c56b5f0201a3b3de53e561fe76912bfd

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2018-Mar-15 13:14:39
Detected languages English - United Kingdom
English - United States
CompanyName AutoIt Team
Comments http://www.autoitscript.com/autoit3/
FileDescription AutoIt v3 Script
FileVersion 3, 3, 14, 5
InternalName AutoIt3.exe
LegalCopyright ©1999-2018 Jonathan Bennett & AutoIt Team
OriginalFilename AutoIt3.exe
ProductName AutoIt v3 Script
ProductVersion 3, 3, 14, 5

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Suspicious Strings found in the binary may indicate undesirable behavior: Is an AutoIT compiled script:
  • AutoIt Error
  • reserved for AutoIt internal use
Contains domain names:
  • autoitscript.com
  • http://www.autoitscript.com
  • http://www.autoitscript.com/autoit3/
  • www.autoitscript.com
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryExW
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • CreateToolhelp32Snapshot
  • FindWindowW
Code injection capabilities:
  • OpenProcess
  • VirtualAllocEx
  • WriteProcessMemory
  • VirtualAlloc
Code injection capabilities (PowerLoader):
  • FindWindowW
  • GetWindowLongW
Can access the registry:
  • RegisterHotKey
  • RegEnumValueW
  • RegDeleteValueW
  • RegDeleteKeyW
  • RegEnumKeyExW
  • RegSetValueExW
  • RegOpenKeyExW
  • RegCloseKey
  • RegQueryValueExW
  • RegCreateKeyExW
Possibly launches other programs:
  • CreateProcessW
  • CreateProcessAsUserW
  • CreateProcessWithLogonW
  • ShellExecuteW
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Uses functions commonly found in keyloggers:
  • GetAsyncKeyState
  • AttachThreadInput
  • MapVirtualKeyW
  • GetForegroundWindow
Has Internet access capabilities:
  • InternetQueryDataAvailable
  • InternetCloseHandle
  • InternetOpenW
  • InternetSetOptionW
  • InternetCrackUrlW
  • InternetQueryOptionW
  • InternetOpenUrlW
  • InternetReadFile
  • InternetConnectW
Functions related to the privilege level:
  • AdjustTokenPrivileges
  • OpenProcessToken
  • DuplicateTokenEx
  • CheckTokenMembership
Enumerates local disk drives:
  • GetDriveTypeW
  • GetVolumeInformationW
Manipulates other processes:
  • OpenProcess
  • WriteProcessMemory
  • ReadProcessMemory
  • Process32FirstW
  • Process32NextW
Can take screenshots:
  • FindWindowW
  • GetDC
  • CreateCompatibleDC
Reads the contents of the clipboard:
  • GetClipboardData
Can shut the system down or lock the screen:
  • ExitWindowsEx
  • InitiateSystemShutdownExW
Info The PE is digitally signed. Signer: AutoIt Consulting Ltd
Issuer: GlobalSign CodeSigning CA - SHA256 - G3
Suspicious VirusTotal score: 2/70 (Scanned on 2021-01-28 21:27:51) APEX: Malicious
Jiangmin: Trojan.Miner.ffr

Hashes

MD5 c56b5f0201a3b3de53e561fe76912bfd
SHA1 2a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA3 8b268906fa674e2d08364e49bd3198579435de174c0e81570a83423010be520d
SSDeep 12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
Imports Hash 93ef7d8f5e8c48c0e6fa9e0805c5a443

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x118

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 5
TimeDateStamp 2018-Mar-15 13:14:39
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 12.0
SizeOfCode 0x8e800
SizeOfInitializedData 0x4d800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00027FFA (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x90000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.1
ImageVersion 0.0
SubsystemVersion 5.1
Win32VersionValue 0
SizeOfImage 0xdf000
SizeOfHeaders 0x400
Checksum 0xdf890
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x400000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x400000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 37545704cd94410041e41f7b2d95d901
SHA1 8e9612760cf3d292149679485dc68b3033c590e4
SHA256 e5852635547d75252b6415bc614590e9c288d264e1e8cb6e19aff7568fa6aa01
SHA3 e6e6f62537a12aa6afe5afda1cd4a81addf26520c0ef83c7041eb45d852addd1
VirtualSize 0x8e7b1
VirtualAddress 0x1000
SizeOfRawData 0x8e800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.66712

.rdata

MD5 3017eb0c8a06753c1daafc504270d99d
SHA1 9b6b4b1c8fcbd6e805199bf9b1e5504252027988
SHA256 54716f42aea873871717fcf65defffabec8e32d82bc1190f180aedf013ce9ab9
SHA3 190862bf38cffa1ef31e48e4129eb8f3b1b5b863a1eb870eb20406f28fd304b8
VirtualSize 0x2fd8e
VirtualAddress 0x90000
SizeOfRawData 0x2fe00
PointerToRawData 0x8ec00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.76477

.data

MD5 dcfc007fd1d97a1a6dc1794856b6d56b
SHA1 93eb2b38c5ea6dd77d56e0b1ecde1235e8d2298d
SHA256 ac054706046a25511e14861ebc4ec2b6c9af7ad43dfbbe3c2cd5b07af1158083
SHA3 5107f08250234f6494ed8a54d942926d77d5ca2015b85a711829be47e374e6dc
VirtualSize 0x8f74
VirtualAddress 0xc0000
SizeOfRawData 0x5200
PointerToRawData 0xbea00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 1.19396

.rsrc

MD5 2f11c470f2b2e8ac0bb71e4649573b37
SHA1 66d4a7d113847c3c51599cff9da5e24c354e2a10
SHA256 6ea9bc4d89c5fa068f2be18637cab1bcf94c281c151b4c8248fce31a2f1fa076
SHA3 8f5d00cb7fb6bd97da5a2d5fb41e752438d45cbb19818f85963084f50f521d6e
VirtualSize 0xd750
VirtualAddress 0xc9000
SizeOfRawData 0xd800
PointerToRawData 0xc3c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.92615

.reloc

MD5 2e5c2ba66d7b9d101e50bc3e18d0b2a5
SHA1 3bc7ebf595f4e5975a2fe92d8b2124fa20e66e73
SHA256 c7502efc575419e5689704acce770acb35df698ccd690c53310040aec01f7707
SHA3 7dda4cadbba0e31a387d08bea8cddaff01296e459ef3d9a11904db31259fd9f9
VirtualSize 0x71ac
VirtualAddress 0xd7000
SizeOfRawData 0x7200
PointerToRawData 0xd1400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.80099

Imports

WSOCK32.dll #116
#23
#12
#21
#15
#17
#10
#9
#115
#151
#18
#1
#13
#2
#3
#111
#16
#20
#19
#11
#52
#57
#4
VERSION.dll GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
WINMM.dll timeGetTime
waveOutSetVolume
mciSendStringW
COMCTL32.dll ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Remove
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
InitCommonControlsEx
ImageList_Create
MPR.dll WNetUseConnectionW
WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
WININET.dll InternetQueryDataAvailable
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetQueryOptionW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetReadFile
InternetConnectW
PSAPI.DLL GetProcessMemoryInfo
IPHLPAPI.DLL IcmpCreateFile
IcmpCloseHandle
IcmpSendEcho
USERENV.dll DestroyEnvironmentBlock
UnloadUserProfile
CreateEnvironmentBlock
LoadUserProfileW
UxTheme.dll IsThemeActive
KERNEL32.dll DuplicateHandle
CreateThread
WaitForSingleObject
HeapAlloc
GetProcessHeap
HeapFree
Sleep
GetCurrentThreadId
MultiByteToWideChar
MulDiv
GetVersionExW
IsWow64Process
GetSystemInfo
FreeLibrary
LoadLibraryA
GetProcAddress
WideCharToMultiByte
lstrcpyW
lstrlenW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
SetEndOfFile
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
GetModuleFileNameW
SetCurrentDirectoryW
GetShortPathNameW
DeleteFileW
FindNextFileW
CopyFileExW
MoveFileW
CreateDirectoryW
RemoveDirectoryW
SetSystemPowerState
QueryPerformanceFrequency
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetTempPathW
GetTempFileNameW
DeviceIoControl
GetLocalTime
CompareStringW
GetCurrentProcess
LeaveCriticalSection
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
LoadLibraryExW
FindResourceExW
CopyFileW
VirtualFree
FormatMessageW
GetExitCodeProcess
SetErrorMode
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
SetFileAttributesW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
HeapReAlloc
HeapSize
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetProcessIoCounters
CreateProcessW
GetProcessId
SetPriorityClass
LoadLibraryW
VirtualAlloc
IsDebuggerPresent
GetCurrentDirectoryW
lstrcmpiW
DecodePointer
GetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCurrentThread
CloseHandle
EnterCriticalSection
GetFullPathNameW
EncodePointer
ExitProcess
GetModuleHandleExW
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetCommandLineW
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetStringTypeW
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
RtlUnwind
ReadConsoleW
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
LCMapStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
GetLongPathNameW
SetEnvironmentVariableA
USER32.dll AdjustWindowRectEx
CopyImage
SetWindowPos
GetCursorInfo
RegisterHotKey
ClientToScreen
GetKeyboardLayoutNameW
IsCharAlphaW
IsCharAlphaNumericW
IsCharLowerW
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
CallWindowProcW
ReleaseCapture
SetCapture
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
SetRect
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
MonitorFromRect
keybd_event
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
GetUserObjectSecurity
MessageBoxW
DefWindowProcW
SetClipboardData
EmptyClipboard
CountClipboardFormats
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
BlockInput
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterHotKey
CheckMenuRadioItem
CharLowerBuffW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
SystemParametersInfoW
LoadImageW
GetClassNameW
GDI32.dll StrokePath
DeleteObject
GetTextExtentPoint32W
ExtCreatePen
GetDeviceCaps
EndPath
SetPixel
CloseFigure
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
LineTo
AngleArc
MoveToEx
Ellipse
DeleteDC
GetPixel
CreateDCW
GetStockObject
GetTextFaceW
CreateFontW
SetTextColor
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
StrokeAndFillPath
COMDLG32.dll GetOpenFileNameW
GetSaveFileNameW
ADVAPI32.dll GetAce
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegConnectRegistryW
InitializeSecurityDescriptor
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
GetLengthSid
CopySid
LogonUserW
AllocateAndInitializeSid
CheckTokenMembership
RegCreateKeyExW
FreeSid
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
AddAce
SetSecurityDescriptorDacl
GetUserNameW
InitiateSystemShutdownExW
SHELL32.dll DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHEmptyRecycleBinW
SHGetPathFromIDListW
SHBrowseForFolderW
SHCreateShellItem
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetFolderPathW
SHFileOperationW
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32.dll CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
ProgIDFromCLSID
CLSIDFromProgID
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
StringFromGUID2
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CoUninitialize
GetRunningObjectTable
CoGetInstanceFromFile
CoGetObject
CoInitializeSecurity
IIDFromString
CoSetProxyBlanket
CoCreateInstanceEx
OLEAUT32.dll #31
#11
#3
#6
#38
#39
#24
#23
#37
#41
#411
#32
#220
#77
#418
#164
#183
#163
#442
#10
#9
#443
#186
#146
#12
#7
#185
#2
#8

Delayed Imports

1

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x668
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.72194
MD5 bfa2e00fc532d74fc1dea909da97e3da
SHA1 3a9159bfb6bb7972b685f670ed75a20318821b9d
SHA256 3340e5fb648e5d4c17fa664f2301073198285e59c8588a1c89434226d6333783
SHA3 2a741b4ade59bf39a7c441945ab455241d1e91f3babf1df4022d4297ace67fa6

2

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x2e8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.88834
MD5 8718282b161f9baa327c93c03cdc8474
SHA1 c37cffa4df0c86d9c740a0d2b7de6fb6f167dfe3
SHA256 f10e2d1eb71383393e2db5556c8cf80c4b74754cb0a1858693bec87e6f4f6f3e
SHA3 6db9a68ef9ef6867530acc632423050c499849b133abcc5cfe4e80aa8b495a1d

3

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.27904
MD5 f65da063fee20f39224d963340e2e51f
SHA1 4a1be5b59e1f7938073001a0498fb906c5a41426
SHA256 7481a6ec570a8e20f687cb3fd0f20919123561379c1aa7a745ce1e0a6e9a234f
SHA3 d47d7c2d81673ddccbefced16e20009a6ed76744d205a7d654572f34aadac5d8

4

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.46186
MD5 6927ced113653215f35c6a429a7fe29f
SHA1 ca237549d09a2e8ed822928e14a22df0720497af
SHA256 de7ef597d7c4cd31038abd7fff8e832c07e9fa2350607d04b063a665db766782
SHA3 761a681b9083e9d8c51a95a72c4eee343c2ff67367fb85909839798928327f75

5

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.3496
MD5 c8ab67b06b9b0fd85a22953c5e1769a3
SHA1 5da17bfd64de464507d1cdc2ea805c3605320acc
SHA256 b3a89b59fb53da500419d0063f175d4edb5e45e087259f6e8d3b22856eebee5e
SHA3 1f4011cc6a4409199c3fb840d2629f08bfa4e3f1adae306a265429ecd14a7d72

6

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x568
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.31773
MD5 c38cd1df0469e8102595c99180d64ff6
SHA1 88574e034f68ffd0cfa27ad1bc85bdcd34efd124
SHA256 2ce83b30e283cdf8bf1dfa2ba590843f6477d93e7d7c73fd90a2ff2657a4a394
SHA3 d7a2c3beb9360f01c5a0d68390fcd6b90e3b9af47645bfbdd040a01108a31cda

7

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x3f41
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.95102
Detected Filetype PNG graphic file
MD5 8d57a3ce7c74086d8ea4cba68e3a0931
SHA1 09f2b41b62434466e34a3e1994af14e7f9cc3c42
SHA256 3608b7496d1f1b79d8097a18a9ae2f81bc2d849a2d88f81c868487887632479c
SHA3 529e617e34dfe4900be62fc84df0411f067e57cddbeff02453fdfeb1071c8766

8

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.46038
MD5 a0093c4561232e1f9fc50c33eecd394d
SHA1 4fff83b5bb6bb2ee51f002516a3e1ebd76b04ec7
SHA256 02a822676c61af18627cedb8d4f1fb62df049e250d1575d18125a58ce6acaa87
SHA3 4b57caf0190861b3da57a69f23d69bbd356bf8efb0fadf6b4c163ee793e367a0

9

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.71915
MD5 06abad0b831a81ae703bf2efd72ec570
SHA1 140e4d371d050dc1f6f40ea25e5173b563c036fc
SHA256 aa8c9e8ba4115505fd2b057f232c189aed2b1dcfd54fb59faf8c5abf9d352ce8
SHA3 fa542e1e6d7ed72972ff3f21afbdedfe2c5e049e022edfd80f54a6562e64c29e

10

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.21322
MD5 ff656e92c67f625c02cb2dd65f91e82d
SHA1 bbb8ddc3a9ac5bab178d7164dcfcb32003469f96
SHA256 28723d5e4fa79d4b201124e52b1c98879d39d8cfac77f812f353ea242a3ef00a
SHA3 01a457f0655eecb3820fa92d56bc65b8904021fcb2070ee907b11448142bfe2f

11

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.25499
MD5 ad424f5f5d5ff4460343686c61e4f75e
SHA1 29a1f0faadc42f1b9f9767d8c724fdc58dd165c8
SHA256 245fc49e4e955e1db3975b826dcf27ad2eb32a6831caa4cb6b501a3914bcfaa9
SHA3 4f3a627ee7d533397f7f5c70bb2dafa8857150e674cb31edd96949c7905de509

12

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.05883
MD5 78f30e363a0499f530d057b4d639d36e
SHA1 360bd6476101b0cddc23d2c7eade326c1b16ceaf
SHA256 08bcba5aa989c988ea18f8101c84daaee58d4f0b584535a85186c8b98b66147e
SHA3 001ac9f6e8e52f9c3eb7101189fb953e2f4babfdea5b6e26b23b99173af38de4

13

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.66371
MD5 d6f27bf763eb666af934477958acf362
SHA1 f724ee386cda31b32b5c88e08b9abf562c016a57
SHA256 62ba0b2575098d4428c9a99bd060ef7572071698bf9d03b4bd430f5f691378e5
SHA3 6f4a250c7a91ddfcc872e14b8ed1e4aa33a5ebb3280f7d021b47aa46edfb9586

166

Type RT_MENU
Language English - United Kingdom
Codepage UNKNOWN
Size 0x50
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.68292
MD5 8140596ab00b98a11c13e6977d2d0977
SHA1 58abc231c2b5ac778a543a5dffcfabe867a6758d
SHA256 54f5e2ecbfc4f87380ca7466337676b99d0c4a21f806cf83f69fd48934c857ab
SHA3 7ccd3005ef4a3eccdb793d3b975a2f09338df5922357428238910610c0c59b70

1000

Type RT_DIALOG
Language English - United Kingdom
Codepage UNKNOWN
Size 0xfc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.03986
MD5 08e5fdcbcb2ab21352c8fc0e05b07ddb
SHA1 25d4fcfaba7226a6b786bba3bcbad3ed7391b385
SHA256 7de7438fb4425f608109111fdce25be7d2381938f6c5984bcfb14b3b88e9c883
SHA3 90c82ad0c9f2d048ecb9664bee1556cb41f42f160749e3dec0bcdd28d05a8a5d

7 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage UNKNOWN
Size 0x594
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34702
MD5 d1f824f98742295a66a25225701dd6d8
SHA1 5b2075b778387182bf97314b593e73f30853435d
SHA256 4fe35e21717d34ceb4717f9e9de8fde1b3de80d76a59bb87405910c2f1d6284b
SHA3 294fc9961bf6eddc1dc7c5b525832f8aa8d3e90dac608e6421398510ab9c15b1

8 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage UNKNOWN
Size 0x68a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.2817
MD5 5beaeebda5346956e395fad21661f382
SHA1 201f2f699e6917e953821d64105b226fdd8b5528
SHA256 9306910d4bb273465765832df77fb1fd78bd6e0bcbf9908636e323c34c92b613
SHA3 d6430a84edfc22e41b15dd4f7cfc2d249bf5a637189d9284f062644b1503f9ee

9 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage UNKNOWN
Size 0x490
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28849
MD5 6b12d17c7622d8215889a2288098fa15
SHA1 a511bf459e5043fcb234829bf66a99565c244652
SHA256 e47fa3aec12353f6370b941bc5855e5551530c7b26f925b5a2e2692a0201450c
SHA3 8e3541de418e1046806ffb977c8babecd093b9816c92883261b074d1c47d96fb

10 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage UNKNOWN
Size 0x5fc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28373
MD5 949955dbda367f0c790615f7817e7886
SHA1 ee0370fb4ad59a4cebc3dbfc83bb437343fb803b
SHA256 4854e5abce2237256df24b69c9759fc1e8caa423a54bfe661ba7031afd8375eb
SHA3 5e36df684c6f2c4058d1a2507989eb5fc3c873159d006088d40f4da3804f56f2

11 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage UNKNOWN
Size 0x65c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.26322
MD5 9bc568a6176f738ffb3109e53235b579
SHA1 b97786555bfa05f958f174e294080e235d91b571
SHA256 d38369002e36f73866a0d40b13e069b9ffdbda50957f4c88d52a72fecb9b4e45
SHA3 94318c553eb0928412a92e8cf9913ca5c35a03aa8c24bf151a6764793b2f6f90

12 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage UNKNOWN
Size 0x466
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.25812
MD5 899b8766aea5f88410c721620925754b
SHA1 53ba98192d7ea4fa9051ac220ed18960ab0507a6
SHA256 58ea125e6b5fa2cbc5a8ed819c7f50c9bca1cfe55f94c7cff3feb60f25ac6073
SHA3 7ad4457a556ba648b1d46e62549fdc4c7d093bbad286f9123daf6a94f0e5af62

313

Type RT_STRING
Language English - United Kingdom
Codepage UNKNOWN
Size 0x158
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.08572
MD5 193a9143563395ad14c6dac83d32e2ad
SHA1 87ca08eb609f9ceabbd8ea7a64263de9a05bbb22
SHA256 b3711acbe8e01fee7fd362112b4e42da05c728e98b85c0a3b4cb075977849cee
SHA3 7634b4daca191c6fa53de1d5964fa47f382afccebf5744e70a702fd179fad715

99

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x92
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.90294
Detected Filetype Icon file
MD5 38003c75098be56b59abdaffe3cffb60
SHA1 f3f9b2845fbd62ded0fea617d7bd1268fd0b2be8
SHA256 201ae88f40c57f592aea0d77b4ae1e336d7e26e79a8287b72a24d44c576ebc8c
SHA3 cab726769d0d2faa2f89e8a7bef930c682a582fb624c1da71927c981aeeec06d

162

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.02322
Detected Filetype Icon file
MD5 bf79d4a6fab4b2afb8fd89db4e6c11d2
SHA1 e788a77cf462ddfaaf8e36fe47b57514839d3396
SHA256 e03ca89042dd41574baa264f8b55be15286e9c1460a2c7e7b125c87c81e2fb65
SHA3 fe836edf70892eface97ba91a8d000758bd15ca5e99830f58b1bd1f7b319a585

164

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.02322
Detected Filetype Icon file
MD5 db5d6e29d7ead2eab0ddcc9adcd99905
SHA1 c14bbca706839ac075ce905b7c4c2561abf337dd
SHA256 0a560fb69a7af6909987048455993caac8cc233a377548969b54d81c10eec1d8
SHA3 0053951782e3dae7231f89135d6013cfc75b22dc7de311de34cfa62a2c50ec1a

169

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.02322
Detected Filetype Icon file
MD5 cb6224423116bd21b2417c0c419f2a7b
SHA1 93f63a175f19235b1fdf8cdf724028b3099db026
SHA256 2ef8f3005787231e5b1b5baaa4e31980f4f0eb0eb40d74513cd03b5f684f2e8f
SHA3 3a502b5c5b58d819aecb6d5623cdf726f9dd0ddcb729ac03b2425a636b027f8a

1 (#2)

Type RT_VERSION
Language English - United Kingdom
Codepage UNKNOWN
Size 0x36c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.48901
MD5 0b3df9d849e23682455ef7d88048c6a8
SHA1 29a8a516de42e34ce63b34575e70fa91d776e5d9
SHA256 48851f76adb6c706966cda069d45b64850278ff9e0980a4e543063cc3212509e
SHA3 2a3b77c0b70a92543fb9b440feb0505e0853451e476a0f30a7a90f706bdd3bf2

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x42c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.33361
MD5 7dafd7e375626aa11ba9c102ffb926bd
SHA1 ed72627445d6b2ec05bfe30510176a9c8b85adeb
SHA256 087341dfd03b4923a652c8281569daac69e92bae1412c13f2396d2c3ea1f7b7d
SHA3 6bb121a881b754d83d09efb835d798bd5160548c7e00b5c009140d30e1ae22a7

String Table contents

(Paused)
AutoIt Error
AutoIt has detected the stack has become corrupt.
Stack corruption typically occurs when either the wrong calling convention is used or when the function is called with the wrong number of arguments.
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
"EndWith" missing "With".
Badly formatted "Func" statement.
"With" missing "EndWith".
Missing right bracket ')' in expression.
Missing operator in expression.
Unbalanced brackets in expression.
Error in expression.
Error parsing function call.
Incorrect number of parameters in function call.
"ReDim" used without an array variable.
Illegal text at the end of statement (one statement per line).
"If" statement has no matching "EndIf" statement.
"Else" statement with no matching "If" statement.
"EndIf" statement with no matching "If" statement.
Too many "Else" statements for matching "If" statement.
"While" statement has no matching "Wend" statement.
"Wend" statement with no matching "While" statement.
Variable used without being declared.
Array variable has incorrect number of subscripts or subscript dimension range exceeded.
Variable subscript badly formatted.
Subscript used on non-accessible variable.
Too many subscripts used for an array.
Missing subscript dimensions in "Dim" statement.
No variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.
Expected a "=" operator in assignment statement.
Invalid keyword at the start of this line.
Array maximum size exceeded.
"Func" statement has no matching "EndFunc".
Duplicate function name.
Unknown function name.
Unknown macro.
Unable to get a list of running processes.
Invalid element in a DllStruct.
Unknown option or bad parameter specified.
Unable to load the internet libraries.
"Struct" statement has no matching "EndStruct".
Unable to open file, the maximum number of open files has been exceeded.
"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.
Expected a variable in user function call.
"Do" statement has no matching "Until" statement.
"Until" statement with no matching "Do" statement.
"For" statement is badly formatted.
"Next" statement with no matching "For" statement.
"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.
"For" statement has no matching "Next" statement.
"Case" statement with no matching "Select"or "Switch" statement.
"EndSelect" statement with no matching "Select" statement.
Recursion level has been exceeded - AutoIt will quit to prevent stack overflow.
Cannot make existing variables static.
Cannot make static variables into regular variables.
Badly formated Enum statement
This keyword cannot be used after a "Then" keyword.
"Select" statement is missing "EndSelect" or "Case" statement.
"If" statements must have a "Then" keyword.
Badly formated Struct statement.
Cannot assign values to constants.
Cannot make existing variables into constants.
Only Object-type variables allowed in a "With" statement.
"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.
Object referenced outside a "With" statement.
Nested "With" statements are not allowed.
Variable must be of type "Object".
The requested action with this object has failed.
Variable appears more than once in function declaration.
ReDim array can not be initialized in this manner.
An array variable can not be used in this manner.
Can not redeclare a constant.
Can not redeclare a parameter inside a user function.
Can pass constants by reference only to parameters with "Const" keyword.
Can not initialize a variable with itself.
Incorrect way to use this parameter.
"EndSwitch" statement with no matching "Switch" statement.
"Switch" statement is missing "EndSwitch" or "Case" statement.
"ContinueCase" statement with no matching "Select"or "Switch" statement.
Assert Failed!
Obsolete function/parameter.
Invalid Exitcode (reserved for AutoIt internal use).
Variable cannot be accessed in this manner.
Func reassign not allowed.
Func reassign on global level not allowed.
Unable to parse line.
Unable to open the script file.
String missing closing quote.
Badly formated variable or macro.
Missing separator character after keyword.

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 3.3.14.5
ProductVersion 3.3.14.5
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United Kingdom
CompanyName AutoIt Team
Comments http://www.autoitscript.com/autoit3/
FileDescription AutoIt v3 Script
FileVersion (#2) 3, 3, 14, 5
InternalName AutoIt3.exe
LegalCopyright ©1999-2018 Jonathan Bennett & AutoIt Team
OriginalFilename AutoIt3.exe
ProductName AutoIt v3 Script
ProductVersion (#2) 3, 3, 14, 5
Resource LangID English - United Kingdom

IMAGE_DEBUG_TYPE_RESERVED

Characteristics 0
TimeDateStamp 2018-Mar-15 13:14:39
Version 0.0
SizeofData 4
AddressOfRawData 0xb7ee8
PointerToRawData 0xb6ae8

TLS Callbacks

Load Configuration

Size 0x48
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x4c0d50
SEHandlerTable 0
SEHandlerCount 0

RICH Header

XOR Key 0xc32a1252
Unmarked objects 0
C++ objects (20806) 2
199 (41118) 1
ASM objects (VS2013 build 21005) 51
C objects (VS2013 build 21005) 177
C++ objects (VS2013 build 21005) 53
C objects (VS2008 SP1 build 30729) 9
Imports (VS2008 SP1 build 30729) 37
Total imports 544
234 (VS2013 UPD5 build 40629) 80
ASM objects (VS2013 UPD5 build 40629) 1
Resource objects (VS2013 build 21005) 1
151 2
Linker (VS2013 UPD5 build 40629) 1

Errors

<-- -->