Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe

Overview

General Information

Sample Name:ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
Analysis ID:800791
MD5:a42b37fbf9d9b46986d062c75c6da1b5
SHA1:4efa169524085a15b81462dc4a1f34f25b23d4c4
SHA256:348a52936f4a5bd079510503da07238b850da222cc0bb53f4758877e1c634216
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
PE file contains more sections than normal
Yara detected Keylogger Generic

Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook
  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe PID: 3332JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    There are no malicious signatures, click here to show all signatures.

    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: http://www.indyproject.org/
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: http://www.lmd.de
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe, 00000000.00000002.600992012.0000000015EF7000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: GetRawInputData
    Source: Yara matchFile source: Process Memory Space: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe PID: 3332, type: MEMORYSTR
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe, 00000000.00000000.326320767.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe, 00000000.00000000.327858639.0000000014089000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFilling Golosck TFT 0x547f87790701\ vs ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeBinary or memory string: OriginalFileName vs ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: Number of sections : 11 > 10
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: unknownProcess created: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeMutant created: \Sessions\1\BaseNamedObjects\84B228BD6AA820A3E3698FA255C96490A5
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeMutant created: \Sessions\1\BaseNamedObjects\HookApi:{7DDF4ADB-4A01-4F4B-83AA-8D91C21E99D2}:3332:Lock
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: NATS-SEFI-ADD
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: NATS-DANO-ADD
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: JIS_C6229-1984-b-add
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: jp-ocr-b-add
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: JIS_C6229-1984-hand-add
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: jp-ocr-hand-add
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeString found in binary or memory: ISO_6937-2-add
    Source: classification engineClassification label: clean4.winEXE@3/0@0/0
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLL
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeWindow found: window name: TEdit
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic file information: File size 331854848 > 1048576
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x783c00
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x13426e00
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: More than 200 imports for user32.dll
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeStatic PE information: section name: .didata
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 916
    Source: C:\Windows\splwow64.exeLast function: Thread delayed
    Source: C:\Windows\splwow64.exeLast function: Thread delayed
    Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000
    Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe, 00000000.00000002.600992012.0000000015EF7000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe, 00000000.00000002.600992012.0000000015EF7000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exeQueries volume information: C:\ VolumeInformation
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Command and Scripting Interpreter
    Path Interception2
    Process Injection
    1
    Virtualization/Sandbox Evasion
    11
    Input Capture
    1
    Process Discovery
    Remote Services11
    Input Capture
    Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 process2 2 Behavior Graph ID: 800791 Sample: ArchivoAdju_ntoSSAZLMAUEVNY... Startdate: 07/02/2023 Architecture: WINDOWS Score: 4 5 ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe 3 2->5         started        process3 7 splwow64.exe 5->7         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.indyproject.org/0%URL Reputationsafe
    http://www.indyproject.org/0%URL Reputationsafe
    http://www.lmd.de0%Avira URL Cloudsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.indyproject.org/ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exefalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://www.lmd.deArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exefalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox Version:36.0.0 Rainbow Opal
    Analysis ID:800791
    Start date and time:2023-02-07 19:53:55 +01:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 8m 22s
    Hypervisor based Inspection enabled:false
    Report type:light
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample file name:ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    Detection:CLEAN
    Classification:clean4.winEXE@3/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    19:55:03API Interceptor982x Sleep call for process: splwow64.exe modified
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):2.855975886001415
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    File size:331854848
    MD5:a42b37fbf9d9b46986d062c75c6da1b5
    SHA1:4efa169524085a15b81462dc4a1f34f25b23d4c4
    SHA256:348a52936f4a5bd079510503da07238b850da222cc0bb53f4758877e1c634216
    SHA512:bd8020ba4d896972c965702de7d3cb22a1455722d9f1b9c407c5c23414b9719be7db9cc71520b228ba5f95d182bd9ce03c65e48767e3d2ca8f1012a3512fb606
    SSDEEP:98304:j9mgS1GUfwtWszoq6fgE9GD5plJ52OaQl/zGRJ+cYzf9FCqeNzcLRfTCSyQ6G/Vr:j4gggCJfq5T7IHk
    TLSH:19F83912A2B050E6C0361A35542BB753593BEF132A1A4947EBBC3B5C0F3764D2937AF6
    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
    Icon Hash:c0999126574f87d0
    Entrypoint:0xb8adbc
    Entrypoint Section:.itext
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x63E1D386 [Tue Feb 7 04:28:54 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:b9ab4777064f6c17ac9b5de4c9f573b5
    Instruction
    push ebp
    mov ebp, esp
    add esp, FFFFFFF0h
    mov eax, 00B74D28h
    call 00007F73244B057Dh
    mov eax, dword ptr [00BB1CF4h]
    mov eax, dword ptr [eax]
    call 00007F73246E7BADh
    call 00007F7324C1294Ch
    mov ecx, dword ptr [00BB1190h]
    mov eax, dword ptr [00BB1CF4h]
    mov eax, dword ptr [eax]
    mov edx, dword ptr [00B6C244h]
    call 00007F73246E7BA8h
    mov eax, dword ptr [00BB1CF4h]
    mov eax, dword ptr [eax]
    call 00007F73246E7CFCh
    call 00007F73244A8777h
    mov eax, eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x7c50000x9a.edata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x7bf0000x4790.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x8660000x13426e00.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7c80000x9d5fc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x7c70000x18.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x7bfc600xaf8.idata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x7c40000xd3c.didata
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x783ac40x783c00unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .itext0x7850000x5e080x6000False0.4846598307291667data6.146152286642337IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x78b0000x275340x27600False0.457062251984127data6.4061502105155075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .bss0x7b30000xb3700x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .idata0x7bf0000x47900x4800False0.3274739583333333data5.298490835152809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .didata0x7c40000xd3c0xe00False0.3392857142857143data4.225694904508243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .edata0x7c50000x9a0x200False0.2578125data1.9003166404108416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .tls0x7c60000x540x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rdata0x7c70000x5d0x200False0.189453125data1.376793843926096IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x7c80000x9d5fc0x9d600False0.5316766158657665data6.706346424969919IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    .rsrc0x8660000x13426e000x13426e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    RT_CURSOR0x86b5940x134dataEnglishUnited States
    RT_CURSOR0x86b6c80x134dataEnglishUnited States
    RT_CURSOR0x86b7fc0x134dataEnglishUnited States
    RT_CURSOR0x86b9300x134Targa image data - Map 64 x 65536 x 1 +32 "\001"RussianRussia
    RT_CURSOR0x86ba640x134data
    RT_CURSOR0x86bb980x134data
    RT_CURSOR0x86bccc0x134data
    RT_CURSOR0x86be000x134data
    RT_CURSOR0x86bf340x134data
    RT_CURSOR0x86c0680x134data
    RT_CURSOR0x86c19c0x134data
    RT_CURSOR0x86c2d00x134data
    RT_CURSOR0x86c4040x134data
    RT_CURSOR0x86c5380x134data
    RT_CURSOR0x86c66c0x134data
    RT_CURSOR0x86c7a00x134data
    RT_CURSOR0x86c8d40x134dataEnglishUnited States
    RT_CURSOR0x86ca080x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States
    RT_CURSOR0x86cb3c0x134dataEnglishUnited States
    RT_CURSOR0x86cc700x134dataEnglishUnited States
    RT_CURSOR0x86cda40x134dataEnglishUnited States
    RT_CURSOR0x86ced80x134dataEnglishUnited States
    RT_CURSOR0x86d00c0x134dataEnglishUnited States
    RT_CURSOR0x86d1400x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States
    RT_BITMAP0x86d2740xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
    RT_BITMAP0x86d3340xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
    RT_BITMAP0x86d4140xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
    RT_BITMAP0x86d4f40x4cDevice independent bitmap graphic, 7 x 7 x 1, image size 28
    RT_BITMAP0x86d5400x44Device independent bitmap graphic, 7 x 5 x 1, image size 20
    RT_BITMAP0x86d5840x44Device independent bitmap graphic, 7 x 5 x 1, image size 20
    RT_BITMAP0x86d5c80x88Device independent bitmap graphic, 8 x 8 x 4, image size 32
    RT_BITMAP0x86d6500x1260Device independent bitmap graphic, 280 x 13 x 8, image size 3640
    RT_BITMAP0x86e8b00xc14Device independent bitmap graphic, 154 x 13 x 8, image size 2028
    RT_BITMAP0x86f4c40x78Device independent bitmap graphic, 7 x 4 x 4, image size 16
    RT_BITMAP0x86f53c0xc8Device independent bitmap graphic, 13 x 12 x 4, image size 96
    RT_BITMAP0x86f6040xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104
    RT_BITMAP0x86f6d40xc0Device independent bitmap graphic, 13 x 11 x 4, image size 88
    RT_BITMAP0x86f7940xf8Device independent bitmap graphic, 20 x 12 x 4, image size 144
    RT_BITMAP0x86f88c0xf8Device independent bitmap graphic, 20 x 12 x 4, image size 144
    RT_BITMAP0x86f9840x98Device independent bitmap graphic, 9 x 6 x 4, image size 48
    RT_BITMAP0x86fa1c0x98Device independent bitmap graphic, 9 x 6 x 4, image size 48
    RT_BITMAP0x86fab40x84Device independent bitmap graphic, 5 x 7 x 4, image size 28
    RT_BITMAP0x86fb380x7cDevice independent bitmap graphic, 5 x 5 x 4, image size 20
    RT_BITMAP0x86fbb40x84Device independent bitmap graphic, 5 x 7 x 4, image size 28
    RT_BITMAP0x86fc380x90Device independent bitmap graphic, 9 x 5 x 4, image size 40
    RT_BITMAP0x86fcc80xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128
    RT_BITMAP0x86fdb00xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128
    RT_BITMAP0x86fe980xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
    RT_BITMAP0x86ff780xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
    RT_BITMAP0x8700380xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
    RT_BITMAP0x8700f80x928Device independent bitmap graphic, 24 x 24 x 32, image size 2304
    RT_BITMAP0x870a200x928Device independent bitmap graphic, 24 x 24 x 32, image size 2304
    RT_BITMAP0x8713480x928Device independent bitmap graphic, 24 x 24 x 32, image size 2304
    RT_BITMAP0x871c700xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
    RT_BITMAP0x871d500xb0Device independent bitmap graphic, 9 x 9 x 4, image size 72
    RT_BITMAP0x871e000x828Device independent bitmap graphic, 64 x 16 x 8, image size 1024, resolution 2835 x 2835 px/m
    RT_BITMAP0x8726280xcc4Device independent bitmap graphic, 114 x 19 x 8, image size 2204, resolution 2835 x 2835 px/m
    RT_BITMAP0x8732ec0x138Device independent bitmap graphic, 28 x 13 x 4, image size 208
    RT_BITMAP0x8734240x108Device independent bitmap graphic, 28 x 10 x 4, image size 160
    RT_BITMAP0x87352c0x340Device independent bitmap graphic, 104 x 14 x 4, image size 728
    RT_BITMAP0x87386c0x168Device independent bitmap graphic, 32 x 16 x 4, image size 256
    RT_BITMAP0x8739d40x828Device independent bitmap graphic, 32 x 32 x 8, image size 1024
    RT_BITMAP0x8741fc0x528Device independent bitmap graphic, 16 x 16 x 8, image size 256
    RT_BITMAP0x8747240xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128
    RT_BITMAP0x87480c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128
    RT_BITMAP0x8748f40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128
    RT_BITMAP0x8749dc0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128GermanGermany
    RT_BITMAP0x874ac40xf8Device independent bitmap graphic, 20 x 12 x 4, image size 144, 16 important colors
    RT_BITMAP0x874bbc0xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x874c940xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x874d6c0xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x874e440xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x874f1c0xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x874ff40xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x8750cc0xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x8751a40xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x87527c0xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x8753540xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x87542c0xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x8755040xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112
    RT_BITMAP0x8755dc0xf8Device independent bitmap graphic, 20 x 12 x 4, image size 144, 16 important colors
    RT_BITMAP0x8756d40x64Device independent bitmap graphic, 5 x 3 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x8757380x64Device independent bitmap graphic, 3 x 5 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x87579c0x64Device independent bitmap graphic, 3 x 5 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x8758000x64Device independent bitmap graphic, 5 x 3 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x8758640x64Device independent bitmap graphic, 5 x 3 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x8758c80x64Device independent bitmap graphic, 3 x 5 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x87592c0x64Device independent bitmap graphic, 3 x 5 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x8759900x64Device independent bitmap graphic, 5 x 3 x 32, image size 60, resolution 3780 x 3780 px/mEnglishUnited States
    RT_BITMAP0x8759f40xb0Device independent bitmap graphic, 9 x 9 x 4, image size 72
    RT_BITMAP0x875aa40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
    RT_BITMAP0x875b640xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
    RT_BITMAP0x875c440xb0Device independent bitmap graphic, 9 x 9 x 4, image size 72
    RT_BITMAP0x875cf40x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 2834 x 2834 px/mRussianRussia
    RT_BITMAP0x87601c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
    RT_BITMAP0x8760dc0x95c61e8Device independent bitmap graphic, 9960 x 5256 x 24, image size 157049280PortugueseBrazil
    RT_BITMAP0x9e3c2c40x9d81e28Device independent bitmap graphic, 9200 x 5984 x 24, image size 165158400PortugueseBrazil
    RT_BITMAP0x13bbe0ec0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
    RT_ICON0x13bbe1cc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
    RT_ICON0x13bbe6340x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
    RT_ICON0x13bbefbc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
    RT_ICON0x13bc00640x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
    RT_ICON0x13bc260c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States
    RT_ICON0x13bc68340x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States
    RT_ICON0x13bcfcdc0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States
    RT_ICON0x13be05040x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States
    RT_ICON0x13c2252c0xa5b9PNG image data, 512 x 512, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_DIALOG0x13c2cae80x496dataRussianRussia
    RT_DIALOG0x13c2cf800x48edataRussianRussia
    RT_DIALOG0x13c2d4100x52data
    RT_STRING0x13c2d4640x19cdata
    RT_STRING0x13c2d6000x44data
    RT_STRING0x13c2d6440x154data
    RT_STRING0x13c2d7980x650data
    RT_STRING0x13c2dde80x200data
    RT_STRING0x13c2dfe80xf8data
    RT_STRING0x13c2e0e00x170data
    RT_STRING0x13c2e2500x16cdata
    RT_STRING0x13c2e3bc0x12cdata
    RT_STRING0x13c2e4e80x190data
    RT_STRING0x13c2e6780x198data
    RT_STRING0x13c2e8100x1fcdata
    RT_STRING0x13c2ea0c0x310data
    RT_STRING0x13c2ed1c0x1c8data
    RT_STRING0x13c2eee40x478data
    RT_STRING0x13c2f35c0x294data
    RT_STRING0x13c2f5f00x40cdata
    RT_STRING0x13c2f9fc0x584data
    RT_STRING0x13c2ff800x218data
    RT_STRING0x13c301980x858data
    RT_STRING0x13c309f00xab0data
    RT_STRING0x13c314a00x3c0data
    RT_STRING0x13c318600x424data
    RT_STRING0x13c31c840x790data
    RT_STRING0x13c324140x1104data
    RT_STRING0x13c335180x9d4data
    RT_STRING0x13c33eec0x8d4data
    RT_STRING0x13c347c00x8a8data
    RT_STRING0x13c350680x444data
    RT_STRING0x13c354ac0x2acdata
    RT_STRING0x13c357580x5a4data
    RT_STRING0x13c35cfc0x3d4data
    RT_STRING0x13c360d00x430data
    RT_STRING0x13c365000x34cdata
    RT_STRING0x13c3684c0x454data
    RT_STRING0x13c36ca00x370data
    RT_STRING0x13c370100x390data
    RT_STRING0x13c373a00x27cdata
    RT_STRING0x13c3761c0x3f0data
    RT_STRING0x13c37a0c0x5c4data
    RT_STRING0x13c37fd00x3d0data
    RT_STRING0x13c383a00x2d4data
    RT_STRING0x13c386740x430data
    RT_STRING0x13c38aa40x4ccdata
    RT_STRING0x13c38f700x43cdata
    RT_STRING0x13c393ac0x470data
    RT_STRING0x13c3981c0x4a8data
    RT_STRING0x13c39cc40x398data
    RT_STRING0x13c3a05c0x3a0data
    RT_STRING0x13c3a3fc0x38cdata
    RT_STRING0x13c3a7880xacdata
    RT_STRING0x13c3a8340xd0data
    RT_STRING0x13c3a9040x2c8data
    RT_STRING0x13c3abcc0x280data
    RT_STRING0x13c3ae4c0x404data
    RT_STRING0x13c3b2500x3ccdata
    RT_STRING0x13c3b61c0x43cdata
    RT_STRING0x13c3ba580x4e0data
    RT_STRING0x13c3bf380x250data
    RT_STRING0x13c3c1880x3c0data
    RT_STRING0x13c3c5480x434data
    RT_STRING0x13c3c97c0x694data
    RT_STRING0x13c3d0100x490data
    RT_STRING0x13c3d4a00x300data
    RT_STRING0x13c3d7a00x388data
    RT_STRING0x13c3db280x3b8data
    RT_STRING0x13c3dee00x33cdata
    RT_STRING0x13c3e21c0xd0data
    RT_STRING0x13c3e2ec0xa0data
    RT_STRING0x13c3e38c0x300data
    RT_STRING0x13c3e68c0x46cdata
    RT_STRING0x13c3eaf80x2f8data
    RT_STRING0x13c3edf00x2f0data
    RT_STRING0x13c3f0e00x378data
    RT_RCDATA0x13c3f4580xd5dPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c401b80xd57PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c40f100xcfcPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c41c0c0xcd9PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c428e80xd5dPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c436480xd57PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c443a00xc4ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c44ff00xc4ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c45c400xcb5PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c468f80xcb0PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c475a80xd56PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c483000xd47PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c490480xdc2PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c49e0c0xdc5PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c4abd40xcf3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c4b8c80xcedPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c4c5b80xda9PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c4d3640xda6PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c4e10c0xcf3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c4ee000xcedPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c4faf00xbfePNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c506f00xd04PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c513f40xc0ePNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c520040xc1bPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c52c200xd36PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c539580xd0fPNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c546680xb07PNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c551700xb29PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c55c9c0xb7bPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c568180xbd4PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c573ec0xb8dPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c57f7c0xc13PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c58b900xb1dPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c596b00xb45PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5a1f80xb86PNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5ad800xc00PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5b9800xb7aPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5c4fc0xbf6PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5d0f40xbebPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5dce00xc85PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5e9680xb83PNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c5f4ec0xc03PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c600f00xc2cPNG image data, 15 x 15, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c60d1c0xd45PNG image data, 30 x 30, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c61a640x10data
    RT_RCDATA0x13c61a740x24bPNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
    RT_RCDATA0x13c61cc00x30aPNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
    RT_RCDATA0x13c61fcc0x312PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
    RT_RCDATA0x13c622e00x29aPNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
    RT_RCDATA0x13c6257c0xa6PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c626240xcfPNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c626f40xefPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c627e40xd9PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c628c00x10dPNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c629d00x13fPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c62b100x136PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c62c480x192PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c62ddc0x1caPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c62fa80xd7PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c630800x10fPNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c631900x138PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c632c80x70PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c633380x78PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c633b00x7ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c634300xc5PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c634f80xecPNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c635e40x113PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c636f80x10ePNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c638080x163PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c6396c0x1a3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c63b100x1f5PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c63d080x2f0PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c63ff80x3b3PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c643ac0x80PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c6442c0x8aPNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c644b80x98PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c645500xc5PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c646180xe1PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c646fc0x10fPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c6480c0x17aPNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c649880x204PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c64b8c0x215PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c64da40x163PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c64f080x1b8PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c650c00x22ePNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c652f00xc0PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c653b00x105PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c654b80x1cdPNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c656880x134PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c657bc0x183PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c659400x1c8PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c65b080xc5PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c65bd00xedPNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c65cc00xe7PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c65da80x157PNG image data, 18 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c65f000x1a7PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c660a80x209PNG image data, 36 x 36, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c662b40x148bPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c677400x111ePNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c688600xd8cPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
    RT_RCDATA0x13c695ec0x269cdata
    RT_RCDATA0x13c6bc880x2dataEnglishUnited States
    RT_RCDATA0x13c6bc8c0x20c6Delphi compiled form 'TElCalculatorForm'
    RT_RCDATA0x13c6dd540x1ceDelphi compiled form 'TElPromptForm'
    RT_RCDATA0x13c6df240x115c5Delphi compiled form 'TF000x049050392477771238995439'
    RT_RCDATA0x13c7f4ec0x364Delphi compiled form 'TfrmLMDRichInsertDateTimeDlg'
    RT_RCDATA0x13c7f8500x53bDelphi compiled form 'TfrmLMDRTFCharmapDialog'
    RT_RCDATA0x13c7fd8c0x388Delphi compiled form 'TLMDPrintPreviewForm'
    RT_RCDATA0x13c801140x1e8Delphi compiled form 'TLMDPrintPreviewModeDialog'
    RT_RCDATA0x13c802fc0x23dDelphi compiled form 'TLMDPrintResDataModule'
    RT_RCDATA0x13c8053c0x4b1Delphi compiled form 'TLMDRichfrmBookMarks'
    RT_RCDATA0x13c809f00x4d3Delphi compiled form 'TLMDRichfrmLinkDialog'
    RT_RCDATA0x13c80ec40xf57Delphi compiled form 'TLMDRichfrmParagraph'
    RT_RCDATA0x13c81e1c0x2ffcDelphi compiled form 'TLMDRichfrmPrintPreview'
    RT_RCDATA0x13c84e180x4b1Delphi compiled form 'TLMDRichfrmTabs'
    RT_RCDATA0x13c852cc0x58dDelphi compiled form 'TLMDRTFStatisticsDlg'
    RT_RCDATA0x13c8585c0x430aDelphi compiled form 'TLMDTemplateEditDialog'
    RT_RCDATA0x13c89b680x488Delphi compiled form 'TLoginDialog'
    RT_RCDATA0x13c89ff00x3c4Delphi compiled form 'TPasswordDialog'
    RT_RCDATA0x13c8a3b40x1c6aDelphi compiled form 'TRTFPrintPreviewMode'
    RT_GROUP_CURSOR0x13c8c0200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c0340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c0480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c05c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c0700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c0840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c0980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c0ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_CURSOR0x13c8c0c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
    RT_GROUP_ICON0x13c8c0d40x84dataEnglishUnited States
    RT_VERSION0x13c8c1580x458dataEnglishUnited States
    RT_MANIFEST0x13c8c5b00x70bXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States
    DLLImport
    mpr.dllWNetGetConnectionW
    winmm.dllsndPlaySoundW, PlaySoundW, timeGetTime, timeSetEvent, timeKillEvent, waveOutGetNumDevs
    winspool.drvDocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW
    comdlg32.dllPageSetupDlgW, ChooseFontW, CommDlgExtendedError, ChooseColorW, GetSaveFileNameW, GetOpenFileNameW, PrintDlgW
    comctl32.dllImageList_GetImageInfo, FlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, ImageList_Copy, FlatSB_GetScrollInfo, ImageList_Write, ImageList_DrawIndirect, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_LoadImageW, ImageList_Draw, ImageList_Remove, ImageList_ReplaceIcon, ImageList_SetOverlayImage
    shell32.dllSHBrowseForFolderW, DragQueryFileW, SHGetSpecialFolderLocation, Shell_NotifyIconW, DragAcceptFiles, ShellExecuteExW, SHGetPathFromIDListW, DragFinish, SHGetFileInfoW, SHGetMalloc, SHGetDesktopFolder, SHAppBarMessage, ShellExecuteW
    user32.dllCopyImage, MoveWindow, SetMenuItemInfoW, GetMenuItemInfoW, DefFrameProcW, SetCaretPos, GetCaretPos, ScrollWindowEx, GetDlgCtrlID, FrameRect, RegisterWindowMessageW, GetMenuStringW, FillRect, SendMessageA, IsClipboardFormatAvailable, EnumWindows, ShowOwnedPopups, GetClassInfoW, GetScrollRange, SetActiveWindow, GetActiveWindow, DrawEdge, GetKeyboardLayoutList, OemToCharBuffA, LoadBitmapW, EnumChildWindows, GetScrollBarInfo, UnhookWindowsHookEx, SetCapture, GetCapture, CreatePopupMenu, LoadMenuW, ShowCaret, GetMenuItemID, DestroyCaret, CharLowerBuffW, PostMessageW, SetWindowLongW, IsZoomed, SetParent, DrawMenuBar, GetClientRect, IsChild, SendDlgItemMessageW, IntersectRect, IsIconic, CallNextHookEx, ShowWindow, SetForegroundWindow, GetWindowTextW, IsDialogMessageW, DestroyWindow, RegisterClassW, EndMenu, CharNextW, GetFocus, GetDC, SetFocus, ReleaseDC, ExitWindowsEx, GetClassLongW, CharToOemBuffA, SetScrollRange, DrawTextW, PeekMessageA, MessageBeep, SetClassLongW, SetRectEmpty, RemovePropW, GetSubMenu, DestroyIcon, IsWindowVisible, IsCharUpperW, CharPrevW, PtInRect, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, GetMessageTime, CreateMenu, LoadStringW, CharLowerW, IsCharLowerW, SetWindowRgn, SetWindowPos, GetMenuItemCount, GetSysColorBrush, GetWindowDC, DrawTextExW, CharLowerBuffA, EnumClipboardFormats, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, GetSysColor, EnableScrollBar, TrackPopupMenu, DrawIconEx, GetClassNameW, GetMessagePos, GetIconInfo, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, SetCursorPos, GetCursorPos, SetMenu, GetMenuState, GetMenu, SetRect, GetKeyState, IsRectEmpty, ValidateRect, IsCharAlphaW, GetCursor, KillTimer, WaitMessage, TranslateMDISysAccel, GetWindowPlacement, GetClipboardFormatNameW, CreateIconIndirect, CreateWindowExW, GetDCEx, PeekMessageW, MonitorFromWindow, GetUpdateRect, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, MapVirtualKeyW, OffsetRect, IsWindowUnicode, CharToOemA, DispatchMessageW, CreateAcceleratorTableW, DefMDIChildProcW, GetSystemMenu, SetScrollPos, GetScrollPos, InflateRect, DrawFocusRect, ReleaseCapture, LoadCursorW, ScrollWindow, GetLastActivePopup, GetSystemMetrics, CharUpperBuffW, ClientToScreen, SetClipboardData, GetClipboardData, SetWindowPlacement, SetCaretBlinkTime, GetCaretBlinkTime, InvertRect, GetMonitorInfoW, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, EnableWindow, GetWindowThreadProcessId, RedrawWindow, EndPaint, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, ActivateKeyboardLayout, DestroyAcceleratorTable, GetParent, CreateCaret, MonitorFromRect, InsertMenuItemW, GetPropW, MessageBoxW, SetPropW, UpdateWindow, MsgWaitForMultipleObjects, OemToCharA, DestroyMenu, SetWindowsHookExW, GetDoubleClickTime, EmptyClipboard, GetDlgItem, AdjustWindowRectEx, IsWindow, DrawIcon, EnumThreadWindows, InvalidateRect, SetKeyboardState, GetKeyboardState, ScreenToClient, DrawFrameControl, IsCharAlphaNumericW, SetCursor, CreateIcon, GetDialogBaseUnits, RemoveMenu, SubtractRect, GetKeyboardLayoutNameW, OpenClipboard, TranslateMessage, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, CountClipboardFormats, CloseClipboard, DestroyCursor, CharUpperBuffA, CopyIcon, PostQuitMessage, ShowScrollBar, EnableMenuItem, HideCaret, FindWindowExW, MonitorFromPoint, LoadIconW, SystemParametersInfoW, GetWindow, GetWindowLongW, GetWindowRect, ToUnicode, InsertMenuW, IsWindowEnabled, IsDialogMessageA, FindWindowW, DeleteMenu, GetKeyboardLayout
    version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
    oledlg.dllOleUIPasteSpecialW, OleUIObjectPropertiesW, OleUIInsertObjectA
    oleaut32.dllSafeArrayPutElement, SetErrorInfo, GetErrorInfo, VariantInit, VariantClear, SysFreeString, SafeArrayAccessData, SysReAllocStringLen, SafeArrayCreate, CreateErrorInfo, SafeArrayGetElement, SysAllocStringLen, SafeArrayUnaccessData, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, VariantCopyInd, VariantChangeType
    advapi32.dllRegSetValueExW, RegConnectRegistryW, RegEnumKeyExW, RegLoadKeyW, AdjustTokenPrivileges, GetUserNameW, RegDeleteKeyW, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegQueryInfoKeyW, RegUnLoadKeyW, RegSaveKeyW, RegDeleteValueW, RegReplaceKeyW, RegFlushKey, RegQueryValueExW, RegEnumValueW, RegCloseKey, RegCreateKeyExW, RegRestoreKeyW
    msvcrt.dllmemcpy, memset
    kernel32.dllSetFileAttributesW, GetFileType, SetFileTime, QueryDosDeviceW, GetACP, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, VirtualProtect, ReadProcessMemory, OpenFileMappingW, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, FlushInstructionCache, GetFullPathNameW, VirtualFree, HeapAlloc, ExitProcess, GetCPInfoExW, GlobalSize, GetSystemTime, WriteProcessMemory, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToTzSpecificLocalTime, GetModuleHandleW, FreeLibrary, TryEnterCriticalSection, HeapDestroy, FileTimeToDosDateTime, ReadFile, DosDateTimeToFileTime, GetUserDefaultLCID, IsBadCodePtr, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, DisableThreadLibraryCalls, FindResourceW, CreateThread, CompareStringW, CopyFileW, MapViewOfFile, CreateMutexW, LoadLibraryA, GetVolumeInformationW, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, MoveFileW, GlobalAddAtomW, FormatMessageW, OpenProcess, SwitchToThread, GetExitCodeThread, OutputDebugStringW, GetCurrentThread, GetLogicalDrives, LocalFileTimeToFileTime, GetFileAttributesExW, LoadLibraryExW, LockResource, FileTimeToSystemTime, GetCurrentThreadId, UnhandledExceptionFilter, GlobalFindAtomW, VirtualQuery, GlobalFree, VirtualQueryEx, Sleep, SetVolumeLabelW, EnterCriticalSection, SetFilePointer, FlushFileBuffers, LoadResource, SuspendThread, GetTickCount, WritePrivateProfileStringW, GetTempFileNameW, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, GetCurrentDirectoryW, SetCurrentDirectoryW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, GlobalLock, SetThreadPriority, VirtualAlloc, GetTempPathW, GetCommandLineW, GetSystemInfo, DuplicateHandle, LeaveCriticalSection, GetProcAddress, ResumeThread, GetLogicalDriveStringsW, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, GetConsoleOutputCP, UnmapViewOfFile, GetConsoleCP, lstrlenW, SetEndOfFile, QueryPerformanceCounter, lstrcmpW, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, GetLocaleInfoW, CreateFileW, SystemTimeToFileTime, EnumResourceNamesW, GetSystemDirectoryW, DeleteFileW, IsDBCSLeadByteEx, GetEnvironmentVariableW, GetLocalTime, WaitForSingleObject, WriteFile, CreateFileMappingW, ExitThread, DeleteCriticalSection, GetDateFormatW, GetTimeFormatW, TlsGetValue, SetErrorMode, GetComputerNameW, TzSpecificLocalTimeToSystemTime, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, RemoveDirectoryW, CreateEventW, GetPrivateProfileStringW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale
    SHFolder.dllSHGetFolderPathW
    wsock32.dllhtons, ntohs, setsockopt, WSAStartup, WSACleanup, listen, gethostbyname, gethostname, closesocket, inet_ntoa, socket, recv, ioctlsocket, WSAGetLastError, shutdown, inet_addr, WSACancelAsyncRequest, send, WSAAsyncGetHostByName
    ole32.dllStgCreateDocfileOnILockBytes, CreateBindCtx, MkParseDisplayName, CoCreateGuid, OleCreateStaticFromData, CoCreateInstance, IsEqualGUID, CreateILockBytesOnHGlobal, StringFromGUID2, OleCreateFromData, CLSIDFromProgID, CoInitialize, CoTaskMemAlloc, DoDragDrop, RevokeDragDrop, OleGetIconOfClass, CoUninitialize, RegisterDragDrop, OleInitialize, OleSetContainedObject, OleUninitialize, CoInitializeEx, OleCreateLinkFromData, CoTaskMemFree, OleSetMenuDescriptor
    gdi32.dllAddFontMemResourceEx, Pie, SetBkMode, CreateCompatibleBitmap, CreatePolygonRgn, BeginPath, GetEnhMetaFileHeader, CloseEnhMetaFile, RectVisible, AngleArc, ResizePalette, SetAbortProc, SetTextColor, GetTextColor, StretchBlt, ExtSelectClipRgn, RoundRect, SelectClipRgn, RestoreDC, SetRectRgn, GetTextMetricsW, GetWindowOrgEx, CreatePalette, CreateDCW, CreateICW, CreatePen, PolyBezierTo, GetStockObject, CreateSolidBrush, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, SetTextCharacterExtra, StartDocW, AbortDoc, GetSystemPaletteEntries, GetEnhMetaFileBits, CreatePenIndirect, GetEnhMetaFilePaletteEntries, SetMapMode, GetMapMode, CreateFontIndirectW, PolyBezier, ExtCreatePen, DeleteMetaFile, EndDoc, GetObjectW, GetWinMetaFileBits, SetROP2, GetTextExtentExPointW, GetEnhMetaFileDescriptionW, ArcTo, CreateEnhMetaFileW, Arc, CreateRectRgnIndirect, TextOutW, SelectPalette, ExcludeClipRect, SetWindowOrgEx, MaskBlt, EndPath, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, OffsetClipRgn, CreateBrushIndirect, PatBlt, StrokePath, SetEnhMetaFileBits, CreateEllipticRgn, Rectangle, DeleteDC, SaveDC, BitBlt, FrameRgn, GetDeviceCaps, GetTextExtentPoint32W, PtInRegion, GetClipBox, GetClipRgn, Polyline, IntersectClipRect, CreateBitmap, CombineRgn, SetWinMetaFileBits, CreateDIBitmap, GetStretchBltMode, CreateDIBSection, SetStretchBltMode, GetDIBits, LineTo, GetRgnBox, EnumFontsW, EnumFontFamiliesW, SetWindowExtEx, CreateHalftonePalette, DeleteObject, SelectObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, OffsetRgn, SetBkColor, GetBkColor, CreateCompatibleDC, GetBrushOrgEx, GetCurrentPositionEx, GetNearestPaletteIndex, SetTextAlign, GetTextAlign, RemoveFontMemResourceEx, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetViewportExtEx, SetPixel, PolyPolyline, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries
    NameOrdinalAddress
    TMethodImplementationIntercept30x4771e8
    __dbk_fcall_wrapper20x412758
    dbkFCallWrapperAddr10xbb663c
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    RussianRussia
    GermanGermany
    PortugueseBrazil
    Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

    Click to jump to process

    Target ID:0
    Start time:19:55:00
    Start date:07/02/2023
    Path:C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
    Imagebase:0x400000
    File size:331854848 bytes
    MD5 hash:A42B37FBF9D9B46986D062C75C6DA1B5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Borland Delphi
    Reputation:low

    Target ID:1
    Start time:19:55:03
    Start date:07/02/2023
    Path:C:\Windows\splwow64.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\splwow64.exe 12288
    Imagebase:0x7ff607170000
    File size:130560 bytes
    MD5 hash:8D59B31FF375059E3C32B17BF31A76D5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly