c9ac9aa70b0b7a70990e3f271d2aa2f47c881dffaec08d288c4d5991e6d857ac

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2022-Jul-21 03:07:05
Detected languages English - United States
Debug artifacts C:\LU\PRJ\smr.softpaqwrapper\Release\hpsoftpaqwrapper.pdb
CompanyName HP Inc.
FileDescription Intel Management Engine Firmware
FileVersion 0.2.75.23816
InternalName hpsoftpaqwrapper
OriginalFilename hpsoftpaqwrapper.exe
ProductName Intel Management Engine Firmware
ProductVersion 11.8.94.4494
LegalCopyright Copyright (c) 2022 HP Development Company, LP.

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • hp.com.au
  • www.hp.com
  • www.hp.com.au
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryW
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryExA
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegQueryInfoKeyW
  • RegDeleteValueW
  • RegCreateKeyExW
  • RegSetValueExW
  • RegOpenKeyExW
  • RegEnumKeyExW
  • RegCloseKey
  • RegDeleteKeyW
Possibly launches other programs:
  • CreateProcessW
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Enumerates local disk drives:
  • GetDriveTypeW
Changes object ACLs:
  • SetNamedSecurityInfoW
Can take screenshots:
  • GetDC
  • CreateCompatibleDC
Info The PE is digitally signed. Signer: HP Inc.
Issuer: DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Safe VirusTotal score: 0/72 (Scanned on 2025-08-17 20:57:19) All the AVs think this file is safe.

Hashes

MD5 910d7094aee7b1d7e9d753ed7ead58e7
SHA1 c2592f48ac1bb3033da2c3d34160b4758e64a729
SHA256 c9ac9aa70b0b7a70990e3f271d2aa2f47c881dffaec08d288c4d5991e6d857ac
SHA3 af2dda36cf7018167d35305173d2d7c3e1dfbe5f618c72e663ce0c161e92661d
SSDeep 196608:zZf/dsRJU+1ei85kzXjSGFLAQ54a3akn+mpP:dFsRJv1eiemXGGFLubml
Imports Hash 8fe49f4a1eec5d23036661758572629c

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x118

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2022-Jul-21 03:07:05
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x5f400
SizeOfInitializedData 0x37e00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000000487F4 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x9e000
SizeOfHeaders 0x400
Checksum 0x68b0b4
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 6a1e80f17346faf539ec48ab46df3955
SHA1 4505701c305364658182b9ab59a28e8ba0cf5f0c
SHA256 491a762af3a312c0f96dfc88267aab1a66e81d3e3efbd85032e7f62f14a3336a
SHA3 9378c76a1d1a2411dccb93feb6d0b302cde937a9bc5e9890811433863f5ac891
VirtualSize 0x5f358
VirtualAddress 0x1000
SizeOfRawData 0x5f400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.397

.rdata

MD5 0b77165fdc3e9efc1a511c37165128fb
SHA1 9de4d8f87721859549658c7f57e3fcf244d1bc45
SHA256 a794e3fd3eaa34709971e05e7974028a245322d80a5011fee5493fdb762d7f2b
SHA3 5d5daf1e35f9233f19f15bda319f903627a0a4ded5369c79624618bd3f388166
VirtualSize 0x2185c
VirtualAddress 0x61000
SizeOfRawData 0x21a00
PointerToRawData 0x5f800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.57367

.data

MD5 2f95cfc4940c187db8689fc134dd4a67
SHA1 538e23f418cbe8af3766df286196f896f12192df
SHA256 28f77ec926cb09dc5a37cc3dddb77106c02f07e0cb407ec847bbe6c5e192b7de
SHA3 63b72a4903d6babd7d6fe2602ef67fa3543b5df43c8682ab8a25fccaf633e0f9
VirtualSize 0x67f4
VirtualAddress 0x83000
SizeOfRawData 0x2c00
PointerToRawData 0x81200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.06256

.pdata

MD5 a7aae6da68ea5c0c023db3c5111ccfe0
SHA1 eea19f37e5ab351961294498ba39a8fd72feec0d
SHA256 a23dd3ed5cc7440ee98fc951fc3b8709225591859ae6ab32dcf4352486a04e6f
SHA3 12c49e49033a38cbfacaaff197d62e72720c6cb126b3ccb87a4d63c4598abc2f
VirtualSize 0x465c
VirtualAddress 0x8a000
SizeOfRawData 0x4800
PointerToRawData 0x83e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.64431

.rsrc

MD5 241715bc61429c48b01367f803796e09
SHA1 1a3c4e158f24da159e428060c24e9d6426024be8
SHA256 c371b6b601d68d845639ccb7a19a3f7416511bdf41d56eb88bfeb6bdb4fbcd86
SHA3 74d66d12d81ef0bffb4a5ac9ae71bdc7d4a74da25d36fe5707c96abb8b3d9d0d
VirtualSize 0xdef8
VirtualAddress 0x8f000
SizeOfRawData 0xe000
PointerToRawData 0x88600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.51086

.reloc

MD5 df01879637f9da5fc2f94fd097ddf6d6
SHA1 32507ed5ef00e2f6155ab635a22600ed20d18c0c
SHA256 bee3fca8d5b07a1ba89f5a75375edb1a56160cf50736a8ee65914f93dbda221a
SHA3 58c7f1c9454bb5f4c9a0dc04847ab801ea9b82ad23ac80550182ee0992884df7
VirtualSize 0xe60
VirtualAddress 0x9d000
SizeOfRawData 0x1000
PointerToRawData 0x96600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.24897

Imports

KERNEL32.dll WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
CreateFileW
SetFilePointer
OutputDebugStringW
GetEnvironmentVariableW
GetFileSizeEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LocalFree
ExpandEnvironmentStringsW
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
FreeLibrary
LoadLibraryW
TlsSetValue
TlsGetValue
GetTickCount
GetCurrentProcess
GetExitCodeThread
ResumeThread
TlsAlloc
GlobalAlloc
GlobalFree
SetLastError
RemoveDirectoryW
GetTempPathW
GetSystemDirectoryW
DeleteFileW
GetCurrentDirectoryW
GetCurrentProcessId
FindFirstFileW
FindNextFileW
FindClose
GetModuleHandleA
SetEndOfFile
GetFileSize
GetDiskFreeSpaceW
GetDriveTypeW
GetProcessAffinityMask
MultiByteToWideChar
GlobalMemoryStatusEx
MulDiv
FreeResource
GlobalLock
GlobalUnlock
lstrcmpiW
LoadLibraryExW
GetModuleFileNameW
EncodePointer
CreateProcessW
GetExitCodeProcess
VirtualAlloc
SetSearchPathMode
GetShortPathNameW
GetCommandLineW
AttachConsole
AllocConsole
FreeConsole
lstrlenW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
WriteConsoleW
SetStdHandle
GetStringTypeW
LCMapStringW
GetACP
ExitProcess
GetCPInfo
GetFileType
SetFilePointerEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlPcToFileHeader
RtlUnwindEx
QueryPerformanceCounter
GetStartupInfoW
ResetEvent
CloseHandle
SetEvent
CreateEventW
WaitForSingleObject
InitializeCriticalSection
WaitForMultipleObjects
GetFileInformationByHandle
WriteFile
GetStdHandle
GetSystemInfo
ReadFile
VirtualFree
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
FormatMessageW
HeapSize
GetCurrentThreadId
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
GetSystemTimeAsFileTime
TlsFree
SwitchToThread
InitializeCriticalSectionAndSpinCount
GetFullPathNameW
GetFileAttributesExW
FindFirstFileExW
FlushInstructionCache
InterlockedPushEntrySList
InitializeCriticalSectionEx
GetModuleHandleExW
HeapFree
SearchPathW
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
LoadLibraryExA
VirtualQuery
VirtualProtect
USER32.dll SetWindowLongW
GetWindowLongW
SetDlgItemTextW
SetWindowPos
MapWindowPoints
LoadCursorW
SetCursor
SendMessageW
EnableWindow
PostMessageW
GetParent
GetWindowRect
GetDlgItem
CharUpperW
GetWindowTextLengthW
GetWindowTextW
GetActiveWindow
SetFocus
IsWindowVisible
SetRectEmpty
RegisterWindowMessageW
GetDC
ReleaseDC
SetWindowTextW
UnregisterClassW
MessageBoxW
GetWindowLongPtrW
BeginPaint
CharNextW
SetWindowLongPtrW
GetWindow
MonitorFromWindow
GetMonitorInfoW
DefWindowProcW
DestroyWindow
CallWindowProcW
GetSysColor
GetClientRect
EndPaint
GDI32.dll CreateFontIndirectW
SetStretchBltMode
ExtTextOutW
SetBkColor
SetDIBColorTable
SelectObject
StretchBlt
CreateDIBSection
CreateCompatibleDC
DeleteDC
GetDeviceCaps
GetObjectW
DeleteObject
ADVAPI32.dll RegQueryInfoKeyW
OpenProcessToken
SetNamedSecurityInfoW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
AllocateAndInitializeSid
RegCloseKey
RegDeleteKeyW
FreeSid
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SHELL32.dll CommandLineToArgvW
SHBrowseForFolderW
SHGetPathFromIDListW
ole32.dll OleUninitialize
OleInitialize
CoCreateInstance
CoInitialize
CoTaskMemRealloc
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
OLEAUT32.dll VariantClear
VarUI4FromStr
SysFreeString
SysAllocString
SysAllocStringLen
VariantCopy
SHLWAPI.dll StrStrIW
COMCTL32.dll DestroyPropertySheetPage
InitCommonControlsEx
PropertySheetW
CreatePropertySheetPageW
gdiplus.dll GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromStream
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipFree
GdipAlloc
GdipDisposeImage
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipDrawImageI
GdipBitmapUnlockBits
GdiplusShutdown
GdiplusStartup
GdipCloneImage
MPR.dll (delay-loaded) WNetAddConnection2W
WNetEnumResourceW
WNetCloseEnum
WNetCancelConnection2W
WNetOpenEnumW

Delayed Imports

Attributes 0x1
Name MPR.dll
ModuleHandle 0x85a80
DelayImportAddressTable 0x85a50
DelayImportNameTable 0x80b88
BoundDelayImportTable 0x80c20
UnloadDelayImportTable 0
TimeStamp 1970-Jan-01 00:00:00

119

Type AFX_DIALOG_LAYOUT
Language English - United States
Codepage Latin 1 / Western European
Size 0x2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0
MD5 c4103f122d27677c9db144cae1394a66
SHA1 1489f923c4dca729178b3e3233458550d8dddf29
SHA256 96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7
SHA3 762ba6a3d9312bf3e6dc71e74f34208e889fc44e6ff400724deecfeda7d5b3ce

1300

Type IMAGE
Language English - United States
Codepage Latin 1 / Western European
Size 0x16b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.03783
Detected Filetype PNG graphic file
MD5 68b2c1ab8a82fcb418691726cbb971b0
SHA1 616a9bcc812c2fc48f31f98b19b296ca080dd687
SHA256 a5ef1078bbf9d7f945812fb6f18ac9d2cc6932b4c078d91a24b6e71ec1d7cff5
SHA3 fbd44023bdede5958717e47c6b40e0d075b1d9c8b1c35fddeff082d03c0dcdcb

1301

Type IMAGE
Language English - United States
Codepage Latin 1 / Western European
Size 0x8b0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.85012
Detected Filetype PNG graphic file
MD5 d7c45a0bffec61cbf9ecc5adcb463a97
SHA1 fb0e283f56b1dad6ecd06ba595a6f048bbb4cbb5
SHA256 e31c5c4df7255721803d1b951e845cf0757cb57040ab052ec2251183e52230d7
SHA3 61ba1ab5176032101e819986634378c4563f7b56eeb0e89baaa42df24ca52072

1302

Type IMAGE
Language English - United States
Codepage Latin 1 / Western European
Size 0x994
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.1216
Detected Filetype PNG graphic file
MD5 7dfa94ccb85cfe85359358101d37b3cc
SHA1 d79873ef1f0a70a8bbdcee627b57cd18d824aa65
SHA256 a47ab470600b4bbb51cd2dcc2cdc9cefe4f80ef073627547a8affd943d55c8e4
SHA3 98474779e4c4950b456c29b5f743ae877443fd2394cb5d47c8b43350e55a1097

1303

Type IMAGE
Language English - United States
Codepage Latin 1 / Western European
Size 0xb5f
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.40211
Detected Filetype PNG graphic file
MD5 d8a436965a019492b07c1fc964f42d59
SHA1 096b5abb2861c74cf1a6f994d73149c36610ffee
SHA256 3030174c41f062191d6095ce1af12a964395e424221842af0ac35ef6248d6ae3
SHA3 f4191d87f93a912a5f68440b6e555bcd91362e8ea228c03d145d5741c28896ad

1304

Type IMAGE
Language English - United States
Codepage Latin 1 / Western European
Size 0xcdd
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.52901
Detected Filetype PNG graphic file
MD5 9d70115223d2225a1a28fd81fa64c82d
SHA1 857d700f600f61d1539c49e4e7860762703e0ae9
SHA256 b515fda6d86c736c3eec84d45e5d7adcdaaafadccb12f92d62b694ef37a345b7
SHA3 a81ccc21be2c3d9465de3722a5dbcc4c89e4e4ed865306646a8a971f4b0ec4e9

1

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x2b7
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.64209
Detected Filetype PNG graphic file
MD5 95ef30e4f13b642f1a69d7427720414d
SHA1 39b476ce15d9410aa855816236dbdf22cfa86317
SHA256 c6d9a943e935b9b4c959aef681a58ce177da8f813683169c4d3eb09de1fa1ce8
SHA3 070b76dbb906f262a6d53d7f2debfaccf1ff3535151ea14c9ffd5e8cace9cdb8

2

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x6a2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.85069
Detected Filetype PNG graphic file
MD5 b0025bc354a5d40f711bb14907140289
SHA1 4150247346b1194855647ea8e7e07ca0e9567c93
SHA256 abb240390dd687c34f44a122b1d2694906fe56a4202f5a78b33844bb049a3011
SHA3 4a595439cf56e3a5b5345eb66950c028aeb18f162fc2041dc1ee0be4efe2f0dc

3

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0xb35
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.89767
Detected Filetype PNG graphic file
MD5 da2082c59e2688fb10a6829194580917
SHA1 d597b95b81e9d8414f33ecec0e15bc773d6e12fc
SHA256 2755c10f5c5ce52c0a17ef2e489cbe2f7aaa80faf5a27cfbe3945f3895863966
SHA3 12e2cc971992866c2443af4f678574bd4bcc6523265999f400b157836d57b92c

4

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x1216
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.94506
Detected Filetype PNG graphic file
MD5 1cc9e03b8d16aa41e8949bd2e44d7ef7
SHA1 ec2fe6e9ed264c6fddb32f073ad0032221d76796
SHA256 5aeb2cc858d349a619b5bd3690f2f7a17c71ecd263488b6d0e54c674ebddfa4c
SHA3 359894043bc895ebc3d3d2e7278d9df1ce958348f5e2c4173f5e2a6efb847d50

5

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x2781
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.97237
Detected Filetype PNG graphic file
MD5 54112c8482e28811607e696b1e00c531
SHA1 94b33f32035fd7716c1e7cfad8777ac94e9bd179
SHA256 462b48960de0ca79c442c560072b10017d877c9f38bdf693c9fd136c6a15b6c3
SHA3 f8ecc5937def3d6cb333aa4373920866c38d508b1a8c32ffac9d092f0c6b5dc7

6

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x4b3c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.96456
Detected Filetype PNG graphic file
MD5 a7ba71149d3421112a58f52a9a4e74ca
SHA1 d993ad88f3356e0830ad374bedcd0202c85aaab3
SHA256 bf2125ff596f88eb885330eec3d07182d2f9c48eccccfc6ed1442adb1a56b426
SHA3 130c8898c381226fdd1d071d39f9cc2fb434f90ae54f2153f734bfefa1b3ee30

102

Type RT_DIALOG
Language English - United States
Codepage Latin 1 / Western European
Size 0x80
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.47732
MD5 7d0ef09e9b810c17b65e02a8e1571854
SHA1 5c7dfd3ef4860f742b5078e819b2b29f5be78eec
SHA256 fbde740e33d6c62688ee405c95faa335029df2f5b97ccaf92717135d287b725b
SHA3 38221d3260a5b4e97c3c7c5f9d554dcc2c4792d434d3c8c2a77e3d4b7636bf5b

115

Type RT_DIALOG
Language English - United States
Codepage Latin 1 / Western European
Size 0x74
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.70924
MD5 71f817c01d10d3832212d5ad14cb1264
SHA1 e4308bb99e3f735aa98f452f6045f765ce088aa8
SHA256 4a6b0686e66735fe0bd08b66cb658114c7b47e92ca8c56a3cfa7a95b09e4a8f4
SHA3 1599c132bbb53d27882c1ae7e6c66ac7751ddc0d81c833708371a75c6a00395b

117

Type RT_DIALOG
Language English - United States
Codepage Latin 1 / Western European
Size 0xb4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.86891
MD5 7183d6c880ff65d59a679dfde77617c9
SHA1 b8ecaf1a60030fcf3b7182888ae7fefebcecfb61
SHA256 ba44eae06ef27ae2ffd07011c30c6fc2b845cb6aef289909a807931b310388e6
SHA3 87669fe5ca16caa474daabb7a6e5583c8c845ae71fffa536640d7ced2a585ebd

118

Type RT_DIALOG
Language English - United States
Codepage Latin 1 / Western European
Size 0xc0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.62509
MD5 60b4a6978dcae314049b079d7c1ba210
SHA1 eff960fc63691c0dd533045e7c8165e7345eb9ea
SHA256 423967be112130f396afe289f65e7fbbaa1020632b8c061d2b229419840f0995
SHA3 03ab70cd5ef07c4f2f56bd7405d4a4bc6fea6fc784d13363df28dd65c1972e28

119 (#2)

Type RT_DIALOG
Language English - United States
Codepage Latin 1 / Western European
Size 0xc0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.90599
MD5 422fb9e880145996c7cdc71f7b6f032e
SHA1 ced604419cbd783ad35f507d1c384b13c8a7dcdc
SHA256 9cc7814b01de6aece519835ac5d2b9fe782b45323fb0fbe3bf5e26f1d7de0aa2
SHA3 bd4196534428a711e2b89130787daae800d5532ed5ba204a183a43c97e2d9aab

120

Type RT_DIALOG
Language English - United States
Codepage Latin 1 / Western European
Size 0x60
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.45955
MD5 57130c087c87d583b910700d23076336
SHA1 17db649a752029bd8f74f34342b7f5f5b64bb190
SHA256 880a0dd4df5b4cbf99d6012c59987bc4498f30df5d0cc3582b74c298a4224246
SHA3 6090ec03b3b21681877bbe5c85cbec4f87d966d672bd319d01de5aebc8e18fff

13

Type RT_STRING
Language English - United States
Codepage Latin 1 / Western European
Size 0x3f6
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.22339
MD5 24b24562406cfcbbf5a33145d4555369
SHA1 5519f1d218091d269ee3c21c04e30193b8c3e187
SHA256 76a0c5fabda23237a0e82c5425121f450f8aee67b08125fadfb26d62f03d939d
SHA3 5ce54ad90584d335df02b0287aa71e2c0c5cee40210e7532e9c78c76547b077e

14

Type RT_STRING
Language English - United States
Codepage Latin 1 / Western European
Size 0x5ca
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.27585
MD5 1d0e6347a871d1537021bb53b5b73bde
SHA1 88bf9cfd5cfeffbce8a1559587dd1f6ae9c7212d
SHA256 53fc245576a9f48bfa86859e28d9ad2ec638d59dfad6dc63ecda8eb9945c4ced
SHA3 d64f19672d3bd9ea8d0fb05df5a8f23b4884458f60c519733016d5051432489c

201

Type RT_GROUP_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.81593
Detected Filetype Icon file
MD5 b09233bf641b4d20864bdca08db9d872
SHA1 a3746e6be41a82722fa37f04e881580bf217ca63
SHA256 60aa71290d5106df42370045b7b6efd6ebac79c96a9974664eeb93ad295d02a4
SHA3 1f631a95e7bec529491adaa05304eb60bceee20dce91aede31aaeda9f2157e9b

1 (#2)

Type RT_VERSION
Language English - United States
Codepage Latin 1 / Western European
Size 0x374
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.44712
MD5 18c08957cdd4b6e5fc0bc8eb2c6ca2c5
SHA1 e453265f1fd576d04bcb0c2feabd484b6675d1e9
SHA256 86793bf6eb10a6c8c6caab3f1300b0493a4dfd7ba39854660976ecd9f835babf
SHA3 80fc3a0616aaf316ea7cb06085914cd03ee4513f3e6d1de287c1560a68b1d411

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage Latin 1 / Western European
Size 0x32c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.11794
MD5 8d57cde9be2acd8f53f55df766b432f0
SHA1 ecbe9c7abfd34153946390307673d88ef2894e50
SHA256 3d4edfeb8cdcf460e6632ebfb4127033a474c3399e301ecd9276260a7d2ca08c
SHA3 6fe5ad53424c98c9fffd084a482a5c0c5e7b396a2a254dc334bdb956ae6cbb66

String Table contents

Usage: /s /e /f <target-path>
/s - Un-package the package in silent mode (not showing user interaction UI)
/f - Runtime switch that overrides the default target path specified in build time
/e - Prevent execution of default executable file specified in build time.
Only extracting the content files to target folder(Use this with /s /f)
License Agreement
Please read the following license agreement carefully.
Location to Save Files
Where would you like to save your files?
Extracting Files
The contents of this package are being extracted.
I &accept the terms in the license agreement
I &do not accept the terms in the license agreement
Please enter the folder where you want these files saved. If the folder does not exist, it will be created for you. To continue, click Next.
&Save files in folder:
&Change...
Please wait while the HP Softpaq Wrapper extracts the files needed to install %s on your computer. This may take a few moments.
Extracting %s...
Welcome to the HP Softpaq Wrapper for %s
The HP Softpaq Wrapper will help install %s on your computer. To continue, click Next.
The HP Softpaq Wrapper has finished %s on your computer. To exit the wrapper, click Finish.
HP Softpaq Wrapper Completed

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 0.2.75.23816
ProductVersion 0.2.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName HP Inc.
FileDescription Intel Management Engine Firmware
FileVersion (#2) 0.2.75.23816
InternalName hpsoftpaqwrapper
OriginalFilename hpsoftpaqwrapper.exe
ProductName Intel Management Engine Firmware
ProductVersion (#2) 11.8.94.4494
LegalCopyright Copyright (c) 2022 HP Development Company, LP.
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2022-Jul-21 03:07:05
Version 0.0
SizeofData 82
AddressOfRawData 0x76144
PointerToRawData 0x74944
Referenced File C:\LU\PRJ\smr.softpaqwrapper\Release\hpsoftpaqwrapper.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2022-Jul-21 03:07:05
Version 0.0
SizeofData 20
AddressOfRawData 0x76198
PointerToRawData 0x74998

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2022-Jul-21 03:07:05
Version 0.0
SizeofData 1080
AddressOfRawData 0x761ac
PointerToRawData 0x749ac

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2022-Jul-21 03:07:05
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

StartAddressOfRawData 0x140076608
EndAddressOfRawData 0x140076610
AddressOfIndex 0x1400862cc
AddressOfCallbacks 0x140061930
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x100
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140083010

RICH Header

XOR Key 0x7be92cc6
Unmarked objects 0
241 (40116) 5
243 (40116) 138
242 (40116) 13
C objects (VS 2015/2017 runtime 26706) 19
ASM objects (VS 2015/2017 runtime 26706) 8
C++ objects (VS 2015/2017 runtime 26706) 61
C objects (65501) 2
Imports (65501) 21
Total imports 305
C++ objects (LTCG) (27045) 91
Resource objects (27045) 1
151 2
Linker (27045) 1

Errors

Leave a comment

No comments yet.