5faa1a81b75962450e4d1c286
SHA256 c06f5bd42b0d87761f00dee7ff69b23c11afc469e093865c8e81db4e195c2ca5
SHA3 7a842762047d7a26dd82e564f2512773d5c20d967d789b95b956ba224778b388

BBCANCEL

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd5d
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89162
Detected Filetype PNG graphic file
MD5 99b78a6d60ad5bbba00abcda7c828118
SHA1 c4f87a24d3cc5f04ce7eba36c3288c7c236600a1
SHA256 3ac8f7519752b957391eb7fd849f189c98d4776f6db5dba2ff695c318bb8d250
SHA3 1644ba86cf4452ef097c5b1e7949d71f40d4da4a77e5219c084fd5bce786c5e1

BBCANCEL_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd57
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89925
Detected Filetype PNG graphic file
MD5 d6aef017df81b91cf894f5ad249ae636
SHA1 11912ad210fbd633d8533cfd8cb32972a454435c
SHA256 a7370b9224d35ecaba7006c72fd69d91383dd614efb531f3731088eadfba5847
SHA3 ca27648919401713c045ced4d64e3ffaa9f9cfee302269a5fcb4204a625201af

BBCLOSE

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xc4e
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88443
Detected Filetype PNG graphic file
MD5 5c111e6f982848c2f9a63d17b816bb05
SHA1 7ddeb1b7ef8fcd592927c672c62b392cf80d7458
SHA256 787ce1663a0821002a8f81762980a631b18508d4670990ea93b285f043b05bf9
SHA3 f7b031827a2202b94e960698e4ac3f63171000a6d6eab9bebbd259db5b3d219a

BBCLOSE_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xc4e
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.8746
Detected Filetype PNG graphic file
MD5 f32fb1b6f8f612b61886d4cdf8a17069
SHA1 3a5113cc5d0b814aa115257ca3d6d27d79e14c99
SHA256 24099968e6750fa012485ab8c7f22f80bf8e133a099893a7726a22c26603b2e8
SHA3 769a458f41ff372888773c3041afaea021fff1bd9ae8d9fe4f156b9a2a79ffa7

BBHELP

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xcb5
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88589
Detected Filetype PNG graphic file
MD5 f79abe4dc01dd0d6064b6211957e0f45
SHA1 f9aa8c037558bf04442d5b9333fd53fd0f6c9ef1
SHA256 f46ba9047501d14c9eea66cf85fa710fcee518ddbfa2f5cd727310e0ddf2a9a9
SHA3 93d8cc0e0011925573ca9788d0518eb8e715b090452aef4a222fcf14651a2ae7

BBHELP_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xcb0
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88975
Detected Filetype PNG graphic file
MD5 548bd941e093c889a5ae7a3b3ace6ba4
SHA1 3831bec2d44e864199e7b1be449e7313c55962f6
SHA256 6a78c0622687eae085945f24b3ab132e0e995d1d3329dbb04f0d8e1273ebf6fb
SHA3 11ded8b81dd6f0c05703b0dd98a5a5f23781eb9b1b372088110724dd0c53cbd7

BBIGNORE

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd56
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88943
Detected Filetype PNG graphic file
MD5 85cda61d477b44e8f511a88d98118cb2
SHA1 b691b28c60270af0b831ed74bb59ebe464845aa7
SHA256 9e5c7ef5099f983ca710a02f69e3ae8740ae18cffc5b97968a765299ebd5449c
SHA3 fb70aad7585b1b1794c60715376b9f7a2b47f1f5d0a3f15bc66b7acc707b7c4d

BBIGNORE_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd47
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88308
Detected Filetype PNG graphic file
MD5 fdab436c5dfca97eb5f82736f0233285
SHA1 6ff1e1a80c12a51ea169c19f717a8ac8fb977c85
SHA256 d4440fa7a5f6a4adb27a2a7d13c2e3ab62100d4c2fc8ba060c2518763944dc16
SHA3 e40c4de01c7fbefe93ff4f72cce72ae45b69c086733df7a6a7f7b60b677e28fe

BBNO

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xdc2
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89641
Detected Filetype PNG graphic file
MD5 d3d8d7b7abbcfb64c009d8ce02668e58
SHA1 27a064defa792afedfc93c6070ddff89fc8bdff4
SHA256 75260ba85bc33e2f54fd2f5d00245ff1ecc163b49b8b2744ac7f0c9a7e7e1083
SHA3 ce13dad2eb36165da786bdea16246ac2c0cfdce3bb928431a47c389e3d6f5b3f

BBNO_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xdc5
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89332
Detected Filetype PNG graphic file
MD5 cbefedbc04934707126d24c5704d7af0
SHA1 10142e9b60c6ad75656f67106ee50626bde2dac0
SHA256 c80a04b8e5fd325508723e635a472f0b27e455b9e50636f237ab913851fa1afe
SHA3 22a90e9d408f85f2cc4a43905bf3e91deb37642e52b4ca6f584e612879288d48

BBOK

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xcf3
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88545
Detected Filetype PNG graphic file
MD5 86b421c66578ba71a6b3f0dae8b1ac91
SHA1 cbbbb0491b871c52b6b8714fc914a8d0895eb7fe
SHA256 a17599bc73d2080a620fb0a855ab9ef89d04ea88619a19404640a64e3d54e199
SHA3 3d2dba083398696893de46f043726eb22e654385305261b74291c7b8526168ab

BBOK_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xced
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89033
Detected Filetype PNG graphic file
MD5 d7b8e1dc8f286a50e9c41edfb0ddafcc
SHA1 afcec9be84b9c35278f37c867a03877746ebc2f0
SHA256 3af0bcbf8a3b7dbcdb117ad248468c94be8c79e0e34e4e4a496f01723d29b427
SHA3 f7d7aaeeee143070ecdae7c83e3c8f225b6375de0eebc3f174b9611ed3fb9bf6

BBRETRY

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xda9
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89289
Detected Filetype PNG graphic file
MD5 d14d91391b1eb8c924542dbf0d060fab
SHA1 b2a6f235feaec3aae5f59e6d4a041f5be7ffd9ef
SHA256 77f0781e15c03deb75066f00a0be3e42ec232a84a6ebdc4be2763930c8a85a88
SHA3 b1b307f3dae0b380069cb03266e6717b00a90ab16174c134a7a3a828877e66ec

BBRETRY_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xda6
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89259
Detected Filetype PNG graphic file
MD5 46c10886481e7ece293922e3bff470f9
SHA1 5f8fc6345e0464dcf8203f7120f148ab5a14d790
SHA256 a2632b70d7b0b52d53a0fe5989f4453054367027394ffa439edd97c61dda3f16
SHA3 6316fc6fea5540a610e20ad8787a32f219c9c85fc7adab12e45b09294d44686a

BBYES

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xcf3
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.88545
Detected Filetype PNG graphic file
MD5 86b421c66578ba71a6b3f0dae8b1ac91
SHA1 cbbbb0491b871c52b6b8714fc914a8d0895eb7fe
SHA256 a17599bc73d2080a620fb0a855ab9ef89d04ea88619a19404640a64e3d54e199
SHA3 3d2dba083398696893de46f043726eb22e654385305261b74291c7b8526168ab

BBYES_DISABLED

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xced
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89033
Detected Filetype PNG graphic file
MD5 d7b8e1dc8f286a50e9c41edfb0ddafcc
SHA1 afcec9be84b9c35278f37c867a03877746ebc2f0
SHA256 3af0bcbf8a3b7dbcdb117ad248468c94be8c79e0e34e4e4a496f01723d29b427
SHA3 f7d7aaeeee143070ecdae7c83e3c8f225b6375de0eebc3f174b9611ed3fb9bf6

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x10
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.75
MD5 fa1c96712ab8720f82ad4095daf7cee5
SHA1 abe71b9873e6e494a7d9de8f1f1985c550fc6b59
SHA256 10ca7c7ba673f29383bc50d1becb5fbeddddecaa6109de088da9a94c74d4f1c4
SHA3 c3be1ab5871e6568c50c4c2dd73e7c8c09d9e9451b256e9871c537b6da54a299

INTELCPU

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x15bfa
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.0553
MD5 f5633f6009491b60b11d9f47eab1850a
SHA1 f6352c58e6998d82c57ea703ce420b75759b6fbb
SHA256 1ecefc0d0f56f90138a99b282c863e1577df6fbd7a696c8a7d855eb24383078d
SHA3 7e653ea70ffcc23336e5b23d860fd926b83313ddf240020a94c75061ae6de5ee

MSG_ERROR

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x148b
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.93139
Detected Filetype PNG graphic file
MD5 50ea148a8b3f8e6e0bcf6b37918f4a93
SHA1 4d4a0a69e7f3f1a234cf4edcf3a897e18531b07e
SHA256 e74432afd4c7fe4cfb0cf8425ae298fcf425e0f0437510bde8546dbd02da0a2d
SHA3 de40febb93ab240fba58daff4f662e8f6889974a0fbadb23d2009c6efa445253

MSG_INFO

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x111e
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.90721
Detected Filetype PNG graphic file
MD5 51ffac6dde5a49e226a5435dc08656a0
SHA1 2d4a625ab8c1c45ed5f0e2a4e4138077d5ee89e6
SHA256 25e3ec43b207e22a0ee7701b9525975043ec2817e492dd07eb40306b944374c4
SHA3 becc7f28397fc80e9d96cdd13bb0a732ea8935cbde51c448e367e6bdbcbf464e

MSG_WARNING

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd8c
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 7.89203
Detected Filetype PNG graphic file
MD5 481232c3ddd70cc57011d3d8ed8191ca
SHA1 8722e588f04dab44a4ec94e248d74d058f269220
SHA256 636f368c9f42323b69cdf2463823eadd363e91df7f37a9d0eb863708a7f3fb83
SHA3 1efc85d96c9733bb8129189eb537e3c4658563f0336bb33eba34707378eb9205

OTHERCPU

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xb8
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.05424
MD5 15ebab12261e520dbbee559c21da5836
SHA1 a41376ffe1e59b8dba169434ac0eee7d629bccc9
SHA256 a6f84c13b3c49caf8f3453ae4e3e23ae6496eb4ee27f05552c111671ca588834
SHA3 7feb957182981c7f0a794611cab20c1f619724e59f1b9241691d2a9bcfec9a21

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0xa68
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.32249
MD5 56e20d803052976ba950ed43bd08d2a3
SHA1 5c73ed724cdd9d83d0107c2fe49bab1088a113c8
SHA256 cb0a74d19451f5150f1f8c7010d7efae4a845b3b5f0835a2dfd92fc3a788d35b
SHA3 090491075aa3fe24d14a46b6175ca4edbfb2bb9926a1ca68db5ca66bb2d140ea

PLATFORMTARGETS

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x4
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 0.811278
MD5 4352d88a78aa39750bf70cd6f27bcaa5
SHA1 3c585604e87f855973731fea83e21fab9392d2fc
SHA256 67abdd721024f0ff4e0b3f4c2fc13bc5bad42d0b7851d456d88d203d15aaa450
SHA3 295cd1698c6ac5bd804a09e50f19f8549475e52db1c6ebd441ed0c7b256e1ddf

TFRMABOUT

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x5499
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.85651
MD5 203db00f6c288b04eed7233091d56c00
SHA1 f15d757575b479bf102a5ee47748540c3ca34341
SHA256 737101da8e02ecd58aa78d01bc3d5f15f3750d20a1306079c45008ce14344158
SHA3 adafff2a482f478574f52c9085362f19f1ec61409893795613597d2d1b6523db

TFRMFPCAMAIN

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x9bf7dd
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.50371
MD5 594f46629771dddebb89ee2325a27e9f
SHA1 f56075da862ef988dfb2f65d0303e44ad8bdeb4f
SHA256 0e560378b74164a63b9ba9fb0830dfd72727b89057a2df9dd59918054220a9f2
SHA3 0be93f14b8af15f59c66993044e87f7482211acd9522c4b33283f527404f1fc8

TFRMWAIT

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x3cb
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.41811
MD5 2b533e717f0c51bdbcbc770b07cd5cee
SHA1 ffd3cebfc93b1f64b63bebb733d1763680308806
SHA256 75fc50dab25e6ece4533e299446789cac3ad55dc8ccb82a540c1654f9dc161cd
SHA3 8d04739982827dc9c42a8bb8a9cc4ce5d85b18aa258d75361abf5075e64d0d55

CAT_DRAG_COPY

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 1.83876
Detected Filetype Cursor file
MD5 a2baa01ccdea3190e4998a54dbc202a4
SHA1 e8217df98038141ab4e449cb979b1c3bbea12da3
SHA256 c53efa8085835ba129c1909beaff8a67b45f50837707f22dfff0f24d8cd26710
SHA3 8874564c406835306368adf5e869422e1bb97109b97c1499caa8af219990e8dc
Preview

32761

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.01924
Detected Filetype Cursor file
MD5 b3dbdfe1835416bbc3f5065baca9aca9
SHA1 334d5af1355f6a13c35be4ad16e76baaecf209f1
SHA256 ec26c438d10e3e84ec855c47f07a176e6c11bbfae1557d526490711b80f087fe
SHA3 2409b439f48a139d3764b226eda46c6a629d5bd208991369ae0c85e37c17c71d
Preview

32762

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 1.91924
Detected Filetype Cursor file
MD5 aff0f5e372bd49ceb9f615b9a04c97df
SHA1 e3205724d7ee695f027ab5ea8d8e1a453aaad0dd
SHA256 b07e022f8ef0a8e5fd3f56986b2e5bf06df07054e9ea9177996b0a6c27d74d7c
SHA3 9cb042121a5269b80d18c3c5a94c0e453890686aedade960097752377dfa9712
Preview

32763

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.01924
Detected Filetype Cursor file
MD5 48e064acaba0088aa097b52394887587
SHA1 310b283d52aa218e77c0c08db694c970378b481d
SHA256 43f40dd5140804309a4c901ec3c85b54481316e67a6fe18beb9d5c0ce3a42c3a
SHA3 38753084b0ada40269914e80dbacf7656dc94764048bd5dff649b08b700f3ed5
Preview

32764

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.01924
Detected Filetype Cursor file
MD5 1ae28d964ba1a2b1b73cd813a32d4b40
SHA1 8883cd93b8ef7c15928177de37711f95f9e4cd22
SHA256 ff47a48c11c234903a7d625cb8b62101909f735ad84266c98dd4834549452c39
SHA3 a85dadd416ce2d22aa291c0794c45766a0613b853c6e3b884a2b05fc791427b8
Preview

32765

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.01924
Detected Filetype Cursor file
MD5 0893f6ba80d82936ebe7a8216546cd9a
SHA1 0754cbdf56c53de9ed7fbd47859d20b788c6f056
SHA256 a0adcedb82b57089f64e2857f97cefd6cf25f4d27eefc6648bda83fd5fef66bb
SHA3 ce6148ade08ef9b829f83cb13b4c650d9d4a7012bfd1ab697a7870a05f4104f8
Preview

32766

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.01924
Detected Filetype Cursor file
MD5 dcaa3c032fe97281b125d0d8f677c219
SHA1 58fe36409f932549e2f101515abee7a40cf47b2c
SHA256 6e1e7738a1b6373d8829f817915822ef415a1727bb5bb7cfe809e31b3c143ac5
SHA3 02ef292e1b4a70e439e362af6b4fa213e3816ade45222b78dabab712b6afba54
Preview

32767

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.01924
Detected Filetype Cursor file
MD5 a95c7c78d0a0b30b87e3c4976e473508
SHA1 b19f3999f1b302a2d28977cb18a3416c918d486c
SHA256 326c048595bbc72e3f989cb3b95fbf09dc83739ced3cb13eb6f03336f95d74f1
SHA3 8157b4e6afa7ed2e2ffc174d655bec9fb81db609e4c5864faa5ead931ff60689
Preview

MAINICON

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 2.69913
Detected Filetype Icon file
MD5 fc8846589a152507308beb48ead7a796
SHA1 787c24f9fbf50523b34bcb328ed56d33c4e7ffd7
SHA256 4a2d022975e1b62b89e1e757b73f563b68b21b71edf8cac8dbbf062b2cb2d2fe
SHA3 8ddbf8de92320682fb04bf04b166aab2b443a9fd6055b504b0c29ee44468a9c9

1 (#3)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x214
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 3.32041
MD5 4eefb77044dc2ebcfdf06dc2f54dad66
SHA1 6c8e68e8963fd7b11d49cf63417a4ad49a39dfe5
SHA256 da5428e3b415754d69bae5eab73c903a34eba52b5590c276b1e599dc910f787f
SHA3 644af66ae0af0af107194c84b3fb6b7a7d6d014fe4253e97111a42fca283d56b

1 (#4)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x716
TimeDateStamp 2026-Jan-09 18:17:26
Entropy 5.26758
MD5 5e0f4b7ae0e8e09db40209f0c8d59e2e
SHA1 b9ed3edd6e73ac5b17f0baad95ac24320a6de8f7
SHA256 a87fe171fba769aacaf45819d0b3c2239a0f7d85c8fcaa36d747afb61801dc08
SHA3 ea618875ecfa47de6e6dff45fea74c589c867337273dd407c03e96d5c514a44d

String Table contents

Invalid owner
%d is an invalid PageIndex value. PageIndex must be between 0 and %d
This control requires version 4.70 or greater of COMCTL32.DLL
Unable to retrieve a pointer to a running object registered with OLE for %s/%s
OLE error %.8x
Method '%s' not supported by automation object
Variant does not reference an automation object
Dispatch methods do not support more than 64 parameters
DCOM not installed
Failed to clear tab control
Failed to delete tab at index %d
Failed to retrieve tab at index %d
Failed to get object at index %d
Failed to set tab "%s" at index %d
Failed to set object at index %d
MultiLine must be True when TabPosition is tpLeft or tpRight
Invalid item level assignment
Invalid level (%d) for item "%s"
Invalid index
Unable to insert an item
Style '%s' already registered
Style class '%s' already registered
Style '%s' not found
Style class '%s' not found
Invalid style handle
Invalid style format
VCL Style File
Class '%s' is already registered for '%s'
Class '%s' is not registered for '%s'
%s parameter cannot be nil
A StyleHook class has not been registered for %s
Feature not supported by this style
Style '%s' is not registered
Cannot unregister the system style
Style not registered
Cannot call BeginInvoke on a control with no parent or window handle
UTF-8
UTF-7
Cannot remove shell notification icon
PageControl must first be assigned
%s requires Windows Vista or later
Button%d
RadioButton%d
Caption cannot be empty
Invalid canvas operation
%s has no owner
Source and destination require the same owner
%s cannot be owned by a different canvas
Not a solid color brush
Invalid brush style
Unable to load style '%s'
Unable to load styles: %s
Error loading previously saved settings file: %s
Would you like to delete it?
(No Name)
&Add or Remove Buttons
Reset Toolbar
Circular references not allowed
%s does not allow hiding
Unable to save settings
Would you like to reset to the default Priority Schedule?
No OnGetItem event handler assigned
A style named %s has not been registered
No ActionBand style unit present in the uses clause.
Your application must include either XPStyleActnCtrls, StdStyleActnCtrls or a third party ActionBand style unit in its uses clause
%s ActionManager property has not been assigned
ANSI
ASCII
Unicode
Big Endian Unicode
- Dock zone not found
- Dock zone has no control
Error loading dock zone from the stream. Expecting version %d, but found %d.
Multiselect mode must be on for this feature
Length of value array must be >= length of prompt array
Prompt array must not be empty
&Username
&Password
&Domain
Login
Cannot assign a subitem to an actionbar when one of it's parent's is already assigned to an actionbar
Item %s has subitems, delete anyway?
You are not allowed to delete this item
Item %s is not allowed to be moved
More Buttons
Expand
Ins
Del
Shift+
Ctrl+
Alt+
Value must be between %d and %d
All
Invalid clipboard format
Clipboard does not support Icons
Cannot open clipboard: %s
Text exceeds memo capacity
Operation not supported on selected printer
There is no default printer currently selected
Menu '%s' is already being used by another form
Docked control must have a name
Error removing control from dock tree
N&o to All
Yes to &All
&Close
BkSp
Tab
Esc
Enter
Space
PgUp
PgDn
End
Home
Left
Up
Right
Down
Icons
Bitmaps
TIFF Images
Warning
Error
Information
Confirm
&Yes
&No
OK
Cancel
&Help
&Abort
&Retry
&Ignore
&All
Can only modify an image if it contains a bitmap
A control cannot have itself as its parent
Control '%s' is used on a not main thread
OK
Cancel
&Yes
&No
&Help
&Close
&Ignore
&Retry
Abort
&All
Cannot drag a form
Metafiles
Enhanced Metafiles
Cannot make a visible window modal
Scrollbar property out of range
%s property out of range
Check state can only be set when CheckBoxes is True
Check state incompatible with treeview's CheckStyles
Menu index out of range
Menu inserted twice
Sub-menu is not in menu
Not enough timers available
Printer is not currently printing
Printing in progress
Printer index out of range
Printer selected is not valid
%s on %s
GroupIndex cannot be less than a previous menu item's GroupIndex
Cannot create form. No MDI forms are currently active
Invalid image frame index %d: there are %d frames (0-%d)
Invalid image size
Invalid ImageList
Unable to Replace Image
Unable to Insert Image
Invalid ImageList Index
Failed to read ImageList data from stream
Failed to write ImageList data to stream
Error creating window device context
Error creating window class
Cannot focus a disabled or invisible window
Control '%s' has no parent window
. Path:
%s
Parent given is not a parent of '%s'
Cannot hide an MDI Child Form
Cannot change Visible in OnShow or OnHide
Tab position incompatible with current tab style
Tab style incompatible with current tab position
Bitmap image is not valid
Icon image is not valid
Metafile is not valid
Invalid pixel format
Invalid image
Scan line index out of range
Cannot change the size of an icon
Cannot change the size of a WIC Image
Unknown picture file extension (.%s)
Unsupported clipboard format
Unsupported stream format
Out of system resources
Canvas does not allow drawing
Text format flag '%s' not supported
Windows 8
Windows 8.1
Windows 10
Windows 11
Cannot create instance of class %s
Observer is not supported
Cannot have multiple single cast observers added to the observers collection
The object does not implement the observer interface
No single cast observer with ID %d was added to the observer collection
No multi cast observer with ID %d was added to the observer collection
Observer is not available
Invalid date string: %s
Invalid time string: %s
Invalid time Offset string: %s
Must wait on at least one event
Cannot call BeginInvoke on a TComponent in the process of destruction
32-bit Edition
64-bit Edition
Windows
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 2000
Windows XP
Windows Server 2003
Windows Server 2003 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019
Windows Server 2022
No topic-based help system installed
No help found for %s
Argument out of range
Argument must not be nil
Item not found
Duplicates not allowed
Insufficient RTTI available to support this operation
Parameter count mismatch
Type '%s' is not declared in the interface section of a unit
VAR and OUT arguments must match parameter type exactly
Property '%s' is read-only
Property '%s' is write-only
RTTI objects cannot be manually destroyed by application code
Specified Login Credential Service not found
%s (Version %d.%d, Build %d, %5:s)
%s Service Pack %4:d (Version %1:d.%2:d, Build %3:d, %5:s)
Length of Strings and Objects arrays must be equal
Source and Destination arrays must not be the same
Class %s is not intended to be constructed
Invalid Timeout value: %s
SpinCount out of range. Must be between 0 and %d
Timespan too long
The duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValue
Value cannot be NaN
Negating the minimum value of a Timespan is invalid
Invalid Timespan format
Timespan element too long
No context-sensitive help installed
No help found for context %d
Unable to open Index
Unable to open Search
Unable to find a Table of Contents
Parameter %s cannot be a negative value
Input buffer exceeded for %s = %d, %s = %d
Invalid characters in path
Path is empty
The specified path is too long
The specified path was not found
The path format is not supported
The specified file was not found
The specified file already exists
?
No help viewer that supports filters
Invalid argument
String index out of range (%d). Must be >= %d and <= %d
Invalid UTF32 character value. Must be >= 0 and <= $10FFFF, excluding surrogate pair ranges
High surrogate char without a following low surrogate char at index: %d. Check that the string is encoded properly
Low surrogate char without a preceding high surrogate char at index: %d. Check that the string is encoded properly
Resource %s not found
%s.Seek not implemented
Operation not allowed on sorted list
String expected
%s expected
%s not in a class registration group
Property %s does not exist
Stream write error
Thread creation error: %s
Thread Error: %s (%d)
Cannot terminate an externally created thread
Cannot wait for an externally created thread
Cannot call Start on a running or suspended thread
Cannot call CheckTerminated on an externally created thread
Cannot call SetReturnValue on an externally create thread
Parameter %s cannot be nil
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
. %s range is 0..%d
. %s is empty
Out of memory while expanding memory stream
%s has not been registered as a COM class
Number expected
ANSI or UTF8 encoding expected
%s on line %d
Error reading %s%s%s: %s
Stream read error
Property is read-only
Failed to create key %s
Failed to get data for '%s'
Failed to set data for '%s'
A class named %s already exists
List does not allow duplicates ($0%x)
A component named %s already exists
String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Identifier expected
Invalid binary value
Invalid stream format
''%s'' is not a valid component name
Invalid property value
Invalid property path
Invalid property value
Invalid data type for '%s'
Invalid string constant
Line too long
Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid destination index (%d)
Invalid code page
Invalid encoding name
No mapping for the Unicode character exists in the target multi-byte code page
Invalid StringBaseIndex
'%s' is not a valid %s color value
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range
Can't write to a read-only resource stream
''%s'' expected
CheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
Sun
Mon
Tue
Wed
Thu
Fri
Sat
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Invalid source array
Invalid destination array
Sep
Oct
Nov
Dec
January
February
March
April
May
June
July
August
September
October
November
December
Monitor support function not initialized
Feature not implemented
Method called on disposed object
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%s%s
A call to an OS function failed
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Custom variant type (%s%.4x) is out of range
Custom variant type (%s%.4x) already used by %s
Custom variant type (%s%.4x) is not usable
Too many custom variant types have been registered
Could not convert variant of type (%s) into type (%s)
Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
Object lock not owned
Application Error
Format '%s' invalid or incompatible with argument
No argument for format '%s'
Variant method calls not supported
Read
Write
Execution
Invalid access
Format string too long
Error creating variant or safe array
Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation
Invalid NULL variant operation
Invalid variant operation (%s%.8x)
%s
Invalid numeric input
Division by zero
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Exception %s in module %s at %p.
%s%s
<unknown>
'%s' is not a valid integer value
'%s' is not a valid floating point value
'%s' is not a valid date and time
'%d.%d' is not a valid timestamp
'%s' is not a valid GUID value
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 5.3.109.125
ProductVersion 5.3.109.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
FileVersion (#2) 5.3.109.125
ProductVersion (#2) 5.3.109
ProgramID com.embarcadero.freepcaudit
FileDescription freepcaudit
ProductName freepcaudit
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x740000
EndAddressOfRawData 0x7400cc
AddressOfIndex 0x714c48
AddressOfCallbacks 0x741010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0! [*] Warning: Section .tls has a size of 0!