87ef653bcc11beaa4f9223962e98564b

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 1992-Jun-19 22:22:17
Detected languages Russian - Russia

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: May have dropper capabilities:
  • CurrentVersion\Run
Miscellaneous malware strings:
  • cmd.exe
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExA
  • GetProcAddress
  • LoadLibraryA
Functions which can be used for anti-debugging purposes:
  • FindWindowA
Code injection capabilities (PowerLoader):
  • GetWindowLongA
  • FindWindowA
Can access the registry:
  • RegQueryValueExA
  • RegOpenKeyExA
  • RegCloseKey
  • RegSetValueExA
  • RegFlushKey
  • RegDeleteValueA
  • RegCreateKeyExA
Possibly launches other programs:
  • ShellExecuteA
Uses functions commonly found in keyloggers:
  • MapVirtualKeyA
  • GetForegroundWindow
  • CallNextHookEx
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Manipulates other processes:
  • OpenProcess
Can take screenshots:
  • CreateCompatibleDC
  • BitBlt
  • GetDCEx
  • GetDC
  • FindWindowA
Can shut the system down or lock the screen:
  • ExitWindowsEx
Suspicious The PE header may have been manually modified. The resource timestamps differ from the PE header:
  • 2013-Jun-01 15:21:30
Malicious VirusTotal score: 65/72 (Scanned on 2025-08-15 16:05:04) ALYac: Gen:Variant.Ransom.Ryuk.93
APEX: Malicious
AVG: Win32:Agent-ATUS [Trj]
AhnLab-V3: Trojan/Win32.Gimemo.R78730
Alibaba: Malware:Win32/km_2e2dfbd1.None
Antiy-AVL: Trojan[Ransom]/Win32.Gimemo.bdvq
Arcabit: Trojan.Ransom.Ryuk.93
Avast: Win32:Agent-ATUS [Trj]
Avira: TR/Strictor.oiuya
BitDefender: Gen:Variant.Ransom.Ryuk.93
Bkav: W32.AIDetectMalware
CAT-QuickHeal: Ransom.Somhoveran.C8
CTX: exe.ransomware.ryuk
ClamAV: Win.Malware.Atus-9659809-0
CrowdStrike: win/malicious_confidence_100% (W)
Cylance: Unsafe
Cynet: Malicious (score: 100)
DeepInstinct: MALICIOUS
DrWeb: Trojan.Winlock.14393
ESET-NOD32: Win32/LockScreen.AWI
Elastic: malicious (high confidence)
Emsisoft: Gen:Variant.Ransom.Ryuk.93 (B)
F-Secure: Trojan.TR/Strictor.oiuya
Fortinet: W32/LockScreen.AW!tr
GData: Win32.Trojan-Ransom.Gimemo.A
Google: Detected
Gridinsoft: Ransom.Win32.Somhoveran.vl!i
Ikarus: Trojan.Strictor
Jiangmin: Trojan/Gimemo.gmy
K7AntiVirus: Trojan ( 0043daac1 )
K7GW: Trojan ( 0043daac1 )
Kaspersky: Trojan-Ransom.Win32.Gimemo.cdqu
Kingsoft: malware.kb.a.983
Lionic: Trojan.Win32.Gimemo.tnrZ
Malwarebytes: Neshta.Virus.FileInfector.DDS
MaxSecure: Trojan.Malware.300983.susgen
McAfeeD: Real Protect-LS!87EF653BCC11
MicroWorld-eScan: Gen:Variant.Ransom.Ryuk.93
Microsoft: Ransom:Win32/Somhoveran.D!bit
NANO-Antivirus: Trojan.Win32.LockScreen.foalcc
Paloalto: generic.ml
Panda: Trj/Ransom.CC
Rising: Ransom.LockScreen!1.AA76 (CLASSIC)
SUPERAntiSpyware: Trojan.Agent/Gen-Urausy
Sangfor: Ransom.Win32.Gandcrab_22.se
SentinelOne: Static AI - Malicious PE
Skyhigh: BehavesLike.Win32.Generic.gh
Sophos: Troj/AutoG-KE
Symantec: ML.Attribute.HighConfidence
TACHYON: Ransom/W32.DP-Gimemo.446464
Tencent: Malware.Win32.Gencirc.10bb24ef
Trapmine: suspicious.low.ml.score
TrellixENS: GenericRXEQ-EA!87EF653BCC11
TrendMicro: Mal_LockScreen
TrendMicro-HouseCall: Mal_LockScreen
VBA32: TScope.Trojan.Delf
VIPRE: Gen:Variant.Ransom.Ryuk.93
Varist: W32/LockScreen.G.gen!Eldorado
VirIT: Trojan.Win32.Generic.ANGX
Xcitium: TrojWare.Win32.Ransom.Gimemo.OP@5rbubo
Yandex: Trojan.GenAsa!lI5wcVyzMzo
Zillya: Trojan.Gimemo.Win32.6128
ZoneAlarm: Troj/AutoG-KE
alibabacloud: Ransomware:Win/Somhoveran.14313834
huorong: Ransom/Somhoveran.a

Hashes

MD5 87ef653bcc11beaa4f9223962e98564b
SHA1 4f84542cc5adf4ddb3a780ca9732a6510f372020
SHA256 448aa204bd6ce60f113f7797997c4b9a28c04200cc48aff84580edbf88bb1144
SHA3 11973859f880b7b909a6ceb86eb691c348d9f78545baef11cbb587ff51739df0
SSDeep 12288:7MSU4joci8M6PW1GVFeFd60DFUyhesYM:ASUCpM2W1Gvgmyesv
Imports Hash c03ea808a9a8798d010b32b238da6e83

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 8
TimeDateStamp 1992-Jun-19 22:22:17
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x54e00
SizeOfInitializedData 0x17e00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00055D50 (Section: CODE)
BaseOfCode 0x1000
BaseOfData 0x56000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x74000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

CODE

MD5 85f5a0086523079f74f577452cc72c60
SHA1 c0dbb75603850d2c8b24d733d582cd3c8dd39c8a
SHA256 e6172525e62251f9f3b7634c24cf7ef8680f3d58c6a783ca7336c5eae66145a1
SHA3 3ec9e16eab3a5065ff8cb37b14b1de8d0e0e6e1b5501132b253dce8e4a8eacfe
VirtualSize 0x54d98
VirtualAddress 0x1000
SizeOfRawData 0x54e00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.50842

DATA

MD5 aa76b4c1ed533745721ef48fcf3d4b36
SHA1 f1aa2f454a828a9147eee2177e7891b49f092f02
SHA256 049ed20a0c14496f1e03add6ebe41fdb0d5e0f1fc53a266ace1e24490c4656ed
SHA3 1c410695915525a84807ab56b637c23520838146f9fd9f1b869c62abaee41d2b
VirtualSize 0x13a8
VirtualAddress 0x56000
SizeOfRawData 0x1400
PointerToRawData 0x55200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.87782

BSS

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0xbfd
VirtualAddress 0x58000
SizeOfRawData 0
PointerToRawData 0x56600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 71a9e8650da8dc70d3fe3a712d0f079f
SHA1 47beefdbe9d5ee6ca71e0d9c3ea37a3f12afda59
SHA256 3abf7d8a0282aa1f117cfb686582c17fa85b25b01ad3c40f79c7172630590f83
SHA3 6dc3d617d533c2569993f85c54cf4b6f435b4d1282224d0592ba6fd122218e21
VirtualSize 0x2130
VirtualAddress 0x59000
SizeOfRawData 0x2200
PointerToRawData 0x56600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.97975

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x10
VirtualAddress 0x5c000
SizeOfRawData 0
PointerToRawData 0x58800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 975260a07c9dc0db839a7c9159da18bb
SHA1 abd0f390b431948b4b1b5b40dd426972c22d3102
SHA256 5fb632ae46edc1101fe4c0ebe1b871451bfd84de159cd779658befce9bf07483
SHA3 ef1ba99a13edcb9ee1ca016f20b4940b87ec294316c8e400b7b002a7f86c5c51
VirtualSize 0x18
VirtualAddress 0x5d000
SizeOfRawData 0x200
PointerToRawData 0x58800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
Entropy 0.200582

.reloc

MD5 7b84a2c2760787192e527f7f2d47b279
SHA1 3ef3fad520e6ab7841ce2112c4d59bf5ce6ba5e8
SHA256 8bb8b417d143f9da5365c818001b32d127e27c75cbaf87ae49553d57983ff8f9
SHA3 e3b0fec8bf13313344f8d24ca5f827cc51890499c2f73dbfe4a29eb4f083825b
VirtualSize 0x60f8
VirtualAddress 0x5e000
SizeOfRawData 0x6200
PointerToRawData 0x58a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
Entropy 6.66054

.rsrc

MD5 30d7d60d95d76e42a5188baab15ca22c
SHA1 539c2a66a1eafabdb602fe7dc17a32e0a5a258ee
SHA256 1f9afffe2e2c1906dbb947c2d42b2a70eb843bbf3bfb90ebf2e903ce7f05832d
SHA3 505d180293949833cb36a05adab08c704f0e40e034abf793d1ade0611b95c721
VirtualSize 0xe400
VirtualAddress 0x65000
SizeOfRawData 0xe400
PointerToRawData 0x5ec00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_SHARED
Entropy 5.79011

Imports

kernel32.dll DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
user32.dll GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
advapi32.dll RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32.dll SysFreeString
SysReAllocStringLen
SysAllocStringLen
kernel32.dll (#2) DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32.dll (#2) RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32.dll (#3) DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
version.dll VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
gdi32.dll UnrealizeObject
StretchBlt
SetWindowOrgEx
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetROP2
SetPixel
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SelectPalette
SelectObject
SelectClipRgn
SaveDC
RestoreDC
RectVisible
RealizePalette
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetTextMetricsA
GetTextExtentPoint32A
GetSystemPaletteEntries
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
ExcludeClipRect
DeleteObject
DeleteDC
CreateSolidBrush
CreatePenIndirect
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateDIBitmap
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
BitBlt
user32.dll (#2) GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
kernel32.dll (#4) DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
oleaut32.dll (#2) SysFreeString
SysReAllocStringLen
SysAllocStringLen
comctl32.dll ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Write
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Remove
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_SetImageCount
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
shell32.dll ShellExecuteA

Delayed Imports

1

Type RT_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.6633
MD5 ff4e5862f26ea666373e5fab2bddfb11
SHA1 cfa13c0ab30f1bbd566900dee3631902f9b6451c
SHA256 b8e6fc93d423931acbddae3c27dd3c4eb2a394005d746951a971cb700e0ee510
SHA3 91dae12a9f43c5443e0661091a336f882fa1482f75fa9a57c9298d1d70c8ae69

2

Type RT_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.80231
MD5 2e87b3c111e3073a841775c1f8ec5a90
SHA1 20292304fa2ef1bfdc4a1000e90a1c16d4765a96
SHA256 ce19ace18e87b572e6912306776226af5b8e63959c61cde70a8ff05b3bbdcc41
SHA3 9527f09e739c2064835800a7e5c317cb422bdd7237f00fca079a1c62f58a2612

3

Type RT_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.00046
MD5 a04c3c368cb37c07bd5f63e7e6841ebd
SHA1 699300bceaa1256818c43fecfc8cad93a59156b2
SHA256 ee1c9c194199c320c893b367602ccc7ee7270bd4395d029f727e097634f47f8c
SHA3 58722e3138aad1382e284c1605ecd665ced536de4906749ac8d6e11252cc9558

4

Type RT_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.56318
MD5 9929115b21c2c59348058d4190392e75
SHA1 626fba1825d572ea441d36363307c9935de3c565
SHA256 9d9edf87ca203ecc60b246cc783d54218dd0ce77d3a025d0bafc580995a4abd8
SHA3 fea156e872544252c625076a6bf3baa733ee5b3d5399716e156734af7a841369

5

Type RT_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.6949
MD5 f321ad13d1c3f35a05d67773b4bc27d6
SHA1 30aded8525417e2531d5eb88bf2f868172945baa
SHA256 99676c52310db365580965ea646ece86c62951bfd97ec0aae9f738a202a90593
SHA3 04c839da98a8c50a36697076af5bc6d527560a69153b2f718f065908fd4fe3ad

6

Type RT_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.62527
MD5 5ca217e52bdc6f23b43c7b6a23171e6e
SHA1 d99dc22ec1b655a42c475431cc3259742d0957a4
SHA256 11726dcf1eebe23a1df5eb0ee2af39196b702eddd69083d646e4475335130b28
SHA3 b358d8a5b0f400dd2671956ec45486ae1035556837b5289df5f418fe69348b3f

7

Type RT_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x134
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.91604
MD5 6be7031995bb891cb8a787b9052f6069
SHA1 487eb59fd083cf4df02ce59d9b079755077ba1b5
SHA256 6f938aab0a03120de4ef8b27aff6ba5146226c92a056a6f04e5ec8d513ce5f9d
SHA3 0f1c6c0378a3646c9fbf3678bbeeccf929d32192f02d1ea9d6ba0be5c769e6ab

1 (#2)

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x468
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 5.25906
MD5 48753fcaac8389720bb463345617fbe7
SHA1 633bf40fe492ebd3f2999326b9935a536a7049e3
SHA256 3139bdde1f0d6276ccebf0752c5405ff4c702ca7b8e16e4235b3325c7733ab10
SHA3 03b945dda263b8ac0192d127d9753c56973701891f55e4edd054ce30fa02c343

2 (#2)

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 5.33102
MD5 cab81b1d8d63944daf331db51346e9f3
SHA1 462d9c09e01d13eb74c83735f70c13b23cbb3949
SHA256 3535a1609d54ce6c60f292b819e6c26b612be23055842440be82d4a4db6b40b7
SHA3 a312c44efe248823f40dcea432f47af358ed30fd60d88e8e3199a29fbb8eda3e

3 (#2)

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 5.27633
MD5 4aeaac39891c6115059f95bb32d741ed
SHA1 6982299a45ff5d1d61d97902206527bb3e8ecc81
SHA256 57cb70373d825a5d606dc5bf156a256f5d1eb4ac73c8aa493e6538fe3eab3523
SHA3 ca9223631fae4109b8d2da99f868f2c265b39352afc99fd381366da8faf78465

4 (#2)

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 5.15923
MD5 c54a1ace8733185399b13be71dfea125
SHA1 46b16d6102c97ae31a9c982684c1037a4d02f5c2
SHA256 fc71290b56b4d1389eb0e4933e1d77de23b68f098207f44c494034963b885def
SHA3 4d6222f9ef2bd14d35d2c28c7a39369894c1ae096fc254f255fa8b2a51467f9a

4081

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xf4
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.07549
MD5 e0e483316f903a5e8a4d153d0626eecd
SHA1 70e5cfa7d33cf821d59602ab4b035ca8a4e25f6d
SHA256 28ef5068f1c0a01720a8f4a6998693fb2076f9dc869d24b407636b43cf9ab939
SHA3 ed0ccbf319b001caaa75e1e959577ce44a48dfea67b42e9f89b55a0f7fe13c95

4082

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x1dc
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.22434
MD5 6ef859958e2bb534c0e86d04a0a746eb
SHA1 ad23a6f206b6d755234ba42b27a767cdcf28a0ce
SHA256 7e9aed90ec7a49e868d27b3b5d32f073e49b3a73984d724c7f9ac1ec82f37eeb
SHA3 c92bde234ded18d2cb4114f6e31a3e51339b98967613ddf3ae5662e4a790db7f

4083

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x154
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.2356
MD5 51f1a5aa4768fb165a9a0c882a795d6d
SHA1 d2aed9657f98d8878179beb59b94fef2a3639e27
SHA256 2da2a1c611ba7aafdced110f3ea2bf7d8a6f93edad178cd101e6a71ae28de721
SHA3 cd9a7188466573f0c8ac084e99ef2fa45bf69e77041ac3e8e247056aa4485012

4084

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x240
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.222
MD5 260661883abce15780a44e0fbf873fa9
SHA1 bed8cc017f0a141ce1883b1237abe7cc754faaab
SHA256 620c79ce00c5a5ad41a2f9d089f9ec577df2b6a26582b47b13c9e37fb59e0757
SHA3 6b86503a691ca66cb22a32365dfeed8962d693f20f808bb35491ade1c503dd21

4085

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x184
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.25881
MD5 b70fb3a96aa725907977938b2edb3c6a
SHA1 0bf68686320aab3d8ce81cf15f0b314c75bb9920
SHA256 1e2813b61575c674718dbc123ae89383c613868b39d9f19a27b9c6293fd4b5e7
SHA3 a910a70cae2d5ac5d6ba187e885825d60fb03420dc2ea1da3fe0db23f8827d1f

4086

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xe8
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.07219
MD5 1e385d8c552c5f4cc45df051ae51727a
SHA1 8aa0558a9d58c8f138d5c74c3ad18967ee98e8e2
SHA256 8abff6773b392989daf7307590eb4ad6e16fa3f517207a2c5adc6d6ece829c4e
SHA3 575618f198e17f33d33797894b1ead8b317ac9891a25b1b1d93a416004da6469

4087

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3a8
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.24355
MD5 bbdd072f90ed9d9dec3b514c76e59c49
SHA1 50e62c04097c419d63047b0d3edcc605b1740d5d
SHA256 40538a221a6c823be6738c5851a7399c5b0dd9b4b3f5df4ca2ac1ea9c62835d3
SHA3 d15ab2516e36a33b7d967d0b8bfaaaaabba584244ef0243a43cbb12639559c4d

4088

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3c4
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.18457
MD5 849d9d4cc5a87d038ce64b39f705df84
SHA1 280b3f42269e8eb075a4073f98513313d8ef4ccb
SHA256 9ca2b22d4d0c0b12c83c7e15754d1027b383a3025e4c03f90f0ad96e05f2d287
SHA3 0fa741dec368e47645877f0bd014d67cab5bdd22ab4f81da78e7df76b0ae025b

4089

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x3a4
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.22496
MD5 e5ef3e1f614759b438a3bfa653dcf67e
SHA1 f22363e8f2cd9e92cdb8396b95a335705dcc29ed
SHA256 f66dfbf88f20628ed1c6b450a57990b589a04154382c16af10fbf2eb632de0a4
SHA3 d999d82b0382f9412d1c7507a767ed46eec1138aa4d34f606071d7882289d267

4090

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x408
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.23587
MD5 ecc7e1cdfbe330bc6bce4bb6759da2c9
SHA1 42b9f457da836b5c3ae4ad2d12957d23ee7fd64c
SHA256 817836305c82203cabd230eb35c99f90c7e497e49b887e819a2a39f553867300
SHA3 64c2db8cc5f0a63d963231679372b9f31447efc09ddef78748a4a0ea6855413a

4091

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xec
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.94991
MD5 76b269d85b322790b6a99e3f8b603311
SHA1 1361ca26f29c62b7b591f79ea677c71a38aa98b8
SHA256 369c5223029ea6d1b17b7f24a8d84c10f528457e79be3349a6c55efd0e8f0e02
SHA3 5ef9310cf2c895a94d39a4f7bab21bb432404fd4ded0240fe78a324936bac55e

4092

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0xd0
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.94916
MD5 24f859ee6a1b2a0281d58e744c4d931c
SHA1 d0768e52c1cd646ea9ad0e752d71dcb2709ea74e
SHA256 968bbd325d5403ab654fd9308ea2497bce206395d77c4729d07b638480b7cc47
SHA3 4df3e7394f0291d46352f6b60d17d78c8da7ff6d1e3deb8e52dd43c51ab1e2da

4093

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x29c
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.24887
MD5 beb27ef60a5afdc347e0e4a364d69113
SHA1 9fed1a50dfeb3a075306669d3638bdfafdd32d97
SHA256 0d3137dd56cde6d3d1fd0a6e4aa514928ce0eb20cd0a43fdb18ab8cd0bf63b9f
SHA3 9592b7419fb95fd098445018c2357185cf59d1f3051a410eccd0f4da66f7a822

4094

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x40c
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.22093
MD5 061ef920f02530d7fed3484f267bf2cd
SHA1 bfc2a198b6ce5e1b746dfc395ce7d03c0305ce44
SHA256 77e4b2d44652277ed54a8967667dd0cf7af92932f1940e0124cf3cb8c7f67927
SHA3 4e135eefc2a1274de929f47cfd220d37b244b57cedffaf93e3b4d5ba745d92a6

4095

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x330
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.23637
MD5 8356cff46d5d2eb6e943dfab8796b058
SHA1 2b4e803199a60cb6685e918c7c50f9314a0e5a0a
SHA256 db3fa427c11963222426e133f94d1db76de1f8a09a33cda71e9241cc69a12704
SHA3 bc5ab850b88d515ad2affc860f262b521306aaca02c7a3bd211602261ef16486

4096

Type RT_STRING
Language UNKNOWN
Codepage UNKNOWN
Size 0x314
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 3.12118
MD5 7217b6b6ee273616858467d7261c7d96
SHA1 5a31a93c1c95efd080efc3601518d2e69c91b93f
SHA256 d10704e50b2f6387284c4242cfe62af0bdfcabfb17429ffe617b77804f1fd017
SHA3 6e6e61dcd0b4584d03df4ed0734437fe6cd315b0887e14a3bbcc1e3706e5028f

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x10
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 4
MD5 d8090aba7197fbf9c7e2631c750965a8
SHA1 04f73efb0801b18f6984b14cd057fb56519cd31b
SHA256 88d14cc6638af8a0836f6d868dfab60df92907a2d7becaefbbd7e007acb75610
SHA3 a5a67ad8166061d38fc75cfb2c227911de631166c6531a6664cd49cfb207e8bb

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x228
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 5.2713
MD5 b1c2dad54c3e8addaef08880667c60c9
SHA1 2398ff9aca84cd4a99c85e2d2cadd5c9c55c5759
SHA256 985d041fe16fe99efa44aca474ef6e0726ba7fc7c26281cac730aa934b88b2ee
SHA3 ebd60bfe76ade978f259e1c887373499e74a99e0ac804aef63f2a286eba00e27

TFORM1

Type RT_RCDATA
Language UNKNOWN
Codepage UNKNOWN
Size 0x28f3
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 5.82647
MD5 c4079819189b6bfde267b2734b1b9a78
SHA1 37c7b2dcb707f10574419b60707f933bc7c0fb15
SHA256 4a1616c1db7666833242d32265956be0f104714daa7e611862e2831b5c70df23
SHA3 0e39f613d293dbd2868580758aaa4498ceddf07f2bfbd156cb95c7a5a2016e24

32761

Type RT_GROUP_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 1.83876
Detected Filetype Cursor file
MD5 a2baa01ccdea3190e4998a54dbc202a4
SHA1 e8217df98038141ab4e449cb979b1c3bbea12da3
SHA256 c53efa8085835ba129c1909beaff8a67b45f50837707f22dfff0f24d8cd26710
SHA3 8874564c406835306368adf5e869422e1bb97109b97c1499caa8af219990e8dc
Preview

32762

Type RT_GROUP_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 1.91924
Detected Filetype Cursor file
MD5 aff0f5e372bd49ceb9f615b9a04c97df
SHA1 e3205724d7ee695f027ab5ea8d8e1a453aaad0dd
SHA256 b07e022f8ef0a8e5fd3f56986b2e5bf06df07054e9ea9177996b0a6c27d74d7c
SHA3 9cb042121a5269b80d18c3c5a94c0e453890686aedade960097752377dfa9712
Preview

32763

Type RT_GROUP_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.01924
Detected Filetype Cursor file
MD5 48e064acaba0088aa097b52394887587
SHA1 310b283d52aa218e77c0c08db694c970378b481d
SHA256 43f40dd5140804309a4c901ec3c85b54481316e67a6fe18beb9d5c0ce3a42c3a
SHA3 38753084b0ada40269914e80dbacf7656dc94764048bd5dff649b08b700f3ed5
Preview

32764

Type RT_GROUP_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.01924
Detected Filetype Cursor file
MD5 1ae28d964ba1a2b1b73cd813a32d4b40
SHA1 8883cd93b8ef7c15928177de37711f95f9e4cd22
SHA256 ff47a48c11c234903a7d625cb8b62101909f735ad84266c98dd4834549452c39
SHA3 a85dadd416ce2d22aa291c0794c45766a0613b853c6e3b884a2b05fc791427b8
Preview

32765

Type RT_GROUP_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.01924
Detected Filetype Cursor file
MD5 0893f6ba80d82936ebe7a8216546cd9a
SHA1 0754cbdf56c53de9ed7fbd47859d20b788c6f056
SHA256 a0adcedb82b57089f64e2857f97cefd6cf25f4d27eefc6648bda83fd5fef66bb
SHA3 ce6148ade08ef9b829f83cb13b4c650d9d4a7012bfd1ab697a7870a05f4104f8
Preview

32766

Type RT_GROUP_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.01924
Detected Filetype Cursor file
MD5 dcaa3c032fe97281b125d0d8f677c219
SHA1 58fe36409f932549e2f101515abee7a40cf47b2c
SHA256 6e1e7738a1b6373d8829f817915822ef415a1727bb5bb7cfe809e31b3c143ac5
SHA3 02ef292e1b4a70e439e362af6b4fa213e3816ade45222b78dabab712b6afba54
Preview

32767

Type RT_GROUP_CURSOR
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.01924
Detected Filetype Cursor file
MD5 a95c7c78d0a0b30b87e3c4976e473508
SHA1 b19f3999f1b302a2d28977cb18a3416c918d486c
SHA256 326c048595bbc72e3f989cb3b95fbf09dc83739ced3cb13eb6f03336f95d74f1
SHA3 8157b4e6afa7ed2e2ffc174d655bec9fb81db609e4c5864faa5ead931ff60689
Preview

MAINICON

Type RT_GROUP_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x3e
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 2.62308
Detected Filetype Icon file
MD5 bec82d9c5028d979a420e534950d6233
SHA1 e1bd3221bbc5ba3e8172dc4e58089198b2ff4347
SHA256 0885230f1722c42fe74e368066038da27b8391506ba1582add2d240e41b30ab1
SHA3 c6629df6bbc335ec2e5c14a509e058afe8ca773892a9aa4fc96ba37eafef2cc7

1 (#3)

Type RT_MANIFEST
Language Russian - Russia
Codepage UNKNOWN
Size 0x2f0
TimeDateStamp 2013-Jun-01 15:21:30
Entropy 5.17015
MD5 e4c8a62db5113f6ecef8783d50f2f7f7
SHA1 3af0c70356976e15e7466aa0b39ebff654c02318
SHA256 6db2d03d69c169b420a447659d1b87487c4c1ed6acdd29fd0ff0499339c79d73
SHA3 d3525c8852a40d0763f57cc5611186ed68e94848ed2819546df4e22644a89442

String Table contents

Scroll Bar
3D Dark Shadow
3D Light
Window Background
Window Frame
Window Text
No help keyword specified.
Button Highlight
Button Shadow
Button Text
Caption Text
Default
Gray Text
Highlight Background
Highlight Text
Inactive Border
Inactive Caption
Inactive Caption Text
Info Background
Info Text
Menu Background
Menu Text
None
Red
Lime
Yellow
Blue
Fuchsia
Aqua
White
Money Green
Sky Blue
Cream
Medium Gray
Active Border
Active Caption
Application Workspace
Background
Button Face
Error removing control from dock tree
- Dock zone not found
- Dock zone has no control
Unable to find a Table of Contents
No help found for %s
No context-sensitive help installed
No topic-based help system installed
Black
Maroon
Green
Olive
Navy
Purple
Teal
Gray
Silver
PgUp
PgDn
End
Home
Left
Up
Right
Down
Ins
Del
Shift+
Ctrl+
Alt+
Clipboard does not support Icons
Menu '%s' is already being used by another form
Docked control must have a name
&Yes
&No
OK
Cancel
&Help
&Abort
&Retry
&Ignore
&All
N&o to All
Yes to &All
BkSp
Tab
Esc
Enter
Space
Control '%s' has no parent window
Cannot hide an MDI Child Form
Cannot change Visible in OnShow or OnHide
Cannot make a visible window modal
Menu index out of range
Menu inserted twice
Sub-menu is not in menu
Not enough timers available
GroupIndex cannot be less than a previous menu item's GroupIndex
Cannot create form. No MDI forms are currently active
A control cannot have itself as its parent
Cannot drag a form
Warning
Error
Information
Confirm
Property %s does not exist
Stream write error
Bitmap image is not valid
Icon image is not valid
Cannot change the size of an icon
Unsupported clipboard format
Out of system resources
Canvas does not allow drawing
Invalid image size
Invalid ImageList
Invalid ImageList Index
Failed to read ImageList data from stream
Failed to write ImageList data to stream
Error creating window device context
Error creating window class
Cannot focus a disabled or invisible window
Invalid property path
Invalid property value
Invalid data type for '%s'
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
Out of memory while expanding memory stream
Error reading %s%s%s: %s
Stream read error
Property is read-only
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented
Operation not allowed on sorted list
%s not in a class registration group
Saturday
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range
Can't write to a read-only resource stream
CheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists
List does not allow duplicates ($0%x)
A component named %s already exists
String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Unable to write to %s
Invalid stream format
''%s'' is not a valid component name
October
November
December
Sun
Mon
Tue
Wed
Thu
Fri
Sat
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Jun
Jul
Aug
Sep
Oct
Nov
Dec
January
February
March
April
May
June
July
August
September
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%s
A call to an OS function failed
Jan
Feb
Mar
Apr
May
Format '%s' invalid or incompatible with argument
No argument for format '%s'
Variant method calls not supported
Read
Write
Error creating variant or safe array
Variant or safe array index out of bounds
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation
Invalid variant operation (%s%.8x)
%s
Could not convert variant of type (%s) into type (%s)
Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Division by zero
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Exception %s in module %s at %p.
%s%s
Application Error
'%s' is not a valid integer value
'%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time
'%s' is not a valid date and time
Invalid argument to time encode
Invalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input

Version Info

TLS Callbacks

StartAddressOfRawData 0x45c000
EndAddressOfRawData 0x45c010
AddressOfIndex 0x45609c
AddressOfCallbacks 0x45d010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section BSS has a size of 0! [*] Warning: Section .tls has a size of 0!