d993a41f8f9c9237e66d8c98405dd6c5

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2021-Jul-28 15:34:18
Detected languages English - United States
Comments Written by Roman Voska (Oscar), maintained by Peter Misik (Orol)
CompanyName MediaChance
FileDescription SimplePlugIn Multimedia Builder Plug-in
FileVersion 1, 0, 2, 0
InternalName SimplePlugIn
LegalCopyright www.mediachance.com (c) 1999-2005
LegalTrademarks MediaChance
OriginalFilename SimplePlugIn.dll
ProductName SimplePlugIn
ProductVersion 1, 0, 2, 0

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ v6.0 DLL
Microsoft Visual C++ 6.0 - 8.0
Info Interesting strings found in the binary: Contains domain names:
  • mediachance.com
  • www.mediachance.com
Info Libraries used to perform cryptographic operations: Microsoft's Cryptography API
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • LoadLibraryA
  • LoadLibraryExA
  • LoadLibraryW
  • GetProcAddress
Can access the registry:
  • RegCreateKeyExA
  • RegCloseKey
  • RegDeleteKeyA
  • RegEnumKeyA
  • RegOpenKeyExA
  • RegQueryValueA
  • RegSetValueA
  • RegDeleteValueA
  • RegEnumKeyExA
  • RegOpenKeyExW
  • RegSetValueExA
  • RegQueryValueExA
  • RegEnumValueA
Possibly launches other programs:
  • ShellExecuteA
Uses Microsoft's cryptographic API:
  • CryptDestroyHash
  • CryptHashData
  • CryptCreateHash
  • CryptGetHashParam
  • CryptAcquireContextA
  • CryptReleaseContext
Can create temporary files:
  • GetTempPathA
  • CreateFileW
  • CreateFileA
Uses functions commonly found in keyloggers:
  • MapVirtualKeyA
  • GetAsyncKeyState
  • GetForegroundWindow
  • CallNextHookEx
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Enumerates local disk drives:
  • GetVolumeInformationA
Changes object ACLs:
  • SetFileSecurityA
Can take screenshots:
  • GetDCEx
  • GetDC
  • BitBlt
  • CreateCompatibleDC
Safe VirusTotal score: 0/63 (Scanned on 2021-09-14 13:32:48) All the AVs think this file is safe.

Hashes

MD5 d993a41f8f9c9237e66d8c98405dd6c5
SHA1 d847a0a6d5c2c03b6f1c184ce26a6031bb690d79
SHA256 278c0dd75fe93a00c9262762092249a6d11ddcfe806e7402fe41fec081ec84a0
SHA3 26d5c0d87e822ae0d64228a4a182d38cc9041eb17ac18a79c19353817ae6a96f
SSDeep 98304:TP1nVzE/CZoyWhmcqNeDYNcCe1NZCXNp3YXdTCIEzFBuh6:TP1nVURiecJodTCIiF06
Imports Hash 9bbe2eb040d807a552b00d4b967e21cd

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x120

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 5
TimeDateStamp 2021-Jul-28 15:34:18
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 14.0
SizeOfCode 0x24c200
SizeOfInitializedData 0xbcc00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x001D45BD (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x24e000
ImageBase 0x10000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x30d000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 0dd98d8117786630d8cc845da475f133
SHA1 de51a677c8949f4bc3e8a4084f957d88ca1395d1
SHA256 cde93480303a3cac643852bb5066c068518b1f53fee99a6cad8b5eb945c4c681
SHA3 8d92ab80d5a38b1228ed98361f79c60d6da7968fc9a2064fc2e39e1ea8ace40c
VirtualSize 0x24c174
VirtualAddress 0x1000
SizeOfRawData 0x24c200
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.5991

.rdata

MD5 1f0c6d4cb4a49dd8966dd24898a7bc18
SHA1 2458aada5a23a31d9c3d5a6cd850593483de3df6
SHA256 42ee1477983fee5ff1f03c602f1379a74a4b8c658c8f7ad7496a3558a8ca2e38
SHA3 a020f9ea37e298003e12d8ed63e5b1271c1160064aaf4f2d3530829f9fcd7d2f
VirtualSize 0x7f18a
VirtualAddress 0x24e000
SizeOfRawData 0x7f200
PointerToRawData 0x24c600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.60878

.data

MD5 da21d49e4def8aa5ba2ca4ac8d0ac853
SHA1 4b17c6103a8b8d51440205dc5a98eefaa537f336
SHA256 730d868d4156f7a0c2c0435b207d16b18a6fa07afaf4dc0ab48af6d1b65fd325
SHA3 8090023b63cfee59f549f160c7ff2c5e1407f3849a1eb2c4cb1a5d6bb1240894
VirtualSize 0xc46c
VirtualAddress 0x2ce000
SizeOfRawData 0x7800
PointerToRawData 0x2cb800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.00243

.rsrc

MD5 053ee24cdac762ee5872274e08f92ded
SHA1 c09a601dbbc955be7f10b9c85d1ab761695a62f9
SHA256 3b5982ab135783972edd7c0f1f37f195cd6e48d09c8d171a186306e44b8e129a
SHA3 72c79c13becc8592547f21a6b9357219e22befa9f0646526083b595aaa0531ee
VirtualSize 0x668
VirtualAddress 0x2db000
SizeOfRawData 0x800
PointerToRawData 0x2d3000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.4599

.reloc

MD5 e61f9b4d779e5be5df2563015ed47bb7
SHA1 9bc40123c33596a8dc8e0d4ec52dda5e02103322
SHA256 f83ecba38429253a858be732738de352543899f227bb3ef2342b142f5ba38f24
SHA3 857f9282328f73b5e7f0b81090257a4c99b3a64d62e7a409827ada7e0684764b
VirtualSize 0x30a58
VirtualAddress 0x2dc000
SizeOfRawData 0x30c00
PointerToRawData 0x2d3800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.58342

Imports

KERNEL32.dll GetFileAttributesA
GetFileAttributesExA
GetFileSizeEx
GetFileTime
LocalFileTimeToFileTime
SetFileAttributesA
SetFileTime
lstrcmpW
SetErrorMode
GetLocaleInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
VirtualProtect
GetOEMCP
GetCPInfo
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetCurrentDirectoryA
GetACP
lstrcpyA
FindResourceExW
GetWindowsDirectoryA
VerSetConditionMask
VerifyVersionInfoA
GetTempPathA
GetTickCount
GetProfileIntA
SearchPathA
Sleep
GetDiskFreeSpaceA
GetTempFileNameA
ReplaceFileA
GetUserDefaultLCID
LocalLock
LocalUnlock
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetSystemInfo
VirtualAlloc
VirtualQuery
HeapQueryInformation
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
QueryPerformanceFrequency
SetStdHandle
GetFileType
ExitProcess
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
IsValidLocale
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
GetStringTypeW
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
FindNextFileW
GetVersionExA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetConsoleCtrlHandler
CreateFileW
WriteConsoleW
GlobalDeleteAtom
LoadLibraryExW
GetSystemDirectoryW
GetCurrentThread
EncodePointer
GetStringTypeExA
MoveFileA
lstrcmpiA
GetShortPathNameA
LoadLibraryA
LoadLibraryExA
GetCurrentProcess
DuplicateHandle
GetVolumeInformationA
WriteFile
UnlockFile
SetFilePointer
SetEndOfFile
ReadFile
LockFile
GetFullPathNameA
GetFileSize
FlushFileBuffers
FindFirstFileA
FindClose
DeleteFileA
CreateFileA
GlobalAddAtomA
ResumeThread
SuspendThread
SetThreadPriority
GetCurrentThreadId
CreateEventA
WaitForSingleObject
SetEvent
CloseHandle
GlobalFlags
FreeLibrary
GetThreadLocale
SystemTimeToFileTime
FileTimeToSystemTime
GetAtomNameA
GlobalGetAtomNameA
lstrcmpA
CompareStringA
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
GetModuleFileNameA
GetCurrentProcessId
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
MultiByteToWideChar
CopyFileA
FormatMessageA
MulDiv
LocalFree
GlobalFree
GlobalLock
GlobalUnlock
GlobalSize
GlobalAlloc
SetLastError
FileTimeToLocalFileTime
GlobalFindAtomA
IsValidCodePage
FindResourceA
WideCharToMultiByte
FindResourceW
SizeofResource
LockResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
SystemTimeToTzSpecificLocalTime
DecodePointer
USER32.dll NotifyWinEvent
CreatePopupMenu
GetMenuDefaultItem
MapVirtualKeyA
GetKeyNameTextA
SetLayeredWindowAttributes
EnumDisplayMonitors
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
DrawStateA
SetClassLongA
SetWindowRgn
SetParent
DrawEdge
DrawFrameControl
IsZoomed
LoadMenuW
GetSystemMenu
BringWindowToTop
SetCursorPos
CopyIcon
FrameRect
DrawIcon
UnionRect
UpdateLayeredWindow
MonitorFromPoint
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
InsertMenuItemA
GetMenuBarInfo
UnpackDDElParam
ReuseDDElParam
GetComboBoxInfo
PostThreadMessageA
WaitMessage
GetKeyboardLayout
IsCharLowerA
MapVirtualKeyExA
GetKeyboardState
ToAsciiEx
LoadAcceleratorsW
CreateAcceleratorTableA
DestroyAcceleratorTable
CopyAcceleratorTableA
SetRect
LockWindowUpdate
SetMenuDefaultItem
GetDoubleClickTime
ModifyMenuA
RegisterClipboardFormatA
CharUpperBuffA
IsClipboardFormatAvailable
GetUpdateRect
EnumChildWindows
DrawMenuBar
DefFrameProcA
DefMDIChildProcA
TranslateMDISysAccel
SubtractRect
SendNotifyMessageA
MonitorFromRect
InSendMessage
CreateMenu
WindowFromDC
GetWindowRgn
DestroyCursor
GetDCEx
GetTabbedTextExtentA
GetTabbedTextExtentW
ShowOwnedPopups
MapDialogRect
GetAsyncKeyState
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamA
SetRectEmpty
CopyImage
SystemParametersInfoA
GetMenuItemInfoA
DestroyMenu
PostQuitMessage
LoadBitmapW
SetMenuItemInfoA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMonitorInfoA
MonitorFromWindow
WinHelpA
GetScrollInfo
SetScrollInfo
LoadIconW
LoadIconA
GetTopWindow
GetClassLongA
EqualRect
MapWindowPoints
AdjustWindowRectEx
GetClientRect
RemovePropA
GetPropA
SetPropA
ShowScrollBar
GetScrollRange
SetScrollRange
LoadCursorW
RedrawWindow
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
TrackPopupMenuEx
TrackPopupMenu
SetMenu
GetMenu
GetCapture
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPlacement
GetWindowPlacement
DestroyWindow
IsChild
IsMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
CallWindowProcA
DefWindowProcA
PostMessageA
GetMessageTime
GetMessagePos
RegisterWindowMessageA
GetScrollPos
SetScrollPos
CharUpperA
DestroyIcon
CallNextHookEx
SetWindowsHookExA
GetCursorPos
ValidateRect
GetKeyState
GetActiveWindow
IsWindowVisible
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
RealChildWindowFromPoint
GetClassNameA
GetDesktopWindow
PtInRect
GetWindowRect
IsDialogMessageA
GetWindow
SetWindowLongA
SetWindowTextA
ScrollWindowEx
GetFocus
SetFocus
GetDlgCtrlID
SendDlgItemMessageA
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
GetDlgItemTextA
SetDlgItemTextA
GetDlgItemInt
SetDlgItemInt
GetDlgItem
SetWindowPos
MoveWindow
ShowWindow
IsWindow
IntersectRect
InflateRect
CopyRect
GetWindowTextLengthA
GetWindowTextA
LoadCursorA
GetSysColorBrush
GetSystemMetrics
GetLastActivePopup
GetWindowThreadProcessId
GetParent
GetWindowLongA
MessageBoxA
IsWindowEnabled
EnableWindow
SendMessageA
UnhookWindowsHookEx
FillRect
GetSysColor
ScreenToClient
ClientToScreen
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
GetDC
TabbedTextOutA
GrayStringA
DrawTextExA
DrawTextA
RemoveMenu
AppendMenuA
InsertMenuA
GetMenuItemCount
GetMenuItemID
UnregisterClassA
InvertRect
HideCaret
EnableScrollBar
MessageBeep
GetSubMenu
GetMenuState
GetMenuStringA
GetIconInfo
DrawIconEx
LoadImageA
DrawFocusRect
IsRectEmpty
WindowFromPoint
ReleaseCapture
SetCapture
GetNextDlgGroupItem
GetDialogBaseUnits
LoadImageW
TrackMouseEvent
InvalidateRect
KillTimer
SetTimer
DeleteMenu
ScrollWindow
SetCursor
OffsetRect
ADVAPI32.dll RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueA
RegSetValueA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExW
RegSetValueExA
RegQueryValueExA
RegEnumValueA
SetFileSecurityA
GetFileSecurityA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptAcquireContextA
CryptReleaseContext
MSIMG32.dll AlphaBlend
TransparentBlt
SHLWAPI.dll PathRemoveFileSpecW
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathRemoveExtensionA
PathFindFileNameA
StrFormatKBSizeA
UxTheme.dll IsThemeBackgroundPartiallyTransparent
GetThemePartSize
GetWindowTheme
GetCurrentThemeName
GetThemeColor
IsAppThemed
GetThemeSysColor
DrawThemeBackground
CloseThemeData
OpenThemeData
DrawThemeParentBackground
DrawThemeText
gdiplus.dll GdipSetInterpolationMode
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipDrawImageI
GdipDeleteGraphics
GdipDrawImageRectI
GdiplusShutdown
GdipAlloc
GdipFree
GdiplusStartup
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePalette
GdipGetImagePaletteSize
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
OLEACC.dll LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
IMM32.dll ImmGetOpenStatus
ImmGetContext
ImmReleaseContext
WINMM.dll PlaySoundA
oledlg.dll #8
GDI32.dll CreateDCA
PolyBezierTo
GetDeviceCaps
BitBlt
CreateBitmap
CreateCompatibleDC
CreateDIBPatternBrushPt
CreateHatchBrush
CreatePen
CreatePatternBrush
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
Escape
ExcludeClipRect
GetClipBox
GetClipRgn
GetCurrentPositionEx
GetObjectType
GetPixel
GetStockObject
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
LineTo
OffsetClipRgn
PlayMetaFile
PtVisible
RectVisible
RestoreDC
SaveDC
SelectClipRgn
ExtSelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetMapperFlags
SetGraphicsMode
SetMapMode
SetLayout
GetLayout
SetPolyFillMode
SetROP2
SetStretchBltMode
ExtTextOutA
TextOutA
MoveToEx
GetObjectA
ExtCreatePen
SetArcDirection
SelectClipPath
PolyDraw
SetTextCharacterExtra
SetTextColor
SetTextAlign
SetTextJustification
PolylineTo
ArcTo
SetViewportOrgEx
SetWindowExtEx
StartDocA
SetColorAdjustment
ModifyWorldTransform
SetWorldTransform
SetWindowOrgEx
OffsetViewportOrgEx
OffsetWindowOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
CombineRgn
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
PatBlt
SetRectRgn
DPtoLP
GetTextExtentPoint32A
GetTextMetricsA
EnumFontFamiliesExA
CreatePalette
GetNearestPaletteIndex
GetPaletteEntries
GetSystemPaletteEntries
RealizePalette
GetBkColor
CreateCompatibleBitmap
CreateDIBitmap
EnumFontFamiliesA
GetTextCharsetInfo
GetDIBits
SetPixel
StretchBlt
CreateDIBSection
SetDIBColorTable
CreateEllipticRgn
Ellipse
GetTextColor
CreatePolygonRgn
Polygon
Polyline
CreateRoundRectRgn
LPtoDP
Rectangle
GetRgnBox
OffsetRgn
GetCurrentObject
CreateFontA
GetCharWidthA
StretchDIBits
RoundRect
FillRgn
FrameRgn
GetBoundsRect
PtInRegion
ExtFloodFill
SetPaletteEntries
SetPixelV
GetWindowOrgEx
GetViewportOrgEx
CloseMetaFile
CreateMetaFileA
DeleteMetaFile
EndDoc
StartPage
EndPage
AbortDoc
SetAbortProc
GetROP2
GetBkMode
GetNearestColor
GetPolyFillMode
GetStretchBltMode
GetTextAlign
GetTextExtentPointA
GetTextExtentPoint32W
GetTextFaceA
EnumMetaFile
SetViewportExtEx
CopyMetaFileA
PlayMetaFileRecord
WINSPOOL.DRV ClosePrinter
DocumentPropertiesA
OpenPrinterA
GetJobA
SHELL32.dll SHGetSpecialFolderLocation
ShellExecuteA
SHAddToRecentDocs
SHGetFileInfoA
ExtractIconA
SHGetDesktopFolder
DragQueryFileA
DragFinish
SHGetMalloc
SHBrowseForFolderA
SHAppBarMessage
ShellExecuteExA
SHGetPathFromIDListA
ole32.dll OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
OleRegGetMiscStatus
OleRegEnumVerbs
StgCreateDocfileOnILockBytes
WriteClassStm
GetHGlobalFromILockBytes
CreateGenericComposite
CreateItemMoniker
OleCreate
OleCreateFromData
OleCreateLinkFromData
OleCreateStaticFromData
OleCreateLinkToFile
OleCreateFromFile
CreateFileMoniker
OleSave
OleSaveToStream
OleSetContainedObject
OleGetIconOfClass
OleRun
CreateDataAdviseHolder
CreateOleAdviseHolder
GetRunningObjectTable
OleIsRunning
CoGetMalloc
OleQueryLinkFromData
OleQueryCreateFromData
CoFreeUnusedLibraries
OleInitialize
OleUninitialize
CoGetClassObject
CoRegisterClassObject
CoRevokeClassObject
CoRegisterMessageFilter
CLSIDFromProgID
OleCreateMenuDescriptor
CreateILockBytesOnHGlobal
StgIsStorageFile
StgOpenStorageOnILockBytes
StgOpenStorage
StgCreateDocfile
OleLockRunning
OleSetMenuDescriptor
PropVariantCopy
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
OleGetClipboard
DoDragDrop
OleIsCurrentClipboard
OleFlushClipboard
OleSetClipboard
CreateStreamOnHGlobal
CoInitializeEx
CoInitialize
CoCreateGuid
CoUninitialize
CLSIDFromString
CoCreateInstance
CoDisconnectObject
StringFromGUID2
SetConvertStg
OleRegGetUserType
ReleaseStgMedium
OleDuplicateData
ReadFmtUserTypeStg
WriteFmtUserTypeStg
CreateBindCtx
CoTreatAsClass
StringFromCLSID
CoTaskMemAlloc
WriteClassStg
ReadClassStg
CoTaskMemFree
OleLoad
OLEAUT32.dll RegisterTypeLib
SysStringLen
SysAllocStringLen
SysReAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayCreate
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayDestroy
SafeArrayRedim
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetUBound
LoadRegTypeLib
SafeArrayLock
SafeArrayUnlock
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElement
SafeArrayPutElement
SafeArrayCopy
SafeArrayPtrOfIndex
VariantClear
VariantCopy
VariantChangeType
VarDateFromStr
VarCyFromStr
VarBstrFromCy
VarBstrFromDate
VarBstrFromDec
VarDecFromStr
LoadTypeLib
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VariantInit
SysAllocString
SafeArrayGetLBound

Delayed Imports

Copyright

Ordinal 1
Address 0x2d80

Draw

Ordinal 2
Address 0x2d90

GetData

Ordinal 3
Address 0x2da0

GetFile

Ordinal 4
Address 0x2db0

GetInfo

Ordinal 5
Address 0x2dd0

GetInitString

Ordinal 6
Address 0x2de0

GetString

Ordinal 7
Address 0x2df0

GetType

Ordinal 8
Address 0x2e00

HasIntDlg

Ordinal 9
Address 0x2e10

Interface

Ordinal 10
Address 0x2e20

PluginFunc19

Ordinal 11
Address 0x2e40

SetData

Ordinal 12
Address 0x3040

SetFile

Ordinal 13
Address 0x3050

SetInitString

Ordinal 14
Address 0x32d0

SetParentWindow

Ordinal 15
Address 0x3350

SetPath

Ordinal 16
Address 0x3360

SetString

Ordinal 17
Address 0x33e0

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x448
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.43588
MD5 53a364d813496533143f5af76077e3be
SHA1 65d8032dbfa064c30521513bec690023f579b060
SHA256 1e0cebddaca52b227f95a3b7acf39c20d7dd6c2a29b830832cfd6c66164344e5
SHA3 bb04ccda853c2522c29956091923f0909229a75c6ae61830ff96b70fc91d9e42

2

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.2.0
ProductVersion 1.0.2.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_DLL
Language English - United States
Comments Written by Roman Voska (Oscar), maintained by Peter Misik (Orol)
CompanyName MediaChance
FileDescription SimplePlugIn Multimedia Builder Plug-in
FileVersion (#2) 1, 0, 2, 0
InternalName SimplePlugIn
LegalCopyright www.mediachance.com (c) 1999-2005
LegalTrademarks MediaChance
OriginalFilename SimplePlugIn.dll
ProductName SimplePlugIn
ProductVersion (#2) 1, 0, 2, 0
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2021-Jul-28 15:34:18
Version 0.0
SizeofData 145
AddressOfRawData 0x2a5dc4
PointerToRawData 0x2a43c4

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2021-Jul-28 15:34:18
Version 0.0
SizeofData 20
AddressOfRawData 0x2a5e58
PointerToRawData 0x2a4458

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2021-Jul-28 15:34:18
Version 0.0
SizeofData 1020
AddressOfRawData 0x2a5e6c
PointerToRawData 0x2a446c

TLS Callbacks

StartAddressOfRawData 0x102a6278
EndAddressOfRawData 0x102a6280
AddressOfIndex 0x102d90d4
AddressOfCallbacks 0x1024ef74
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0xbc
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x102ceebc
SEHandlerTable 0x102a38a8
SEHandlerCount 2375

RICH Header

XOR Key 0x4623239a
Unmarked objects 0
ASM objects (26715) 28
C++ objects (26715) 209
C objects (30034) 17
ASM objects (30034) 23
C++ objects (30034) 347
C objects (26715) 33
262 (26715) 1
Imports (26715) 33
Total imports 779
C++ objects (30038) 2
Exports (30038) 1
Resource objects (30038) 1
151 1
Linker (30038) 1

Errors

<-- -->