db66e89a3ce946bab327240aaef3953e

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2024-Nov-05 19:12:42
Detected languages English - United States
CompanyName Lamantine Software a.s.
FileDescription Portable Sticky Password run tool
FileVersion 8.8.6.1987
InternalName Portable run
LegalCopyright © 2001 - 2024 Lamantine Software. All rights reserved.
OriginalFilename spPortableRun.exe
ProductName Sticky Password
ProductVersion 8.8.6.1987
Homepage http://www.stickypassword.com

Plugin Output

Info Matching compiler(s): Borland Delphi v6.0 - v7.0
Microsoft Visual C++ v6.0 DLL
Microsoft Visual C++ 8.0
Info Interesting strings found in the binary: Contains domain names:
  • http://www.stickypassword.com
  • https://www.stickypassword.com
  • https://www.stickypassword.com/applink?action
  • stickypassword.com
  • www.stickypassword.com
Suspicious The PE is possibly packed. Unusual section name found: .itext
Unusual section name found: .didata
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
  • FindWindowW
Code injection capabilities (PowerLoader):
  • GetWindowLongW
  • FindWindowW
Can access the registry:
  • RegSetValueExW
  • RegEnumKeyExW
  • RegLoadKeyW
  • RegDeleteKeyW
  • RegOpenKeyExW
  • RegQueryInfoKeyW
  • RegUnLoadKeyW
  • RegSaveKeyW
  • RegDeleteValueW
  • RegReplaceKeyW
  • RegFlushKey
  • RegQueryValueExW
  • RegEnumValueW
  • RegCloseKey
  • RegCreateKeyExW
  • RegRestoreKeyW
Possibly launches other programs:
  • ShellExecuteW
Uses functions commonly found in keyloggers:
  • MapVirtualKeyW
  • CallNextHookEx
  • GetForegroundWindow
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Enumerates local disk drives:
  • GetDriveTypeW
Can take screenshots:
  • GetDCEx
  • GetDC
  • FindWindowW
  • BitBlt
  • CreateCompatibleDC
Queries user information on remote machines:
  • NetWkstaGetInfo
Reads the contents of the clipboard:
  • GetClipboardData
Info The PE's resources present abnormal characteristics. The binary may have been compiled on a machine in the UTC+2 timezone.
Malicious The PE's digital signature is invalid. Signer: Lamantine Software a.s.
Issuer: DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
The file was modified after it was signed.
Malicious VirusTotal score: 5/73 (Scanned on 2024-11-20 05:22:10) AVG: FileRepMalware [Misc]
Avast: FileRepMalware [Misc]
Bkav: W32.AIDetectMalware
Cylance: Unsafe
Kaspersky: UDS:DangerousObject.Multi.Generic

Hashes

MD5 db66e89a3ce946bab327240aaef3953e
SHA1 e1036745b6612019d8079d32905cf31ea1c99c7a
SHA256 9218c585a9fbe8422a453c6e28cc43a2af2a35ee3c7744facd651872a4ae67eb
SHA3 50dfe7b2ef4e9eb3cf71702b10810636f444be680e21d8a062ca77fef159201c
SSDeep 49152:WToOEepr7CcgLFGSBqq8/NHMFhNaMBvq5CN9:WLEeVCcFNsi5CN9
Imports Hash c6aff8e275e048dead1631024edb3cb3

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 11
TimeDateStamp 2024-Nov-05 19:12:42
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x23be00
SizeOfInitializedData 0x51c00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0023D0F0 (Section: .itext)
BaseOfCode 0x1000
BaseOfData 0x23e000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.0
ImageVersion 0.0
SubsystemVersion 5.0
Win32VersionValue 0
SizeOfImage 0x2ee000
SizeOfHeaders 0x400
Checksum 0x2e921c
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 89f1fe49d8b26cc7f1b7abdb309da728
SHA1 e3ffbd06606bdac6f006728d5334f9f3a83a3545
SHA256 c8fc9ee15f4aa2e9081fd9deff2ed40c3c6dd35059bbb7a1259c8426695581fc
SHA3 738cd8d132c76712e666654718f1686e9d1638d85e51647872b42313379de7c7
VirtualSize 0x239bec
VirtualAddress 0x1000
SizeOfRawData 0x239c00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.47235

.itext

MD5 7b568871791568f448dce0a727088f0d
SHA1 8c6ac21dbac14d31a39cb69856e3c335bb0b3aba
SHA256 e17933f26b5653f7503704680dd038406f527a34771c79a65d9e3f6831241c6e
SHA3 51a58f01db392433d23e13f350496a6094998f441578c25eb71d034bdf22109f
VirtualSize 0x2110
VirtualAddress 0x23b000
SizeOfRawData 0x2200
PointerToRawData 0x23a000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.6853

.data

MD5 95f30a523e9880e9727ff39ad3d22e87
SHA1 619009a5a765f864aa1051d43154fbedd8828789
SHA256 307f1d9ef3c4d5f47f223872a13c1de9256391468f61ffe01f7744ac55184b5e
SHA3 5a7e6036103b3cec98eba0c4eb70430006fc0fdbc1ac63bf267d777dfa6261c6
VirtualSize 0x5ed8
VirtualAddress 0x23e000
SizeOfRawData 0x6000
PointerToRawData 0x23c200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.88577

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x8f20
VirtualAddress 0x244000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 c1024d54c53d96ff934628c296b527b2
SHA1 92797b2f8f8b879d7bc2326e932a297088ed1f4f
SHA256 2601274d5a605886f14f2de9e02387660235ca0e4f4605785a8597a291c5697e
SHA3 bf15e8bfeb06576ba0d66ec48de87efdb357e746a2ac449c997579a27de16dbe
VirtualSize 0x3350
VirtualAddress 0x24d000
SizeOfRawData 0x3400
PointerToRawData 0x242200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.25906

.didata

MD5 9cc6aa835299e2ee17eab3b29473d353
SHA1 9d627251c762848db49b4727a5b24086a4fd5385
SHA256 64b28040beb23224d8024a00726c9977112cf6be4f6f0c568ac7581874c891fc
SHA3 c1679f22ce750f9909b51f9b9a5fddbcd20368efb1646c1055377ae5b1c238df
VirtualSize 0xc38
VirtualAddress 0x251000
SizeOfRawData 0xe00
PointerToRawData 0x245600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.00091

.edata

MD5 8be5dc2e1ba432ead09ddf6bdabb8e98
SHA1 b73a9451c71e4ee5432efd620bba9a10de516f2e
SHA256 5bff6b41f50787ba1cc087987f080d6287a4ca366d9e76f5df69d15d226f71b4
SHA3 635e6bd30d65f4e84fd0e8e75bffe36c53f0612a2da24c6f1a80d86f25f43dd1
VirtualSize 0x9f
VirtualAddress 0x252000
SizeOfRawData 0x200
PointerToRawData 0x246400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.98595

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x54
VirtualAddress 0x253000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 a6a0c111b6e70e619270c705586444f9
SHA1 30262bc41dcf970ab80f33fd30df2460f16345c5
SHA256 0956cfc7e36c8da0d77cebc010512cab9d122002f4b50f8b90b22e0c0bed8dbf
SHA3 5dcb96fa3701a61c26dc090bf43f806342e8cd7b49f226a5052d837d54b602c7
VirtualSize 0x5d
VirtualAddress 0x254000
SizeOfRawData 0x200
PointerToRawData 0x246600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 1.34328

.reloc

MD5 86cae67ed31a4b7717edf666fc5161c2
SHA1 d7fe30092390feac95c4c9d542760ff32a73f8f1
SHA256 f44a7221d905b4d9828df8f9d1cc10fda5f778164d74cbf2553f3965b9dcccaa
SHA3 d2900b2379120bfb7f14534932797bc59df05cd414fba12d2ea22f569b80c583
VirtualSize 0x344c4
VirtualAddress 0x255000
SizeOfRawData 0x34600
PointerToRawData 0x246800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.70374

.rsrc

MD5 0c5683c626e3dca165990e03e3294050
SHA1 94fd7afcb4b54051962bfe2b1b051c15a10f4e23
SHA256 6ea7a47da98d5f73a49b31a5671fe6d0e833384ab1e89c94feae54c566a46e21
SHA3 3d1ac1911996fcf815009ec01ad50104c58b82cefb61ff2a53d54bd87df09bf5
VirtualSize 0x63e00
VirtualAddress 0x28a000
SizeOfRawData 0x63e00
PointerToRawData 0x27ae00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.30751

Imports

kernel32.dll GetACP
LocalFree
CloseHandle
GetCurrentProcessId
SizeofResource
VirtualProtect
lstrcmpiW
QueryPerformanceFrequency
IsDebuggerPresent
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
GlobalSize
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
ReadFile
GetUserDefaultLCID
GetLastError
GetModuleFileNameW
SetLastError
GlobalAlloc
GlobalUnlock
FindResourceW
CreateThread
CompareStringW
LoadLibraryA
ResetEvent
MulDiv
FreeResource
GetDriveTypeW
GetVersion
RaiseException
GlobalAddAtomW
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
GlobalFindAtomW
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetStartupInfoW
GlobalDeleteAtom
GetFileAttributesW
SetCurrentDirectoryW
InitializeCriticalSection
VerLanguageNameW
GetThreadPriority
GetCurrentProcess
SetThreadPriority
GlobalLock
VirtualAlloc
GetSystemInfo
GetCommandLineW
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetModuleFileNameA
lstrlenW
CompareStringA
QueryPerformanceCounter
SetEndOfFile
lstrcmpW
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
EnumResourceNamesW
GetSystemDefaultLCID
GetLocalTime
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
CreateEventW
WaitForMultipleObjectsEx
SetThreadLocale
GetThreadLocale
winspool.drv DocumentPropertiesW
ClosePrinter
OpenPrinterW
GetDefaultPrinterW
EnumPrintersW
comctl32.dll ImageList_GetImageInfo
FlatSB_SetScrollInfo
ImageList_DragMove
ImageList_Destroy
_TrackMouseEvent
ImageList_DragShowNolock
ImageList_Add
FlatSB_SetScrollProp
ImageList_GetDragImage
ImageList_Create
ImageList_EndDrag
ImageList_DrawEx
ImageList_SetImageCount
FlatSB_GetScrollPos
FlatSB_SetScrollPos
InitializeFlatSB
ImageList_Copy
FlatSB_GetScrollInfo
ImageList_Write
ImageList_DrawIndirect
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_BeginDrag
ImageList_GetIcon
ImageList_Replace
ImageList_GetImageCount
ImageList_DragEnter
ImageList_GetIconSize
ImageList_SetIconSize
ImageList_Read
ImageList_DragLeave
ImageList_LoadImageW
ImageList_Draw
ImageList_Remove
ImageList_ReplaceIcon
ImageList_SetOverlayImage
shell32.dll Shell_NotifyIconW
ShellExecuteW
ole32.dll OleRegEnumVerbs
IsAccelerator
CoCreateInstance
CoUninitialize
IsEqualGUID
CreateStreamOnHGlobal
OleInitialize
ProgIDFromCLSID
OleUninitialize
CoGetClassObject
CoInitialize
CoTaskMemFree
OleDraw
CoTaskMemAlloc
OleSetMenuDescriptor
StringFromCLSID
version.dll GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
user32.dll CopyImage
CreateWindowExW
GetMenuItemInfoW
SetMenuItemInfoW
DefFrameProcW
GetDCEx
PeekMessageW
MonitorFromWindow
GetDlgCtrlID
SetTimer
MessageBoxA
WindowFromPoint
BeginPaint
RegisterClipboardFormatW
FrameRect
MapVirtualKeyW
IsWindowUnicode
RegisterWindowMessageW
FillRect
GetMenuStringW
DispatchMessageW
CreateAcceleratorTableW
SendMessageA
DefMDIChildProcW
EnumWindows
GetClassInfoW
ShowOwnedPopups
GetSystemMenu
GetScrollRange
GetScrollPos
SetScrollPos
GetActiveWindow
SetActiveWindow
DrawEdge
GetKeyboardLayoutList
LoadBitmapW
DrawFocusRect
EnumChildWindows
ReleaseCapture
UnhookWindowsHookEx
LoadCursorW
GetCapture
SetCapture
CreatePopupMenu
ScrollWindow
ShowCaret
GetMenuItemID
GetLastActivePopup
CharLowerBuffW
GetSystemMetrics
SetWindowLongW
PostMessageW
DrawMenuBar
SetParent
IsZoomed
CharUpperBuffW
GetClientRect
IsChild
ClientToScreen
GetClipboardData
SetClipboardData
SetWindowPlacement
IsIconic
CallNextHookEx
GetMonitorInfoW
ShowWindow
CheckMenuItem
CharUpperW
DefWindowProcW
GetForegroundWindow
SetForegroundWindow
GetWindowTextW
EnableWindow
DestroyWindow
IsDialogMessageW
EndMenu
RegisterClassW
CharNextW
GetWindowThreadProcessId
RedrawWindow
GetDC
GetFocus
SetFocus
EndPaint
ReleaseDC
MsgWaitForMultipleObjectsEx
LoadKeyboardLayoutW
GetClassLongW
ActivateKeyboardLayout
GetParent
DrawTextW
SetScrollRange
MonitorFromRect
InsertMenuItemW
PeekMessageA
GetPropW
SetClassLongW
MessageBoxW
MessageBeep
SetPropW
RemovePropW
UpdateWindow
GetSubMenu
EqualRect
MsgWaitForMultipleObjects
DestroyMenu
DestroyIcon
SetWindowsHookExW
EmptyClipboard
IsWindowVisible
FlashWindowEx
DispatchMessageA
UnregisterClassW
GetTopWindow
SendMessageW
AdjustWindowRectEx
DrawIcon
IsWindow
EnumThreadWindows
GetMessageTime
InvalidateRect
GetKeyboardState
DrawFrameControl
ScreenToClient
SendMessageTimeoutW
SetCursor
CreateIcon
CreateMenu
LoadStringW
CharLowerW
SetWindowRgn
SetWindowPos
GetMenuItemCount
RemoveMenu
GetSysColorBrush
GetKeyboardLayoutNameW
GetWindowDC
TranslateMessage
OpenClipboard
DrawTextExW
MapWindowPoints
EnumDisplayMonitors
CallWindowProcW
CloseClipboard
DestroyCursor
GetScrollInfo
SetWindowTextW
GetMessageExtraInfo
EnableScrollBar
GetSysColor
TrackPopupMenu
CopyIcon
DrawIconEx
PostQuitMessage
GetClassNameW
ShowScrollBar
EnableMenuItem
GetIconInfo
GetMessagePos
SetScrollInfo
GetKeyNameTextW
GetDesktopWindow
GetCursorPos
SetCursorPos
HideCaret
GetMenu
GetMenuState
SetMenu
SetRect
GetKeyState
FindWindowExW
MonitorFromPoint
SystemParametersInfoW
LoadIconW
GetCursor
GetWindow
GetWindowLongW
GetWindowRect
InsertMenuW
KillTimer
WaitMessage
IsWindowEnabled
IsDialogMessageA
TranslateMDISysAccel
GetWindowPlacement
CreateIconIndirect
FindWindowW
DeleteMenu
GetKeyboardLayout
oleaut32.dll SysFreeString
VariantClear
VariantInit
GetErrorInfo
SysReAllocStringLen
SafeArrayCreate
GetActiveObject
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
netapi32.dll NetWkstaGetInfo
NetApiBufferFree
advapi32.dll RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegQueryValueExW
RegEnumValueW
RegCloseKey
RegCreateKeyExW
RegRestoreKeyW
gdi32.dll Pie
SetBkMode
CreateCompatibleBitmap
GetEnhMetaFileHeader
CloseEnhMetaFile
RectVisible
AngleArc
SetAbortProc
SetTextColor
StretchBlt
RoundRect
RestoreDC
SetRectRgn
GetTextMetricsW
GetWindowOrgEx
CreatePalette
PolyBezierTo
CreateICW
CreateDCW
GetStockObject
CreateSolidBrush
Polygon
MoveToEx
PlayEnhMetaFile
Ellipse
StartPage
GetBitmapBits
StartDocW
AbortDoc
GetSystemPaletteEntries
GetEnhMetaFileBits
GetEnhMetaFilePaletteEntries
CreatePenIndirect
SetMapMode
CreateFontIndirectW
PolyBezier
LPtoDP
EndDoc
GetObjectW
GetWinMetaFileBits
SetROP2
GetEnhMetaFileDescriptionW
ArcTo
CreateEnhMetaFileW
Arc
SelectPalette
ExcludeClipRect
MaskBlt
SetWindowOrgEx
EndPage
DeleteEnhMetaFile
Chord
SetDIBits
SetViewportOrgEx
CreateRectRgn
RealizePalette
SetDIBColorTable
GetDIBColorTable
CreateBrushIndirect
PatBlt
SetEnhMetaFileBits
Rectangle
SaveDC
DeleteDC
FrameRgn
BitBlt
GetDeviceCaps
GetTextExtentPoint32W
GetClipBox
IntersectClipRect
Polyline
CreateBitmap
SetWinMetaFileBits
GetStretchBltMode
CreateDIBitmap
SetStretchBltMode
GetDIBits
CreateDIBSection
LineTo
GetRgnBox
EnumFontsW
CreateHalftonePalette
SelectObject
DeleteObject
ExtFloodFill
UnrealizeObject
CopyEnhMetaFileW
SetBkColor
CreateCompatibleDC
GetBrushOrgEx
GetCurrentPositionEx
GetTextExtentPointW
ExtTextOutW
SetBrushOrgEx
GetPixel
GdiFlush
SetPixel
EnumFontFamiliesExW
StretchDIBits
GetPaletteEntries
kernel32.dll (delay-loaded) GetACP
LocalFree
CloseHandle
GetCurrentProcessId
SizeofResource
VirtualProtect
lstrcmpiW
QueryPerformanceFrequency
IsDebuggerPresent
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
GlobalSize
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
ReadFile
GetUserDefaultLCID
GetLastError
GetModuleFileNameW
SetLastError
GlobalAlloc
GlobalUnlock
FindResourceW
CreateThread
CompareStringW
LoadLibraryA
ResetEvent
MulDiv
FreeResource
GetDriveTypeW
GetVersion
RaiseException
GlobalAddAtomW
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
GlobalFindAtomW
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetStartupInfoW
GlobalDeleteAtom
GetFileAttributesW
SetCurrentDirectoryW
InitializeCriticalSection
VerLanguageNameW
GetThreadPriority
GetCurrentProcess
SetThreadPriority
GlobalLock
VirtualAlloc
GetSystemInfo
GetCommandLineW
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
HeapCreate
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetModuleFileNameA
lstrlenW
CompareStringA
QueryPerformanceCounter
SetEndOfFile
lstrcmpW
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
EnumResourceNamesW
GetSystemDefaultLCID
GetLocalTime
WaitForSingleObject
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
GetComputerNameW
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
CreateEventW
WaitForMultipleObjectsEx
SetThreadLocale
GetThreadLocale

Delayed Imports

Attributes 0x1
Name kernel32.dll
ModuleHandle 0x2511c0
DelayImportAddressTable 0x2511f8
DelayImportNameTable 0x251324
BoundDelayImportTable 0x251450
UnloadDelayImportTable 0x251548
TimeStamp 1970-Jan-01 00:00:00

dbkFCallWrapperAddr

Ordinal 1
Address 0x24763c

__dbk_fcall_wrapper

Ordinal 2
Address 0x1169c

TMethodImplementationIntercept

Ordinal 3
Address 0x6b3c8

1

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.6633
MD5 ff4e5862f26ea666373e5fab2bddfb11
SHA1 cfa13c0ab30f1bbd566900dee3631902f9b6451c
SHA256 b8e6fc93d423931acbddae3c27dd3c4eb2a394005d746951a971cb700e0ee510
SHA3 91dae12a9f43c5443e0661091a336f882fa1482f75fa9a57c9298d1d70c8ae69

2

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.80231
MD5 2e87b3c111e3073a841775c1f8ec5a90
SHA1 20292304fa2ef1bfdc4a1000e90a1c16d4765a96
SHA256 ce19ace18e87b572e6912306776226af5b8e63959c61cde70a8ff05b3bbdcc41
SHA3 9527f09e739c2064835800a7e5c317cb422bdd7237f00fca079a1c62f58a2612

3

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.00046
MD5 a04c3c368cb37c07bd5f63e7e6841ebd
SHA1 699300bceaa1256818c43fecfc8cad93a59156b2
SHA256 ee1c9c194199c320c893b367602ccc7ee7270bd4395d029f727e097634f47f8c
SHA3 58722e3138aad1382e284c1605ecd665ced536de4906749ac8d6e11252cc9558

4

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.56318
MD5 9929115b21c2c59348058d4190392e75
SHA1 626fba1825d572ea441d36363307c9935de3c565
SHA256 9d9edf87ca203ecc60b246cc783d54218dd0ce77d3a025d0bafc580995a4abd8
SHA3 fea156e872544252c625076a6bf3baa733ee5b3d5399716e156734af7a841369

5

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.6949
MD5 f321ad13d1c3f35a05d67773b4bc27d6
SHA1 30aded8525417e2531d5eb88bf2f868172945baa
SHA256 99676c52310db365580965ea646ece86c62951bfd97ec0aae9f738a202a90593
SHA3 04c839da98a8c50a36697076af5bc6d527560a69153b2f718f065908fd4fe3ad

6

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.62527
MD5 5ca217e52bdc6f23b43c7b6a23171e6e
SHA1 d99dc22ec1b655a42c475431cc3259742d0957a4
SHA256 11726dcf1eebe23a1df5eb0ee2af39196b702eddd69083d646e4475335130b28
SHA3 b358d8a5b0f400dd2671956ec45486ae1035556837b5289df5f418fe69348b3f

7

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.91604
MD5 6be7031995bb891cb8a787b9052f6069
SHA1 487eb59fd083cf4df02ce59d9b079755077ba1b5
SHA256 6f938aab0a03120de4ef8b27aff6ba5146226c92a056a6f04e5ec8d513ce5f9d
SHA3 0f1c6c0378a3646c9fbf3678bbeeccf929d32192f02d1ea9d6ba0be5c769e6ab

1 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.84544
MD5 b41623e2a7799d46ce41a797be51a206
SHA1 f065bc18fb1e13541450bd2f2dc4aa1d616437a3
SHA256 9e8287493e6e20d48d26725e2097848a6ec67d2c5aa5e8f03f9c48e7e3729ae2
SHA3 416c8364f1a0311c0ed2f57c6e9795d6e9eedc801be05af7735cf6bc008d0a1a

2 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.14429
MD5 5398b6b03d5e9c3b814058917358d218
SHA1 951b416ef98e3a4025b82048ba2ea151f8a75851
SHA256 b599cc5a3bef6fe36f33e1e7b0b4917bc28e638482cc67de6addb46e04d9109e
SHA3 6b7c3ca068a1522c6ca34ad6240bde481e8c77cb94cec5bd470f5b4ad232ec17

3 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x568
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.39741
MD5 2e039ff6aeffb7fbd6b3095b8ab24f2d
SHA1 5c0afa4a0635c37f966dc90f27ce858e4571ed4e
SHA256 0091a44b04ff9fb346ad4bd01b1491d82be328802b88a92e657041601f58f46a
SHA3 6d1f8420a484605684e79b8f6876a964ff61bd8a6b027fd326ba8b66a1563554

4 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x291b
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 7.9309
Detected Filetype PNG graphic file
MD5 2c000b6c1b725f91ecaee57636df7f44
SHA1 ad1460045594434590ed72021e19ff4c3c7f233d
SHA256 ddb4b25ecec246c3f084ce67891eee78545eb077cf8fd9e84ee05bc9de3fe057
SHA3 1853790016f9ec7337eff9e508367426df292c505d1b31324ff1d9ef4857951d

5 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.34933
MD5 73ad5774cc19bafd8cbe391a8104657c
SHA1 4673050018a4d747471912598f50cd55e7cf137e
SHA256 fd2d746787dfb023afb1ff0fb7718f4e574b0e84443b41a446184db2b8928acc
SHA3 50ff876e0820ec246915a53b95f5bc86ea9c087ce2eaf74b8738432bf98f146b

6 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.68661
MD5 371adbf694cd7674759fbbe6b42500e0
SHA1 2ce3f683dd03810c1ed947219c9cd78c8f4ec726
SHA256 57fbe8231f80bb1a0990f16f06d88fac68928bc0a871cf3790e0aadbc27ae6fb
SHA3 9f7954101e9dbe04ab5ea7a037390e47fe31c5f4dfaee60dbc2e992babe1cde3

7 (#2)

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.24533
MD5 8fb9050ccbafade22c87e42c69c8646d
SHA1 6d8db076c019a10777e58b195f63163188212900
SHA256 0865880bd88da4dd8b7ff827ea2b4963fa86328e4e8c07e02ac315326d6ba4ec
SHA3 5b1be54ef70c7af397f07c9ad86171528efed9650898a0942011873827826a43

1 (#3)

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x186
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.95679
MD5 06099dd9d4a6a360e556dd6236b74abd
SHA1 afcae7ccb23ec30d9d43f6dce1bbbcfcbf90bc72
SHA256 699fde68b0f6d1c33e623a628ac3da6af33b1c6a1ed50243e099b1f928cce648
SHA3 0d0022ea2e8e7cedb63de172d58d1402e6549b71b2fb13461988a1310920dda0

2 (#3)

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0xc4
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.73125
MD5 da2bf1929631f5947484a8cf0608b971
SHA1 639e7ed4365d566c1ad4dbeff702590db8b6783f
SHA256 6f8cb410b1f50cd9d3df6a0181481249c2acb5908e3fcd30a41045453ae9717b
SHA3 832fc40f01feea2cdc0e4a45b707735388deaa8c6e54047bc98831fe4e50e83a

65

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x2b0
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.99128
MD5 808c44b8842b099d4040dae58f3b1694
SHA1 8660e6922f68507c64fd51b2b4e8ff68dc9fae77
SHA256 047c1583367b2531256b458e8eb2155d6a3ed2e18b81140b7d0219243c0cfa96
SHA3 cf4fde456281d880043c244490a2de8e981447a305b40d8df90887a0b6a48a3c

66

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x206
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.65552
MD5 a69affa02a639acfef04d73197620d69
SHA1 0d2044d9620e9e5da9fd659de38166eb69ee53e1
SHA256 72bf5cf4875546d30092b624df7e921056eb72a153d22b618724f20f82919d15
SHA3 dba629316f4691528a2d9cfe7fb374e7e4927c9b9cc80b62c8d9d7bb6d41376f

4073

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2f4
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.2082
MD5 5f0714af8749345dab842d12f183b6e3
SHA1 0ff631517ed56991cf2ca559306a89f51cf6ba47
SHA256 467dc8e0c6d4b0aed8ea438a354fbf918649bc92aa91ff03db8ed27281afbc8f
SHA3 bd0c6b4d130c6b198e328dc888cb37c019331f139714ad0d20ef8d09243db84a

4074

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x618
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.38107
MD5 4de8385499f4e4ef5ebe73ae2fe1adab
SHA1 3962ba092f941a0f6cb488892ba930980d08d8f0
SHA256 5b1d930b176e6870d1fab4c5dbb010749d79f419146c40e61e3f68be79c588e6
SHA3 0c09335523ff6be95ddc7fe0a33829a6b62fe12e59737c3e630132332a16386c

4075

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x42c
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.25021
MD5 f5a0b4f71f73e7716137fc6f64f1e4b8
SHA1 18f256452c8d7ea020fb166353642fdc10f78e23
SHA256 9d10b0941dc659ad4e63432a08414528ebd470cf67a71b6e453e188f485fed92
SHA3 ad0e39ff03ce891a0deeabfc4db3375d555e623eab6dc7fabd18e2665c9a1880

4076

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x358
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.38031
MD5 f6aafcdbdefe7ca2a941b4d8381c8aff
SHA1 778935e765a9b9c62dd5b892bb34150aaf545764
SHA256 b61babb88319e9bc8f8c8f528b2ef5f4a0d192b07495508fa46c32d4c68f0d94
SHA3 b046cb1b165f479e015b9acdb335a057578cec884bbd2b462f36ca0f8de4c82b

4077

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2cc
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.31038
MD5 c21ca2faa430b64f724cc9f5a03989a5
SHA1 edb15e353ff385871c1074493e0b79b9f191018c
SHA256 6bc1811f2d91d0769ea72588bc162b21e21ace2e4a781fd2ad0be00a57c14e5f
SHA3 5b350c9a4c13f44372478b4c037cdceba6618e1dd8991bd42c39429fee5ce1b6

4078

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xbc
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.48379
MD5 f3d34521fcb7b6517853412f01fdaf1b
SHA1 906364b239f9dc8e320a7c872dee6a483adcec97
SHA256 45b2c7a2c3f36ebc21ebf6dcd3424722970f3f183b704cf0e1adf00a0ce8f3ee
SHA3 6ed1011ceadd13b01574e1975f3f2fb7708a951519a61e8c2e8667b7753cf156

4079

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xfc
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.48702
MD5 f09129856bc06350c3cf136d50722917
SHA1 f92347b17397b121cbeaacca9fada741f43d5853
SHA256 46d3fd0ce3ada4ff2b73c35fbe472dadc5f53b2d6c66121f82bfee9e93bd12a6
SHA3 2edcb0cf28fb3af248d1832f00bafa006d62214c9839bd3d161f008d17115378

4080

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3c4
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.2477
MD5 8bf989b89f7d4b0477c3a5cc3caab1ba
SHA1 0359cbb8594405b760c4cfe8f10ecba464331e3f
SHA256 d43e7265013451cb43572ff5a601f6c9e481e723cb17df8f586b6b40546621d4
SHA3 dfbc56035df3dca3aaada754f1db93b2fdff3d775950e5de7e89e701412ab5f6

4081

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3f0
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.32927
MD5 5e3fcc161a7cee2e90097feaf65451f2
SHA1 829957067d611e1aa2beb414294f4f2f61ea3626
SHA256 2f585b0f8effb9b0f5f06769b19205f1a0887375636946e31442bbf53152ba45
SHA3 18d452c43bc92532e9e682fc720e920d8c84266fced5df7b4ee764da57ff185f

4082

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3e4
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.29708
MD5 145a01d8ff49662fcc1e5d7e867cb654
SHA1 02bdf7275fca4f2c5cd292c60ac1a301ddba1bc4
SHA256 ee6c37ba2652d370fc0e35d36f143d6366b176f3a7b053a40999b176a2effa05
SHA3 c81378a332269331dd0670a8104bdfc2e447c37c386b5e5fe4ae832c9146b9da

4083

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x440
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.28556
MD5 fbaa4ea2ca40cbe0b9fed20792985c2d
SHA1 7ad7d79ec0258319419ebc9556a8f1db4db749ba
SHA256 8d308a76073dcf6ba0b22e8f221ca6a093c10399e3cc4857c6a7138bdb991ef6
SHA3 db4db3240f0c2716c2c417ec3f66fe60e740c8ce4c5a58203fc3ffe6b8f64916

4084

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2c4
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.46218
MD5 af4cc44c58bac3f0d23b44e954aa9f4d
SHA1 68b1acd5569250941f4c4fb4d08cf1cbc05cc3ae
SHA256 9fdb46b2f0ca98f8803982596d23f030b3fc6ac8ba60e2a5f599c9d628891789
SHA3 dba45432e00acbc0402ecdb1956a46fbb70cb2e4b457c2fe673e595e011a94a5

4085

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3f8
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.28777
MD5 0b4e41b008a4eefeccd931a49385efb1
SHA1 6fe4e66cc7174828ef7fc2c80fa1b9da6915cad1
SHA256 d05c32075fff90f59acdcad0bf23583e95230d95c2b29d6d1d18a06480a24105
SHA3 acd6699c23374caf78546625188296e6bcb677ef656aecb3493826fd5c69b26d

4086

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x50c
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.30431
MD5 332e5cc54f9d3bc31d0138025843860d
SHA1 1bfbc7b1f561df19c2074c2f877c01dfdccd6583
SHA256 0043cf59a18abefd6bbad31f17479b933970d02469b252e497ed0a770c84b561
SHA3 2e50ed436c120c704c5e86271a63815cc2d879fa2d39479defde61029f126a68

4087

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x45c
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.19084
MD5 2b6dc53aa1311e20f9f495d2f2d2c627
SHA1 0bd2cb9502c0469d4883ba90dddf1cbd6b42e64a
SHA256 3f34a777e490959af49fef42159fd21542a38470c900fe45120754ab8678f0c5
SHA3 a87e7a2d61d4dd47bb31c31462e5b66527c4c90141e1746878a90fd982d7f3f6

4088

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x380
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.33812
MD5 3a5fb8d0f24297eed9d303824eb8b498
SHA1 ada4a9fcab6c909830ddee122302370038e990c9
SHA256 3ef2b282f577fe474cce8902f8f682d2acb3bd0c6db09ae192c7421658b05b6d
SHA3 95b11447b2cbf65f8cd52b8a266840e9de89c762dccb70fee8e605327aff3514

4089

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x45c
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.31924
MD5 31ce356234fa503778d2cce164ea0493
SHA1 0e71b96f71e32120aaed258538ddf806019d5c5a
SHA256 e8a5f9e529661d8901f28794a65429b0e8c5f510e6ff0c0881cf7bf483491fb6
SHA3 0193333679fe2b6fd962926c6676d60211fd2a180ee02cc093d1453122b78703

4090

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x19c
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.33253
MD5 5e944d46bb658646920334eb5fa01c18
SHA1 d13fe77bfd90fb1e0bbc0c9510bd44597eb3d304
SHA256 5ae1c4a51b83a6c208529c0e98eeb95065dc6d6ff69a3918df5fb420e94fa6e8
SHA3 b5359b179df4952263f636d8bcf46d1889bb6469f12cec405c781ce6feb518b7

4091

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xcc
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.33625
MD5 cc22f1ac30dcdeae9cd72ed8abbb02cc
SHA1 9ed70b6c75879d40481e525a275d4b99d75abc56
SHA256 93aef43aba52d60e77b3bbd23dda80f9fe6e1be314a87b02feca051426a10ba7
SHA3 8a7657f317d99f5180257945fed83bf07fa87ee81355373bedd142df395b9a6e

4092

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x198
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.40049
MD5 6f9be8d803d71b2f5a91c2e1b5e3b41a
SHA1 6ad07a197f5f8c10c64cd4ed264de6c26f79aaa5
SHA256 7d3c5b95e9b78743f4e39aadb7d98b0b2c45888c414d582ee36c122e54a26922
SHA3 31a5970ad628bf0fd7448deef15985ae1e0ff3571592cdcc35e03faf9ece277a

4093

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3c8
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.28204
MD5 b98520d446318f4cf809f9fa9bbd5297
SHA1 b13c88cd13623b4954555545fe7e6e2d27a95eb8
SHA256 aad850b9c5a9f29c893905fc7cf3040606e99770ffee0547553587a031ef2616
SHA3 f21f082118960d326ddf8499ca836616e16bc0ca8fdb671ee64f1cbe2b6c0a99

4094

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3b4
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.32432
MD5 c3f68fc76046f7bd8ade21011de5b397
SHA1 99daeeafb9ef980c8246949854be2b0bfcef0121
SHA256 5d335fe242e44b7684bc0f0ca32146615613c69e467acbd747ccc9a02ca5b2fc
SHA3 fc4705bedfef09372a33d25f4e0572a91d19275b6150a921663075c765dd3f1d

4095

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x354
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.32737
MD5 c923d562e6bffdab843dd41743621c2a
SHA1 3581fd1e39f474f0eec94bfca6d1e4857f5a3f79
SHA256 b71dd4c8b1a31e49b72cec2cda5929b8acabbb082dec2397258111e5a9f18556
SHA3 00ca1d0c6d0f1200dca193289c7e5411c8d9e390424a0467d8d050a8420cc068

4096

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x2b0
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.31046
MD5 5bdaa31f73f4391e054be4f6f7339c89
SHA1 d26aa5774d908db8d61839d9f97f466bfd481f31
SHA256 f23d2f8944592bdb72316c8ca9ff2d462337c430ee7635a78b968dbb121d87ef
SHA3 6668015579da24896aae22c9b01bd24d4d42006f96a6ffc4b15da22a690a60fb

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x10
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 4
MD5 a40263c75fde7440b1086b7da9c51fc2
SHA1 139a84f87110fb5cb16a386adade21f30cae98b0
SHA256 e7dbe99baa5c1045cdf7004edb037018b2e0f639a5edcf800ec4514d5c8e35b5
SHA3 d3a734fa7d36868d301f9569de92e1bfc551e4b5cf6d7c59eace8d0a554093c0

MSG_ERROR

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x148b
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 7.93139
Detected Filetype PNG graphic file
MD5 50ea148a8b3f8e6e0bcf6b37918f4a93
SHA1 4d4a0a69e7f3f1a234cf4edcf3a897e18531b07e
SHA256 e74432afd4c7fe4cfb0cf8425ae298fcf425e0f0437510bde8546dbd02da0a2d
SHA3 de40febb93ab240fba58daff4f662e8f6889974a0fbadb23d2009c6efa445253

MSG_INFO

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x111e
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 7.90721
Detected Filetype PNG graphic file
MD5 51ffac6dde5a49e226a5435dc08656a0
SHA1 2d4a625ab8c1c45ed5f0e2a4e4138077d5ee89e6
SHA256 25e3ec43b207e22a0ee7701b9525975043ec2817e492dd07eb40306b944374c4
SHA3 becc7f28397fc80e9d96cdd13bb0a732ea8935cbde51c448e367e6bdbcbf464e

MSG_WARNING

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0xd8c
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 7.89203
Detected Filetype PNG graphic file
MD5 481232c3ddd70cc57011d3d8ed8191ca
SHA1 8722e588f04dab44a4ec94e248d74d058f269220
SHA256 636f368c9f42323b69cdf2463823eadd363e91df7f37a9d0eb863708a7f3fb83
SHA3 1efc85d96c9733bb8129189eb537e3c4658563f0336bb33eba34707378eb9205

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0xa6c
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 5.34422
MD5 d9bd4f6920d5eb2ea98b4d90a0428b6c
SHA1 956c12c0a311fd93306aa8d33c054c5651957c2c
SHA256 032b9f7d05928f948046eca963755bafeb845b9f5420d7918857674605d3a8a2
SHA3 3f5b01e9b633d6bcd30333ef058d0b82d499d0ff8ad2d77d4a53c336f34f3bac

32761

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 1.83876
Detected Filetype Cursor file
MD5 a2baa01ccdea3190e4998a54dbc202a4
SHA1 e8217df98038141ab4e449cb979b1c3bbea12da3
SHA256 c53efa8085835ba129c1909beaff8a67b45f50837707f22dfff0f24d8cd26710
SHA3 8874564c406835306368adf5e869422e1bb97109b97c1499caa8af219990e8dc
Preview

32762

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 1.91924
Detected Filetype Cursor file
MD5 aff0f5e372bd49ceb9f615b9a04c97df
SHA1 e3205724d7ee695f027ab5ea8d8e1a453aaad0dd
SHA256 b07e022f8ef0a8e5fd3f56986b2e5bf06df07054e9ea9177996b0a6c27d74d7c
SHA3 9cb042121a5269b80d18c3c5a94c0e453890686aedade960097752377dfa9712
Preview

32763

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.01924
Detected Filetype Cursor file
MD5 48e064acaba0088aa097b52394887587
SHA1 310b283d52aa218e77c0c08db694c970378b481d
SHA256 43f40dd5140804309a4c901ec3c85b54481316e67a6fe18beb9d5c0ce3a42c3a
SHA3 38753084b0ada40269914e80dbacf7656dc94764048bd5dff649b08b700f3ed5
Preview

32764

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.01924
Detected Filetype Cursor file
MD5 1ae28d964ba1a2b1b73cd813a32d4b40
SHA1 8883cd93b8ef7c15928177de37711f95f9e4cd22
SHA256 ff47a48c11c234903a7d625cb8b62101909f735ad84266c98dd4834549452c39
SHA3 a85dadd416ce2d22aa291c0794c45766a0613b853c6e3b884a2b05fc791427b8
Preview

32765

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.01924
Detected Filetype Cursor file
MD5 0893f6ba80d82936ebe7a8216546cd9a
SHA1 0754cbdf56c53de9ed7fbd47859d20b788c6f056
SHA256 a0adcedb82b57089f64e2857f97cefd6cf25f4d27eefc6648bda83fd5fef66bb
SHA3 ce6148ade08ef9b829f83cb13b4c650d9d4a7012bfd1ab697a7870a05f4104f8
Preview

32766

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.01924
Detected Filetype Cursor file
MD5 dcaa3c032fe97281b125d0d8f677c219
SHA1 58fe36409f932549e2f101515abee7a40cf47b2c
SHA256 6e1e7738a1b6373d8829f817915822ef415a1727bb5bb7cfe809e31b3c143ac5
SHA3 02ef292e1b4a70e439e362af6b4fa213e3816ade45222b78dabab712b6afba54
Preview

32767

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.01924
Detected Filetype Cursor file
MD5 a95c7c78d0a0b30b87e3c4976e473508
SHA1 b19f3999f1b302a2d28977cb18a3416c918d486c
SHA256 326c048595bbc72e3f989cb3b95fbf09dc83739ced3cb13eb6f03336f95d74f1
SHA3 8157b4e6afa7ed2e2ffc174d655bec9fb81db609e4c5864faa5ead931ff60689
Preview

MAINICON

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x68
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 2.71858
Detected Filetype Icon file
MD5 a0f1a8e90a9acc5982cac4f8a4d2028b
SHA1 4393c6e9a3ea65eb045753209676d7fb0b88dd9f
SHA256 0f581eb580356c61bc66f0238f49893dc5954348e8a9b1d50cf930751e46a0de
SHA3 3e587f4100c2436c21e43b91aa569db5eccd384a6bd9f4cf15d2e31a5d8f102b

1 (#4)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x3e4
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 3.49368
MD5 b255bd19019dc37bfdfd43c94b7eca7f
SHA1 d0652beff6615ad81ebbbd8367b3a0f257708105
SHA256 b7792ec6077f7190c022aaaaf503db8a8a93b7be727f1cc5f54821df9385b8e3
SHA3 dcb64b2ffb8641cb7e7c1445eedcbc55cfc04906bb34d8ed3092bd4bbd5aaaff

1 (#5)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x2f0
TimeDateStamp 2024-Nov-05 21:12:44
Entropy 5.17015
MD5 e4c8a62db5113f6ecef8783d50f2f7f7
SHA1 3af0c70356976e15e7466aa0b39ebff654c02318
SHA256 6db2d03d69c169b420a447659d1b87487c4c1ed6acdd29fd0ff0499339c79d73
SHA3 d3525c8852a40d0763f57cc5611186ed68e94848ed2819546df4e22644a89442

String Table contents

Sticky Password
Portable version of Sticky Password is not found on connected removable drives.
Portable version of Sticky Password is not found on connected removable drives.
Portable version of Sticky Password is not found on connected removable drives.
Portable version of Sticky Password is not found on connected removable drives.
Portable version of Sticky Password is not found on connected removable drives.
Portable version of Sticky Password is not found on connected removable drives.
Portable version of Sticky Password is not found on connected removable drives.
Portable version of Sticky Password is not found on connected removable drives.
Переносная версия Sticky Password не найдена на подключенных съемных дисках.
Portable version of Sticky Password is not found on connected removable drives.
https://www.stickypassword.com/applink?action=report-url-form
https://www.stickypassword.com/applink?action=report-url-form
https://www.stickypassword.com/applink?action=report-url-form
https://www.stickypassword.com/applink?action=uninstall-feedback
https://www.stickypassword.com/applink?action=uninstall-feedback
https://www.stickypassword.com/applink?action=faq66
Dispatch methods do not support more than 64 parameters
DCOM not installed
'%s' is not a valid property value
OLE control activation failed
Could not obtain OLE control window handle
License information for %s is invalid
License information for %s not found. You cannot use this control in design mode
Unable to retrieve a pointer to a running object registered with OLE for %s/%s
Unknown
https://www.stickypassword.com/applink?action=homepage
https://www.stickypassword.com/applink?action=homepage
https://www.stickypassword.com/applink?action=help-center
https://www.stickypassword.com/applink?action=help-center
https://www.stickypassword.com/applink?action=shop-popup
https://www.stickypassword.com/applink?action=shop
https://www.stickypassword.com/applink?action=shop-popup
Style class '%s' already registered
Style '%s' not found
Style class '%s' not found
Invalid style handle
Invalid style format
Class '%s' is already registered for '%s'
Class '%s' is not registered for '%s'
%s parameter cannot be nil
Feature not supported by this style
Style '%s' is not registered
Cannot unregister the system style
Style not registered
Cannot call BeginInvoke on a control with no parent or window handle
OLE error %.8x
Method '%s' not supported by automation object
Variant does not reference an automation object
- Dock zone has no control
Error loading dock zone from the stream. Expecting version %d, but found %d.
Length of value array must be >= length of prompt array
Prompt array must not be empty
&Username
&Password
&Domain
Login
Cannot remove shell notification icon
%s requires Windows Vista or later
Button%d
RadioButton%d
Caption cannot be empty
Unable to load style '%s'
Unable to load styles: %s
Style '%s' already registered
Down
Ins
Del
Shift+
Ctrl+
Alt+
Value must be between %d and %d
All
Clipboard does not support Icons
Cannot open clipboard: %s
Operation not supported on selected printer
There is no default printer currently selected
Menu '%s' is already being used by another form
Docked control must have a name
Error removing control from dock tree
- Dock zone not found
&All
N&o to All
Yes to &All
&Close
BkSp
Tab
Esc
Enter
Space
PgUp
PgDn
End
Home
Left
Up
Right
Enhanced Metafiles
Icons
Bitmaps
TIFF Images
Warning
Error
Information
Confirm
&Yes
&No
OK
Cancel
&Help
&Abort
&Retry
&Ignore
%s property out of range
Menu index out of range
Menu inserted twice
Sub-menu is not in menu
Not enough timers available
Printer is not currently printing
Printing in progress
Printer index out of range
Printer selected is not valid
%s on %s
GroupIndex cannot be less than a previous menu item's GroupIndex
Cannot create form. No MDI forms are currently active
Can only modify an image if it contains a bitmap
A control cannot have itself as its parent
Cannot drag a form
Metafiles
Invalid ImageList
Unable to Replace Image
Unable to Insert Image
Invalid ImageList Index
Failed to read ImageList data from stream
Failed to write ImageList data to stream
Error creating window device context
Error creating window class
Cannot focus a disabled or invisible window
Control '%s' has no parent window
. Path:
%s
Parent given is not a parent of '%s'
Cannot hide an MDI Child Form
Cannot change Visible in OnShow or OnHide
Cannot make a visible window modal
Scrollbar property out of range
Cannot call BeginInvoke on a TComponent in the process of destruction
Bitmap image is not valid
Icon image is not valid
Metafile is not valid
Invalid pixel format
Scan line index out of range
Cannot change the size of an icon
Cannot change the size of a WIC Image
Invalid operation on TOleGraphic
Unknown picture file extension (.%s)
Unsupported clipboard format
Unsupported stream format
Out of system resources
Canvas does not allow drawing
Text format flag '%s' not supported
Invalid image size
Windows Server 2016
Windows Server 2019
Windows 8
Windows 8.1
Windows 10
Cannot create instance of class %s
Observer is not supported
Cannot have multiple single cast observers added to the observers collection
The object does not implement the observer interface
No single cast observer with ID %d was added to the observer collection
No multi cast observer with ID %d was added to the observer collection
Observer is not available
Invalid date string: %s
Invalid time string: %s
Invalid time Offset string: %s
Must wait on at least one event
Specified Login Credential Service not found
%s (Version %d.%d, Build %d, %5:s)
%s Service Pack %4:d (Version %1:d.%2:d, Build %3:d, %5:s)
32-bit Edition
64-bit Edition
Windows
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 2000
Windows XP
Windows Server 2003
Windows Server 2003 R2
Windows Server 2012
Windows Server 2012 R2
Timespan element too long
No context-sensitive help installed
No help found for context %d
Unable to open Index
Unable to open Search
Unable to find a Table of Contents
No topic-based help system installed
No help found for %s
Argument out of range
Argument must not be nil
Item not found
Duplicates not allowed
Insufficient RTTI available to support this operation
Parameter count mismatch
Type '%s' is not declared in the interface section of a unit
VAR and OUT arguments must match parameter type exactly
Parameter %s cannot be a negative value
Input buffer exceeded for %s = %d, %s = %d
Invalid characters in path
No help viewer that supports filters
Invalid argument
Index out of range (%d). Must be >= 0 and < %d
Length of Strings and Objects arrays must be equal
Source and Destination arrays must not be the same
Class %s is not intended to be constructed
Invalid Timeout value: %s
SpinCount out of range. Must be between 0 and %d
Timespan too long
The duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValue
Value cannot be NaN
Negating the minimum value of a Timespan is invalid
Invalid Timespan format
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented
Operation not allowed on sorted list
%s not in a class registration group
Property %s does not exist
Stream write error
Thread creation error: %s
Thread Error: %s (%d)
Cannot terminate an externally created thread
Cannot wait for an externally created thread
Cannot call Start on a running or suspended thread
Cannot call CheckTerminated on an externally created thread
Cannot call SetReturnValue on an externally create thread
Parameter %s cannot be nil
Cannot open file "%s". %s
Invalid stream format
''%s'' is not a valid component name
Invalid property value
Invalid property path
Invalid property value
Invalid data type for '%s'
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
Out of memory while expanding memory stream
%s has not been registered as a COM class
Error reading %s%s%s: %s
Stream read error
Property is read-only
Failed to create key %s
Invalid destination index (%d)
Invalid code page
Invalid encoding name
No mapping for the Unicode character exists in the target multi-byte code page
Invalid StringBaseIndex
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range
Can't write to a read-only resource stream
CheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists
List does not allow duplicates ($0%x)
A component named %s already exists
String list does not allow duplicates
Cannot create file "%s". %s
Wed
Thu
Fri
Sat
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Invalid source array
Invalid destination array
Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Dec
January
February
March
April
May
June
July
August
September
October
November
December
Sun
Mon
Tue
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%s%s
A call to an OS function failed
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Too many custom variant types have been registered
Could not convert variant of type (%s) into type (%s)
Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
Object lock not owned
Monitor support function not initialized
Feature not implemented
Method called on disposed object
No argument for format '%s'
Variant method calls not supported
Read
Write
Execution
Invalid access
Error creating variant or safe array
Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation
Invalid NULL variant operation
Invalid variant operation (%s%.8x)
%s
Custom variant type (%s%.4x) is out of range
Custom variant type (%s%.4x) already used by %s
Custom variant type (%s%.4x) is not usable
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Exception %s in module %s at %p.
%s%s
Application Error
Format '%s' invalid or incompatible with argument
<unknown>
'%s' is not a valid integer value
'%d.%d' is not a valid timestamp
'%s' is not a valid GUID value
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 8.8.6.1987
ProductVersion 8.8.6.1987
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName Lamantine Software a.s.
FileDescription Portable Sticky Password run tool
FileVersion (#2) 8.8.6.1987
InternalName Portable run
LegalCopyright © 2001 - 2024 Lamantine Software. All rights reserved.
OriginalFilename spPortableRun.exe
ProductName Sticky Password
ProductVersion (#2) 8.8.6.1987
Homepage http://www.stickypassword.com
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x653000
EndAddressOfRawData 0x653054
AddressOfIndex 0x63ec20
AddressOfCallbacks 0x654010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0! [*] Warning: Section .tls has a size of 0!
<-- -->