ac87ea51092aa42646ba70304cc91af7

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2022-Dec-07 14:16:11
Detected languages English - United States
TLS Callbacks 2 callback(s) detected.
FileDescription AdGuard Web Installer
LegalCopyright (C) 2009-2018 Adguard Software Ltd
ProductName AdGuard Web Installer
ProductVersion 1.0
CompanyName Adguard Software Ltd

Plugin Output

Info Interesting strings found in the binary: Contains domain names:
  • adtidy.org
  • http://static.adtidy.org
  • http://static.adtidy.org/windows/setup.exe
  • https://static.adtidy.org
  • https://static.adtidy.org/windows/setup.exe
  • static.adtidy.org
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
  • LoadLibraryExW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegisterHotKey
Possibly launches other programs:
  • CreateProcessW
  • ShellExecuteW
Has Internet access capabilities:
  • InternetCloseHandle
  • InternetOpenUrlW
  • InternetOpenW
  • InternetReadFile
Can take screenshots:
  • CreateCompatibleDC
  • GetDC
Info The PE is digitally signed. Signer: Adguard Software Limited
Issuer: Sectigo Public Code Signing CA R36
Safe VirusTotal score: 0/71 (Scanned on 2023-09-21 18:21:47) All the AVs think this file is safe.

Hashes

MD5 ac87ea51092aa42646ba70304cc91af7
SHA1 5dfe8d7d5d8ca5e44a0cb7ec4365e4a6a69c6cff
SHA256 852cb116029c96be04c368339ae9e80f37b0c67c773dc6ec817a92822526a10d
SHA3 0c1cd6c77b58fa7cb9872a187a0ec586e9de56d6ddc3d03f5049256c89b07bd6
SSDeep 3072:V4qZHnMyBV3vwhLFvGyfmKvK9MkBrM8wvFxt:V4qZHdV3vYvK9MkhKvl
Imports Hash b26a7e001a4be269742be838dadc9db9

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 10
TimeDateStamp 2022-Dec-07 14:16:11
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0xb200
SizeOfInitializedData 0x20600
SizeOfUninitializedData 0xc00
AddressOfEntryPoint 0x000014B0 (Section: .text)
BaseOfCode 0x1000
BaseOfData 0xd000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 1.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x27000
SizeOfHeaders 0x400
Checksum 0x2473d
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x200000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 5cce674b251f0ff6eb8b7bd87413cf33
SHA1 752f3f869ebf7596926e3f98ab064b22f17f8f83
SHA256 413732538f1d731742a83131637fd566cc95ae43dfada6c9661a256445c35650
SHA3 88ef40626a0ec786f13fb81bbc31116417a3c342f820f6b4d4bc01e3f3ee116a
VirtualSize 0xb0d4
VirtualAddress 0x1000
SizeOfRawData 0xb200
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.24473

.data

MD5 135346e80cc1f412f7ec4e077097976c
SHA1 afe478de1816427dcbecf8bc1d68ecd213e7b1fb
SHA256 521cca7fcc9356105ebb88057c762a53dfdc9a0726a75ef08f4b9bd7429f9882
SHA3 5e547186e47020f9af4a38f15b8eb8604b4209fcbf611fd2ea301386cba96601
VirtualSize 0x4a4
VirtualAddress 0xd000
SizeOfRawData 0x600
PointerToRawData 0xb600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 1.08173

.rdata

MD5 79d1949f2d627c3c1cad1bdfe41201ec
SHA1 6efc3cad09718b95d176a00c435da4597fd64c5a
SHA256 3def49a74297b64aadad6e00c6eb757817deb5c769fac06e197d440f459eb232
SHA3 64eb1fdca318d5e08e1ffc6a503d6fd00cddc4d18339daa085077429d5787a6a
VirtualSize 0xbc0
VirtualAddress 0xe000
SizeOfRawData 0xc00
PointerToRawData 0xbc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.3011

.eh_fram

MD5 923ae17274e756093759304ab472082f
SHA1 2e5d358e4eb48a14ef1063de58ff404e1486e621
SHA256 40b281aa324723c145d266ded9e3e42dc35f0584e0512333482b8d25b4fe7cbb
SHA3 724874fd9147a1b4e7787dc7e57141cf211bfbd816a08528a6449899d6c03bed
VirtualSize 0x1fb0
VirtualAddress 0xf000
SizeOfRawData 0x2000
PointerToRawData 0xc800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.93391

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0xa74
VirtualAddress 0x11000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 7cf265bc970978cf36ffcbe8a9a610da
SHA1 c6141772a3f92beca132cb4cb5e98fa324d635fe
SHA256 016904b3586d9bad23a12a4832e952b21a19c10a8d7b1315248e02148f2d12d0
SHA3 9029343453220ee163d748ac8feeb0e27a1bcf5c349878d6b475ef963ea9a951
VirtualSize 0x1d0c
VirtualAddress 0x12000
SizeOfRawData 0x1e00
PointerToRawData 0xe800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.37266

.CRT

MD5 4eef9a9546f6bf89752c594cebb6c33b
SHA1 52c81085e8c0f3ce2520bd7830c8c89e491f8370
SHA256 8d04890272094648fe60688d30e22caed4c7e657462b7d4e52288331cb3822c7
SHA3 deb41eef9263d850c2fdf57e0079e13536a77cffbfb74142dfce021f27217b82
VirtualSize 0x34
VirtualAddress 0x14000
SizeOfRawData 0x200
PointerToRawData 0x10600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.260158

.tls

MD5 bf619eac0cdf3f68d496ea9344137e8b
SHA1 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5
SHA256 076a27c79e5ace2a3d47f9dd2e83e4ff6ea8872b3c2218f66c92b89b55f36560
SHA3 622de1e1568ddef36c4b89b706b05201c13481c3575d0fc804ff8224787fcb59
VirtualSize 0x8
VirtualAddress 0x15000
SizeOfRawData 0x200
PointerToRawData 0x10800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0

.rsrc

MD5 c9110b92017325fdc1122be880a5d8e3
SHA1 a7bb32eed18f504391509f552abfc50071e74ac3
SHA256 b29c84463510a333f8e017446fca20076ea06b520344f2d3abaebe10c56140ce
SHA3 c8f840b8b8749434010432d0a6430536518fc61102d4700aef154a671a6ce331
VirtualSize 0xf610
VirtualAddress 0x16000
SizeOfRawData 0xf610
PointerToRawData 0x10a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 6.31733

.reloc

MD5 b8cec5e153b46df8eb6be699ee49b81e
SHA1 5c5c0564a8d350cc0a731d432690d7e1cc2f5932
SHA256 5da47f6eea6caa43b1f95d80c99668b517c3e352bb830fd556fc0b290645291b
SHA3 3cd2fe4c1860d0681a409b46e46b0b580a71b7eaedf4f7c14c9451cce3d0fdca
VirtualSize 0x7ac
VirtualAddress 0x26000
SizeOfRawData 0x800
PointerToRawData 0x20200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.51829

Imports

COMCTL32.DLL ImageList_Create
COMDLG32.DLL GetOpenFileNameW
GetSaveFileNameW
GDI32.dll CreateCompatibleDC
CreateFontIndirectW
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
SelectObject
SetBkMode
SetTextColor
gdiplus.dll GdipAlloc
GdipCloneBrush
GdipCloneImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateFromHDC
GdipCreateHBITMAPFromBitmap
GdipCreateSolidFill
GdipDeleteBrush
GdipDeleteGraphics
GdipDisposeImage
GdipFillRectangleI
GdipFree
GdipGetImageHeight
GdipGetImageWidth
GdiplusShutdown
GdiplusStartup
KERNEL32.dll CancelWaitableTimer
CloseHandle
ConnectNamedPipe
CreateDirectoryW
CreateEventW
CreateFileMappingW
CreateFileW
CreateHardLinkW
CreateIoCompletionPort
CreateNamedPipeW
CreateProcessW
CreateThread
CreateWaitableTimerW
DeleteCriticalSection
DeleteFileW
DisconnectNamedPipe
EnterCriticalSection
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FindResourceW
FormatMessageW
FreeLibrary
GetCommandLineW
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesExW
GetFileSizeEx
GetLastError
GetLocaleInfoW
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNativeSystemInfo
GetNumberOfConsoleInputEvents
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessTimes
GetQueuedCompletionStatus
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadTimes
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadResource
LockResource
MapViewOfFile
MoveFileExW
MultiByteToWideChar
PostQueuedCompletionStatus
QueryPerformanceFrequency
ReadConsoleInputW
ReadFile
RemoveDirectoryW
SetConsoleCtrlHandler
SetConsoleMode
SetDllDirectoryW
SetEndOfFile
SetEvent
SetFileAttributesW
SetFilePointerEx
SetLastError
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SwitchToThread
TlsGetValue
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
MSIMG32.DLL AlphaBlend
msvcrt.dll __getmainargs
__initenv
__lconv_init
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_daylight
_errno
_initterm
_iob
_onexit
_stricmp
_timezone
_tzset
_wcsicmp
abort
atoi
calloc
exit
fprintf
fputc
free
fwrite
localeconv
malloc
memchr
memcpy
memset
qsort
setlocale
signal
strchr
strerror
strlen
strncmp
vfprintf
wcslen
ole32.dll CreateStreamOnHGlobal
SHELL32.dll DragFinish
DragQueryFileW
ExtractIconExW
ILCreateFromPathW
ILFree
SHOpenFolderAndSelectItems
ShellExecuteW
Shell_NotifyIconW
USER32.dll CallWindowProcW
CloseClipboard
CreateAcceleratorTableW
CreateWindowExW
DefWindowProcW
DestroyAcceleratorTable
DestroyWindow
DispatchMessageW
EmptyClipboard
FillRect
GetClientRect
GetCursorPos
GetDC
GetFocus
GetMessageW
GetParent
GetWindowLongW
GetWindowPlacement
GetWindowRect
IsWindowVisible
LoadCursorW
LoadIconW
LoadImageW
MessageBoxW
OpenClipboard
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassExW
RegisterHotKey
ReleaseDC
ScreenToClient
SendMessageTimeoutW
SendMessageW
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetWindowLongW
SetWindowPlacement
SetWindowPos
ShowWindow
SystemParametersInfoW
TrackPopupMenuEx
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdateLayeredWindow
WININET.DLL HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetReadFile

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.64229
MD5 a66f3a1a9ed27fc33a4ecf33ebfcf801
SHA1 0b245ef432a8307738861091c8362e5379d9be84
SHA256 d654d23d5c78271ee430f40f48c712bd6a2ad10f73dce77dfceb3d667a592853
SHA3 1e5b6f5bc3c2e99901c2a6ee56c543f6e47a408881d3cbae07e1b1f6cb0aeac2

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.19566
MD5 08ea3583d577934b8beaaed10fcf9495
SHA1 1917568ea61559768d71f20e756d51689057ff89
SHA256 146a9676c314a02e0384e4220de88214e5db7ba1fa335dbceaefdf74f7f7f8f0
SHA3 0056cc5c05298ca00908c3370c7b82a7ccd8e9fbe1de7a8af9dcf5dc74d70074

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.87369
MD5 e6b8a9583df10030ad126e683f22fcd4
SHA1 3648d92a52969c09eab658007714de510ca0e611
SHA256 69dc4c8c1889e50d77bdd5c3c25f18c389dd37999d1292e017edd76dd922f708
SHA3 560d6c241a467ebb1f158f89b53de3f93af9ec854746ffa4b18da417152f493d

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.71257
MD5 8cca431b8432e7742d9f0e1a4374a279
SHA1 64174d47425fa8ad1bf06d12390af4ebf99f2a2c
SHA256 97f7133d114f97284c489b3b91e232640810aacbf1c48788a6d140d63831c12c
SHA3 88d9b0456d166e6fd5932f153378a738af02d7940d5e6332bca3296f6c5374a0

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x330e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.95846
Detected Filetype PNG graphic file
MD5 e26d1db86f72ad42bc95df47560d0348
SHA1 23867aeafa6aae1828953ae7fd2f8f8034fc8ffb
SHA256 be6bd3d98fe2bd8cb1beee833a47662d45f929bb79c6578d248a73ad87aa8c47
SHA3 39e2d8a708e179bfb2051cd9e414db9330889167b4c09c077fa51f525f544965

3 (#2)

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x11c0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.80246
Detected Filetype PNG graphic file
MD5 e5555b2f44c4f57ccf298966647e94aa
SHA1 9c92d7a359d95ef9ab0560d55227c668c099e649
SHA256 efd7ce4379600eb79021859ea997a881a2862ed807211d2040eefd83c86a6e74
SHA3 6d07b6157d77492bf5ece2e43e6ab5e1c768153ce66fee6f1776b981e9e8dca4

4 (#2)

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x23f4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.85243
Detected Filetype PNG graphic file
MD5 8156daae86328b5bbd5b06a6aec3032f
SHA1 96f1a7843d7016b6ccf38cf842980118395b6ac5
SHA256 8eb7a2cf395b919977e3b93ec4c495597096ab1c24061bf90cef2e2a1c0be7c3
SHA3 038373aa8819af1a2084157c7081ac50046dea7ee1a466de0759bc2a089903b7

5 (#2)

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xcb
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.26066
Detected Filetype PNG graphic file
MD5 8452f5f97986dae701778237599812c1
SHA1 171096712fbe7c1a2b1584a32fce308a58439def
SHA256 8c973cb7aa44b0a7cb8a9c42d5608f89fff9f8a3eb3b29f0467a49ccea021b81
SHA3 ff44c528df71ae1a3190d0de309c4b02f274910f29debaba6a7a7534fb10593e

6

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x154
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.97354
Detected Filetype PNG graphic file
MD5 788f0902a39efff6a9db6cff2180752c
SHA1 601192be8973f1334e7d6912728951b470faa3a6
SHA256 0418befebc44d9aa6ef403d91006b95fc8609b03cd9b160c120a1d79c0d8f26d
SHA3 91d958ef689b482024246fc27f092fe57277eedff357f0a389b9fe3ee12d656c

2 (#2)

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.64638
Detected Filetype Icon file
MD5 651da54c3921247a91a4a50771228b6f
SHA1 0f04901e598cd0f9c0200808957eedd55e9c0125
SHA256 1ba3f995c383048495036eaafd1aa465bf6040d4ddfbb1b38052e784cef13050
SHA3 228b0f2e0bb93640dabe582bb724ea407ff159f1e0a705d2c1295bba767a18f6

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x260
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33679
MD5 f057fdf72ab454c9a86170d79d9c7e96
SHA1 9d6775c1b2813ec29f7aa140bff0f5e2e73c358f
SHA256 984cbccd898a60558bcad628816542117259fb5b888d32108444fb894fb33a82
SHA3 65d691f7625ad6f605e7505a1a8494866a7695002363d0154913c11fd86b6612

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x3dd
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.16607
MD5 3282caa99acbbfc0b6ed9e97869b25f2
SHA1 c73fd6558ea1e53852778f11497b10363a0dc08e
SHA256 6f05714149fc5e910e659d41c335fdcce13299d44a2a7646c81d46ba03fb9a74
SHA3 d0b88e31758ed31f5e07866a49be282b121b093348e4c1b5af3ba205874c1297

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs (EMPTY)
FileType VFT_UNKNOWN
Language English - United States
FileDescription AdGuard Web Installer
LegalCopyright (C) 2009-2018 Adguard Software Ltd
ProductName AdGuard Web Installer
ProductVersion (#2) 1.0
CompanyName Adguard Software Ltd
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x415000
EndAddressOfRawData 0x415004
AddressOfIndex 0x411064
AddressOfCallbacks 0x414020
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks 0x00401780
0x00401730

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0!
<-- -->