f5b12f5f6625413bb87c228282c53f9b

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2012-Jan-29 21:32:28
Detected languages English - United Kingdom
English - United States
FileVersion 3, 3, 8, 1
CompiledScript AutoIt v3 Script: 3, 3, 8, 1

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Suspicious Strings found in the binary may indicate undesirable behavior: Looks for Qemu presence:
  • QEMU
Is an AutoIT compiled script:
  • AutoIt Error
  • reserved for AutoIt internal use
Contains domain names:
  • autoitscript.com
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses known Mersenne Twister constants
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryW
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryA
Functions which can be used for anti-debugging purposes:
  • CreateToolhelp32Snapshot
  • FindWindowW
Code injection capabilities:
  • OpenProcess
  • VirtualAllocEx
  • WriteProcessMemory
  • VirtualAlloc
Code injection capabilities (PowerLoader):
  • FindWindowW
  • GetWindowLongW
Can access the registry:
  • RegisterHotKey
  • RegEnumValueW
  • RegDeleteValueW
  • RegDeleteKeyW
  • RegEnumKeyExW
  • RegSetValueExW
  • RegCreateKeyExW
  • RegOpenKeyExW
  • RegQueryValueExW
  • RegCloseKey
Possibly launches other programs:
  • CreateProcessW
  • CreateProcessAsUserW
  • CreateProcessWithLogonW
  • ShellExecuteW
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Uses functions commonly found in keyloggers:
  • GetAsyncKeyState
  • AttachThreadInput
  • MapVirtualKeyW
  • GetForegroundWindow
Has Internet access capabilities:
  • InternetReadFile
  • InternetCloseHandle
  • InternetOpenW
  • InternetSetOptionW
  • InternetCrackUrlW
  • InternetConnectW
  • InternetOpenUrlW
  • InternetQueryOptionW
  • InternetQueryDataAvailable
Functions related to the privilege level:
  • OpenProcessToken
  • DuplicateTokenEx
  • AdjustTokenPrivileges
Interacts with services:
  • OpenSCManagerW
Enumerates local disk drives:
  • GetDriveTypeW
  • GetVolumeInformationW
Manipulates other processes:
  • EnumProcesses
  • EnumProcessModules
  • OpenProcess
  • WriteProcessMemory
  • ReadProcessMemory
  • Process32FirstW
  • Process32NextW
Can take screenshots:
  • FindWindowW
  • GetDC
  • CreateCompatibleDC
Reads the contents of the clipboard:
  • GetClipboardData
Can shut the system down or lock the screen:
  • ExitWindowsEx
  • InitiateSystemShutdownExW
Suspicious The file contains overlay data. 837798 bytes of data starting at offset 0xb1c00.
The overlay data has an entropy of 7.99974 and is possibly compressed or encrypted.
Malicious VirusTotal score: 50/69 (Scanned on 2022-05-13 20:46:48) Bkav: W32.AIDetect.malware2
Lionic: Trojan.Win32.Inject.4!c
tehtris: Generic.Malware
MicroWorld-eScan: Trojan.Autoit.AXK
ALYac: Trojan.Autoit.AXK
Cylance: Unsafe
Sangfor: Trojan.Win32.Autoit.AXK
K7AntiVirus: Trojan ( 0055e3991 )
Alibaba: Trojan:Win32/Predator.ali2000022
K7GW: Trojan ( 0055e3991 )
Cybereason: malicious.f66254
Arcabit: Trojan.Autoit.AXK
Symantec: Trojan.Gen.6
Elastic: malicious (high confidence)
ESET-NOD32: multiple detections
APEX: Malicious
Paloalto: generic.ml
Kaspersky: Trojan.Win32.Inject.ewwq
BitDefender: Trojan.Autoit.AXK
NANO-Antivirus: Trojan.Win32.TrjGen.bcljuy
Avast: AutoIt:Agent-IO [Trj]
Tencent: Win32.Trojan.Inject.Eegv
Ad-Aware: Trojan.Autoit.AXK
TACHYON: Trojan/W32.Inject.1565862
Emsisoft: Trojan.Autoit.AXK (B)
Comodo: Malware@#2rh3yrgep5ab1
DrWeb: Trojan.Siggen2.24588
Zillya: Dropper.Autoit.Win32.914
TrendMicro: TROJ_MALAGENT.NTIM
McAfee-GW-Edition: BehavesLike.Win32.AutoitDropper.tc
FireEye: Generic.mg.f5b12f5f6625413b
Sophos: Generic ML PUA (PUA)
Ikarus: Worm.Win32.AutoIt
Jiangmin: TrojanDropper.Autoit.afy
Webroot: W32.Malware.Gen
Avira: HEUR/AGEN.1213919
Microsoft: Backdoor:Win32/Fynloski
GData: Trojan.Autoit.AXK (2x)
Cynet: Malicious (score: 100)
McAfee: Artemis!F5B12F5F6625
VBA32: Trojan.Autoit.F
Malwarebytes: Trojan.Injector.AutoIt
TrendMicro-HouseCall: TROJ_MALAGENT.NTIM
Rising: Trojan.Obfus/Autoit!1.C075 (CLASSIC)
MaxSecure: Trojan.Autoit.AZA
Fortinet: W32/Injector.ADH!tr
BitDefenderTheta: AI:Packer.420FF19216
AVG: AutoIt:Agent-IO [Trj]
Panda: Trj/CI.A
CrowdStrike: win/malicious_confidence_90% (W)

Hashes

MD5 f5b12f5f6625413bb87c228282c53f9b
SHA1 50ae6529f8f63e06c50157ce7aabe158495043b5
SHA256 3891281145b998066d1c906cdb0db4c2185257dec45f459f17d4afcba17a50c9
SHA3 209574ea7c8788f04ce6512882d447060ea94de2b96d451bb2dd91845f7efd4a
SSDeep 24576:kRmJkcoQricOIQxiZY1iaIiZgPx3gMn4L3lpD2J9yU0ze/Fm7ojDybqVgeAOG06z:hJZoQrbTFZY1iaIiZgPZg136zXByoPy/
Imports Hash d3bf8a7746a8d1ee8f6e5960c3f69378

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 4
TimeDateStamp 2012-Jan-29 21:32:28
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 10.0
SizeOfCode 0x80800
SizeOfInitializedData 0x1dc00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000165C1 (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x82000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.0
ImageVersion 0.0
SubsystemVersion 5.0
Win32VersionValue 0
SizeOfImage 0xc8000
SizeOfHeaders 0x400
Checksum 0xa961f
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x400000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x400000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 61ffce4768976fa0dd2a8f6a97b1417a
SHA1 1a4a6e903ba8481730da89043acebb85caaecabf
SHA256 1abcd586abb7a4eab10e01d8e501d04912cc582c267a393c466d52dd027278f5
SHA3 8d21c5389ef8e5c552583a242685a62870b79030b9c4852af8bb82ea251067e8
VirtualSize 0x8061c
VirtualAddress 0x1000
SizeOfRawData 0x80800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.68469

.rdata

MD5 0354bc5f2376b5e9a4a3ba38b682dff1
SHA1 e70510edd94f414dcc71e0a8ed797f2ebcb61897
SHA256 74a5108411edb1e41b9c4da2d716e1e68bc70391d9615ac51fb0c45779dd4b24
SHA3 143a2ef98844c97efaf7ae1a05113d82180e2ad2aa83ed7147e96959a920760f
VirtualSize 0xdfc0
VirtualAddress 0x82000
SizeOfRawData 0xe000
PointerToRawData 0x80c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.79974

.data

MD5 8033f5a38941b4685bc2299e78f31221
SHA1 e525097f0c6a472b209669ddf8c3d82ba5a8dfb4
SHA256 a5cc8d1e043f6831697a2a7f977499a3d88e3d713813edd40e2ec3d7c6ca2a15
SHA3 55911be227431d3ff55a8115b597cd191af60a11068e11db814b9dd82a8509ba
VirtualSize 0x1a758
VirtualAddress 0x90000
SizeOfRawData 0x6800
PointerToRawData 0x8ec00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.15007

.rsrc

MD5 0bbe877aa9f0a30e7c437312afbcbfd0
SHA1 344fc3ecae1089ec58c38f6546ca637bf9f9b1ee
SHA256 2042de37a09636b0328b3119a6c2050fd17583646991851db808c44f86f82b03
SHA3 97e44da2410d10bebee0acfc89a4ede55c605802a7bf6c654e648d165da23aa4
VirtualSize 0x1c7b0
VirtualAddress 0xab000
SizeOfRawData 0x1c800
PointerToRawData 0x95400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.70969

Imports

WSOCK32.dll __WSAFDIsSet
setsockopt
ntohs
recvfrom
sendto
htons
select
listen
WSAStartup
bind
closesocket
connect
socket
send
WSACleanup
ioctlsocket
accept
WSAGetLastError
inet_addr
gethostbyname
gethostname
recv
VERSION.dll VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
WINMM.dll timeGetTime
waveOutSetVolume
mciSendStringW
COMCTL32.dll ImageList_Remove
ImageList_SetDragCursorImage
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_EndDrag
ImageList_DragMove
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Destroy
MPR.dll WNetCancelConnection2W
WNetGetConnectionW
WNetAddConnection2W
WNetUseConnectionW
WININET.dll InternetReadFile
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetCrackUrlW
HttpQueryInfoW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
InternetQueryOptionW
InternetQueryDataAvailable
PSAPI.DLL EnumProcesses
GetModuleBaseNameW
GetProcessMemoryInfo
EnumProcessModules
USERENV.dll CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
LoadUserProfileW
KERNEL32.dll HeapAlloc
Sleep
GetCurrentThreadId
RaiseException
MulDiv
GetVersionExW
GetSystemInfo
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcpyW
MultiByteToWideChar
lstrlenW
lstrcmpiW
GetModuleHandleW
QueryPerformanceCounter
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
CreateFileW
SetFilePointerEx
ReadFile
WriteFile
FlushFileBuffers
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetFileTime
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
FindNextFileW
MoveFileW
CopyFileW
CreateDirectoryW
RemoveDirectoryW
GetProcessHeap
QueryPerformanceFrequency
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceNamesW
OutputDebugStringW
GetLocalTime
CompareStringW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetStdHandle
CreatePipe
InterlockedExchange
TerminateThread
GetTempPathW
GetTempFileNameW
VirtualFree
FormatMessageW
GetExitCodeProcess
SetErrorMode
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetDriveTypeW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
CreateHardLinkW
DeviceIoControl
SetFileAttributesW
GetShortPathNameW
CreateEventW
SetEvent
GetEnvironmentVariableW
SetEnvironmentVariableW
GlobalLock
GlobalUnlock
GlobalAlloc
GetFileSize
GlobalFree
GlobalMemoryStatusEx
Beep
GetSystemDirectoryW
GetComputerNameW
GetWindowsDirectoryW
GetCurrentProcessId
GetCurrentThread
GetProcessIoCounters
CreateProcessW
SetPriorityClass
LoadLibraryW
VirtualAlloc
LoadLibraryExW
HeapFree
WaitForSingleObject
CreateThread
DuplicateHandle
GetLastError
CloseHandle
GetCurrentProcess
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
IsDebuggerPresent
GetCurrentDirectoryW
ExitProcess
ExitThread
GetSystemTimeAsFileTime
ResumeThread
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetStartupInfoW
IsProcessorFeaturePresent
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
HeapCreate
SetHandleCount
GetFileType
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringW
RtlUnwind
SetFilePointer
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
HeapReAlloc
WriteConsoleW
SetEndOfFile
SetSystemPowerState
SetEnvironmentVariableA
USER32.dll GetCursorInfo
RegisterHotKey
ClientToScreen
GetKeyboardLayoutNameW
IsCharAlphaW
IsCharAlphaNumericW
IsCharLowerW
IsCharUpperW
GetMenuStringW
GetSubMenu
GetCaretPos
IsZoomed
MonitorFromPoint
GetMonitorInfoW
SetWindowLongW
SetLayeredWindowAttributes
FlashWindow
GetClassLongW
TranslateAcceleratorW
IsDialogMessageW
GetSysColor
InflateRect
DrawFocusRect
DrawTextW
FrameRect
DrawFrameControl
FillRect
PtInRect
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowDC
GetSystemMetrics
GetActiveWindow
CharNextW
wsprintfW
RedrawWindow
DrawMenuBar
DestroyMenu
SetMenu
GetWindowTextLengthW
CreateMenu
IsDlgButtonChecked
DefDlgProcW
ReleaseCapture
SetCapture
WindowFromPoint
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
GetCursorPos
DeleteMenu
CheckMenuRadioItem
SetWindowPos
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
TranslateMessage
SendInput
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
CopyRect
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
GetMenu
DestroyWindow
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongW
AttachThreadInput
GetFocus
GetWindowTextW
ScreenToClient
SendMessageTimeoutW
EnumChildWindows
CharUpperBuffW
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
SetUserObjectSecurity
GetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopW
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
MessageBoxW
DefWindowProcW
CopyImage
AdjustWindowRectEx
SetRect
SetClipboardData
EmptyClipboard
CountClipboardFormats
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
BlockInput
GetMessageW
LockWindowUpdate
GetMenuItemID
DispatchMessageW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageW
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
MessageBoxA
DestroyIcon
PeekMessageW
UnregisterHotKey
CharLowerBuffW
keybd_event
MonitorFromRect
GetWindowThreadProcessId
GDI32.dll DeleteObject
AngleArc
GetTextExtentPoint32W
ExtCreatePen
StrokeAndFillPath
StrokePath
EndPath
SetPixel
CloseFigure
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
StretchBlt
GetDIBits
GetDeviceCaps
MoveToEx
DeleteDC
GetPixel
CreateDCW
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectW
SetBkMode
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
CreateFontW
GetTextFaceW
GetStockObject
LineTo
COMDLG32.dll GetSaveFileNameW
GetOpenFileNameW
ADVAPI32.dll RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
GetUserNameW
RegConnectRegistryW
CloseServiceHandle
UnlockServiceDatabase
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
CreateProcessAsUserW
CreateProcessWithLogonW
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
CopySid
LogonUserW
LockServiceDatabase
GetTokenInformation
GetSecurityDescriptorDacl
GetAclInformation
GetAce
AddAce
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
AdjustTokenPrivileges
InitiateSystemShutdownExW
OpenSCManagerW
RegCloseKey
SHELL32.dll DragQueryPoint
ShellExecuteExW
SHGetFolderPathW
DragQueryFileW
SHEmptyRecycleBinW
SHBrowseForFolderW
SHFileOperationW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32.dll OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CLSIDFromString
StringFromGUID2
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
ProgIDFromCLSID
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
OleUninitialize
IIDFromString
OLEAUT32.dll VariantChangeType
VariantCopyInd
DispCallFunc
CreateStdDispatch
CreateDispTypeInfo
SysFreeString
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayUnaccessData
SysStringLen
SafeArrayAllocData
GetActiveObject
QueryPathOfRegTypeLib
SafeArrayAllocDescriptorEx
SafeArrayCreateVector
SysAllocString
VariantCopy
VariantClear
VariantTimeToSystemTime
VarR8FromDec
SafeArrayGetVartype
OleLoadPicture
SafeArrayAccessData
VariantInit

Delayed Imports

1

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.05883
MD5 78f30e363a0499f530d057b4d639d36e
SHA1 360bd6476101b0cddc23d2c7eade326c1b16ceaf
SHA256 08bcba5aa989c988ea18f8101c84daaee58d4f0b584535a85186c8b98b66147e
SHA3 001ac9f6e8e52f9c3eb7101189fb953e2f4babfdea5b6e26b23b99173af38de4

2

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.66371
MD5 d6f27bf763eb666af934477958acf362
SHA1 f724ee386cda31b32b5c88e08b9abf562c016a57
SHA256 62ba0b2575098d4428c9a99bd060ef7572071698bf9d03b4bd430f5f691378e5
SHA3 6f4a250c7a91ddfcc872e14b8ed1e4aa33a5ebb3280f7d021b47aa46edfb9586

3

Type RT_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.25499
MD5 ad424f5f5d5ff4460343686c61e4f75e
SHA1 29a1f0faadc42f1b9f9767d8c724fdc58dd165c8
SHA256 245fc49e4e955e1db3975b826dcf27ad2eb32a6831caa4cb6b501a3914bcfaa9
SHA3 4f3a627ee7d533397f7f5c70bb2dafa8857150e674cb31edd96949c7905de509

4

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.40671
MD5 fb71724b89b50db17f63d58fbbcf2a90
SHA1 64777c1aac6007a546bfdb67854cf8c970dd980b
SHA256 700877bbd93fa2dc169506b21c1eca56363b9612844533f2096c8d3b177a86aa
SHA3 5de1e521f9eeff15906cba5368f76bbb465a019ed136e2f6b0dfe17e572b0fac

5

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x5488
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.03129
MD5 ac867d7c3e175f0380d596a8d01670fc
SHA1 52620426670f2b8696526de9d8a6cc78dcb4fa1f
SHA256 85dbe3208d31831b0c66f8df483c1134fa148649c6ce7e69d3758896bfa45f40
SHA3 e4d105cee5e4c28cf41ca1a8fb0e9d7262fbe2f58f607b382a1bb3a86242e0c8

6

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.98208
MD5 6a499d0c3c781ebcf5e230bfd6d0cd9f
SHA1 67f27be9c276bc04c8538beedc061728ee3e5ca3
SHA256 28849d38646a8b4310759b7712fd3a34c3b95754c70f28eafec6952a5b252427
SHA3 79ba1b6bf57203e36ec1e00b1af138d49b9a29a0b08167671d19a0f3930cb46c

7

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.67069
MD5 6cf257d5c237a74ff7493fd2fbd53afe
SHA1 3a31422f4befd437696ec8bd360440e1466b706c
SHA256 951ab8adb6925d1551a26d9a8e9c4c38a4e50084a6e0c7ae23fb0566f4f2f47d
SHA3 815088291b107a38f26f27eaf31d2874dd8b22063619813acef511271d4e33f9

8

Type RT_ICON
Language English - United Kingdom
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.09688
MD5 0e128c9e8a06f055d91d7e88876e4004
SHA1 83267ae6d5c337dd695116cefa8a6f7f9e16da6e
SHA256 d28ccc274fb32ca88e5543696cf7f0acbda5fb24a2773122b1422d20725efa97
SHA3 9eda310e4c6716571c18c7fbe1b9bae71863747639ff0ee37b25d3413be102e8

166

Type RT_MENU
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x50
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.68292
MD5 8140596ab00b98a11c13e6977d2d0977
SHA1 58abc231c2b5ac778a543a5dffcfabe867a6758d
SHA256 54f5e2ecbfc4f87380ca7466337676b99d0c4a21f806cf83f69fd48934c857ab
SHA3 7ccd3005ef4a3eccdb793d3b975a2f09338df5922357428238910610c0c59b70

1000

Type RT_DIALOG
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0xfc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.03986
MD5 08e5fdcbcb2ab21352c8fc0e05b07ddb
SHA1 25d4fcfaba7226a6b786bba3bcbad3ed7391b385
SHA256 7de7438fb4425f608109111fdce25be7d2381938f6c5984bcfb14b3b88e9c883
SHA3 90c82ad0c9f2d048ecb9664bee1556cb41f42f160749e3dec0bcdd28d05a8a5d

7 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x530
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.31436
MD5 6f67c6580956d64ea21b6eea89819e74
SHA1 b7802ca7202a169147be6f51f0491952ac89dfdb
SHA256 ff841c2dd3b09d5a11dd9b16d09268adc0ac3562eb0dc79cc5044dc531de6477
SHA3 f1b6fe5227b785b61817739aa22c2ac599a98c58388ff7f7559e09ac7c8272af

8 (#2)

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x690
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28624
MD5 51ebf59dba4e2b7083bc6c7119420181
SHA1 457a9ef64dd7f279b78396cad7839ee5c3b7bb86
SHA256 3f37dba0277dc704f072aaf3e740c2bee9ac04f79982fd41662dfc94e7bfda2e
SHA3 34df49c1d3ef91b4f878dd89581b90b98021694d83cb3c78586cbcef3730545b

9

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x4d0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.2836
MD5 a77b7e1ad9ab86b9e3c01b61f7dd9b9b
SHA1 6e254f135f0ddef777d756a1ec803bfcb733f7c7
SHA256 a252f6d525f445f5705a2c1dc060cfb2ad5da5445c98f3fbb0afc612637fc249
SHA3 62adbba618677f35d9a29bd3d5476c660c2a34f01fa7aac1935dcfe36a48fe83

10

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x5fc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28373
MD5 949955dbda367f0c790615f7817e7886
SHA1 ee0370fb4ad59a4cebc3dbfc83bb437343fb803b
SHA256 4854e5abce2237256df24b69c9759fc1e8caa423a54bfe661ba7031afd8375eb
SHA3 5e36df684c6f2c4058d1a2507989eb5fc3c873159d006088d40f4da3804f56f2

11

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x65c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.26322
MD5 9bc568a6176f738ffb3109e53235b579
SHA1 b97786555bfa05f958f174e294080e235d91b571
SHA256 d38369002e36f73866a0d40b13e069b9ffdbda50957f4c88d52a72fecb9b4e45
SHA3 94318c553eb0928412a92e8cf9913ca5c35a03aa8c24bf151a6764793b2f6f90

12

Type RT_STRING
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x388
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.23004
MD5 7d1f7d9a7376e39767eebd30f2ce9e21
SHA1 ef6e00deff5e124515de574e4f6b4319ef5841ef
SHA256 ae9b084978e14d5bfa296e256820765b30a7b3e411cdccc67c91e146f053e815
SHA3 8d34b29bc8a1dce21ba05e6169ff0b7d2acc10ee593224406b6698a4a307b188

313

Type RT_STRING
Language English - United States
Codepage Latin 1 / Western European
Size 0x158
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.08572
MD5 193a9143563395ad14c6dac83d32e2ad
SHA1 87ca08eb609f9ceabbd8ea7a64263de9a05bbb22
SHA256 b3711acbe8e01fee7fd362112b4e42da05c728e98b85c0a3b4cb075977849cee
SHA3 7634b4daca191c6fa53de1d5964fa47f382afccebf5744e70a702fd179fad715

99

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x4c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.86004
Detected Filetype Icon file
MD5 e58bc999fb33f4c380c1da2c01509bf0
SHA1 8199d9c402cb70451f2c9d70e57c666c68134645
SHA256 9e479cf349e7bcf6218e1cd68326b67833c245294618e18f72adfd5a1e951a63
SHA3 310e624d584594adb0220ddfa2a2fa4ff286c67ddd8099de0bd1d0f46d49b3a3

162

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.84274
Detected Filetype Icon file
MD5 f64c60b749269fcf6659c450dda98486
SHA1 42945c3496bc4e1943a1a05926a9b5ee31d3e450
SHA256 ae172a9a2fd008910b537c92a95b38bfba0e5bbdaaca719bf686e6415a7a2ba1
SHA3 443830acdeb37f2b7f844756492b2b11f9fb93e9171617d8c799cebfd05cb37f

164

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.02322
Detected Filetype Icon file
MD5 7a9605cb416b1a091d889b9d9f37ec66
SHA1 866c01641d672b6cd69901c1e055f174f47b35bb
SHA256 6bcce1250099cc08d574211b3debabb0244cd2641f6d960538e7ddc97d319164
SHA3 af43e622bf6c842d1ada2985f8e68920ff7b22d8a0b1a12871968c23b5065651

169

Type RT_GROUP_ICON
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.02322
Detected Filetype Icon file
MD5 60f05e3b8ea9e18928923bdbcc112277
SHA1 d97726a6e9c326a37507f879feca7e152157839c
SHA256 7698ef362b288a7e3b96304ca50814b42518cba38598db9dbb36d8b90212d76a
SHA3 390fd88c6012552aecc7f109e733a1bf00339b8b3758127752832484c9f13ce6

1 (#2)

Type RT_VERSION
Language English - United Kingdom
Codepage Latin 1 / Western European
Size 0x19c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.279
MD5 1110e3e85a18356d2e368d8bcfcf06ab
SHA1 614f701ea92b332bd082b06c67ff25f7f102fa7b
SHA256 ed1311f93c7c8c51e91a6890a92cc1f5d12c758e1e57c020c076108df1363470
SHA3 4769f78dfe818c388e4d2669704e21bc308f6b00a3043b0254019c4e71fff3df

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage Latin 1 / Western European
Size 0x26c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.01246
MD5 ab1c2991848ba460acaeb7f4aca529e5
SHA1 d67e3f44e27557565ab42347d1e73dda25c33191
SHA256 6fb2f428ceb740481a982bfa8d6718e01c1cac512f6848fcd78ddf56df9ec877
SHA3 4f02e6cbf164319f69e522d4f320a5fa893809ad135cf71512d0a22f7da45ac1

String Table contents

(Paused)
AutoIt Error
AutoIt has detected the stack has become corrupt.
Stack corruption typically occurs when either the wrong calling convention is used or when the function is called with the wrong number of arguments.
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Badly formatted "Func" statement.
Missing right bracket ')' in expression.
Missing operator in expression.
Unbalanced brackets in expression.
Error in expression.
Error parsing function call.
Incorrect number of parameters in function call.
"ReDim" used without an array variable.
Illegal text at the end of statement (one statement per line).
"If" statement has no matching "EndIf" statement.
"Else" statement with no matching "If" statement.
"EndIf" statement with no matching "If" statement.
Too many "Else" statements for matching "If" statement.
"While" statement has no matching "Wend" statement.
"Wend" statement with no matching "While" statement.
Variable used without being declared.
Array variable has incorrect number of subscripts or subscript dimension range exceeded.
Array variable subscript badly formatted.
Subscript used with non-Array variable.
Too many subscripts used for an array.
Missing subscript dimensions in "Dim" statement.
No variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.
Expected a "=" operator in assignment statement.
Invalid keyword at the start of this line.
Array maximum size exceeded.
"Func" statement has no matching "EndFunc".
Duplicate function name.
Unknown function name.
Unknown macro.
Unable to get a list of running processes.
Unable to get the process token.
Invalid element in a DllStruct.
Unknown option or bad parameter specified.
Unable to load the internet libraries.
"Struct" statement has no matching "EndStruct".
Unable to open file, the maximum number of open files has been exceeded.
"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.
Expected a variable in user function call.
"Do" statement has no matching "Until" statement.
"Until" statement with no matching "Do" statement.
"For" statement is badly formatted.
"Next" statement with no matching "For" statement.
"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.
"For" statement has no matching "Next" statement.
"Case" statement with no matching "Select"or "Switch" statement.
"EndSelect" statement with no matching "Select" statement.
Recursion level has been exceeded - AutoIt will quit to prevent stack overflow.
Cannot make existing variables static.
Cannot make static variables into regular variables.
Badly formated Enum statement
This keyword cannot be used after a "Then" keyword.
"Select" statement is missing "EndSelect" or "Case" statement.
"If" statements must have a "Then" keyword.
Badly formated Struct statement.
Cannot assign values to constants.
Cannot make existing variables into constants.
Only Object-type variables allowed in a "With" statement.
"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.
Object referenced outside a "With" statement.
Nested "With" statements are not allowed.
Variable must be of type "Object".
The requested action with this object has failed.
Variable appears more than once in function declaration.
ReDim array can not be initialized in this manner.
An array variable can not be used in this manner.
Can not redeclare a constant.
Can not redeclare a parameter inside a user function.
Can pass constants by reference only to parameters with "Const" keyword.
Can not initialize a variable with itself.
Incorrect way to use this parameter.
"EndSwitch" statement with no matching "Switch" statement.
"Switch" statement is missing "EndSwitch" or "Case" statement.
"ContinueCase" statement with no matching "Select"or "Switch" statement.
Assert Failed!
Obsolete function/parameter.
Invalid Exitcode (reserved for AutoIt internal use).
Unable to parse line.
Unable to open the script file.
String missing closing quote.
Badly formated variable or macro.
Missing separator character after keyword.

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 3.3.8.1
ProductVersion 3.3.8.1
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United Kingdom
FileVersion (#2) 3, 3, 8, 1
CompiledScript AutoIt v3 Script: 3, 3, 8, 1
Resource LangID English - United Kingdom

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0xecfa7f86
Unmarked objects 0
152 (20115) 2
C objects (VS2010 SP1 build 40219) 175
C++ objects (VS2010 SP1 build 40219) 53
C objects (VS2008 SP1 build 30729) 9
Imports (VS2008 SP1 build 30729) 33
Total imports 528
180 (VS2010 SP1 build 40219) 72
ASM objects (VS2010 SP1 build 40219) 28
Resource objects (VS2010 SP1 build 40219) 1
151 1
Linker (VS2010 SP1 build 40219) 1

Errors

<-- -->