Play interactive tourEdit tour

Analysis Report PCHelpSoftDriverUpdater.exe

Overview

General Information

Sample Name:PCHelpSoftDriverUpdater.exe
Analysis ID:373291
MD5:f4b86e43f13c4e9600dc455531f5c83d
SHA1:06c5151bd700d3cf5e25f8bd891b7df0bf8055a4
SHA256:672325a3d825c1825ec3a9576b490b5fe6c5237a1a5e345c95234e9351f6d9c3
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • PCHelpSoftDriverUpdater.exe (PID: 6536 cmdline: 'C:\Users\user\Desktop\PCHelpSoftDriverUpdater.exe' MD5: F4B86E43F13C4E9600DC455531F5C83D)
  • cleanup

Malware Configuration

No configs have been found
SourceRuleDescriptionAuthorStrings
PCHelpSoftDriverUpdater.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.348011977.0000000000401000.00000020.00020000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      00000000.00000000.334331696.0000000000401000.00000020.00020000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        0.2.PCHelpSoftDriverUpdater.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          0.0.PCHelpSoftDriverUpdater.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted file
            Source: PCHelpSoftDriverUpdater.exeVirustotal: Detection: 10%Perma Link
            Source: PCHelpSoftDriverUpdater.exeReversingLabs: Detection: 17%
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: certificate valid
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: certificate valid
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://crl.globalsign.net/root.crl0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingg20
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt08
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://www.indyproject.org/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: http://www.pchelpsoft.com/images/build-phone-banners/phone_activation.png
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://cdn.pchelpsoft.com/pchelpsoft/PC_Cleaner.exeU
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-home.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-renew.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-support.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-uninstall.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-upsell.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver_updater_buy.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?redirectId=pchelpsoft/driver_updater_postinstall.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://webtools.avanquest.com/redirect.cfm?redirectId=pchelpsoft/driver_updater_update_param.htm
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.globalsign.com/repository/0
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.globalsign.com/repository/03
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.globalsign.com/repository/06
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/company/eula/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/company/eula/U
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/company/privacy-policy/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/company/privacy-policy/U
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/de/company/eula/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/de/company/privacy-policy/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/es/company/eula/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/es/company/privacy-policy/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/fr/company/eula/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/fr/company/privacy-policy/
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: https://www.pchelpsoft.com/product/pc-cleaner/
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (GUI) x86-64, for MS Windows
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PCHelpSoftDriverUpdater.exe, 00000000.00000002.351241548.0000000000A25000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamestub64.exeV vs PCHelpSoftDriverUpdater.exe
            Source: PCHelpSoftDriverUpdater.exeBinary or memory string: OriginalFilenamestub64.exeV vs PCHelpSoftDriverUpdater.exe
            Source: C:\Users\user\Desktop\PCHelpSoftDriverUpdater.exeSection loaded: sqlite3.dllJump to behavior
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
            Source: PCHelpSoftDriverUpdater.exeBinary string: \Device\HarddiskVolume
            Source: classification engineClassification label: mal48.winEXE@1/0@0/0
            Source: Yara matchFile source: PCHelpSoftDriverUpdater.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000002.348011977.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.334331696.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.2.PCHelpSoftDriverUpdater.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.PCHelpSoftDriverUpdater.exe.400000.0.unpack, type: UNPACKEDPE
            Source: C:\Users\user\Desktop\PCHelpSoftDriverUpdater.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: PCHelpSoftDriverUpdater.exeVirustotal: Detection: 10%
            Source: PCHelpSoftDriverUpdater.exeReversingLabs: Detection: 17%
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: NATS-SEFI-ADD
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: NATS-DANO-ADD
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: JIS_C6229-1984-b-add
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: jp-ocr-b-add
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: JIS_C6229-1984-hand-add
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: jp-ocr-hand-add
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: ISO_6937-2-add
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: ;application/vnd.adobe.air-application-installer-package+zip
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: application/vnd.groove-help
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: "application/x-install-instructions
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: 250-STARTTLS
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: 80-no-installed
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: /stat/install
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: /stat/install_ex
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: /stat/install_break
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: /install /quiet /norestart
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: ins+66.2-start-process
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: ins-63-install
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: CANCEL-INSTALLING
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: ins+65-installing
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: ins+67-installed
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: ins-69-install-finally
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: 20-update-started
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: 50-scan-started
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: new-10-start
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: old-10-startU
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: res-10-start-
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: restatus-19-installing-
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: 60-restore-started
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: 20-backup-started
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: 10-started
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: /INSTALL
            Source: PCHelpSoftDriverUpdater.exeString found in binary or memory: Start with /INSTALL
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: certificate valid
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: certificate valid
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: PCHelpSoftDriverUpdater.exeStatic file information: File size 7534336 > 1048576
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x577600
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x181200
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: More than 200 imports for user32.dll
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: PCHelpSoftDriverUpdater.exeStatic PE information: section name: .didata
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: PCHelpSoftDriverUpdater.exeBinary or memory string: VMware
            Source: PCHelpSoftDriverUpdater.exeBinary or memory string: VMware VMCI Host Device
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsCommand and Scripting Interpreter2DLL Side-Loading1DLL Side-Loading1DLL Side-Loading1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 373291 Sample: PCHelpSoftDriverUpdater.exe Startdate: 22/03/2021 Architecture: WINDOWS Score: 48 7 Multi AV Scanner detection for submitted file 2->7 5 PCHelpSoftDriverUpdater.exe 2->5         started        process3

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand
            SourceDetectionScannerLabelLink
            PCHelpSoftDriverUpdater.exe10%VirustotalBrowse
            PCHelpSoftDriverUpdater.exe3%MetadefenderBrowse
            PCHelpSoftDriverUpdater.exe18%ReversingLabsWin32.PUA.Avanquest
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.indyproject.org/0%URL Reputationsafe
            http://www.indyproject.org/0%URL Reputationsafe
            http://www.indyproject.org/0%URL Reputationsafe
            http://www.indyproject.org/0%URL Reputationsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.pchelpsoft.com/company/eula/UPCHelpSoftDriverUpdater.exefalse
              high
              https://www.pchelpsoft.comPCHelpSoftDriverUpdater.exefalse
                high
                https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-upsell.htmPCHelpSoftDriverUpdater.exefalse
                  high
                  https://www.pchelpsoft.com/product/pc-cleaner/PCHelpSoftDriverUpdater.exefalse
                    high
                    http://www.pchelpsoft.com/images/build-phone-banners/phone_activation.pngPCHelpSoftDriverUpdater.exefalse
                      high
                      https://webtools.avanquest.com/redirect.cfm?redirectId=pchelpsoft/driver_updater_update_param.htmPCHelpSoftDriverUpdater.exefalse
                        high
                        https://www.pchelpsoft.com/fr/company/privacy-policy/PCHelpSoftDriverUpdater.exefalse
                          high
                          https://www.pchelpsoft.com/de/company/eula/PCHelpSoftDriverUpdater.exefalse
                            high
                            https://cdn.pchelpsoft.com/pchelpsoft/PC_Cleaner.exeUPCHelpSoftDriverUpdater.exefalse
                              high
                              https://webtools.avanquest.com/redirect.cfm?redirectId=pchelpsoft/driver_updater_postinstall.htmPCHelpSoftDriverUpdater.exefalse
                                high
                                https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-renew.htmPCHelpSoftDriverUpdater.exefalse
                                  high
                                  http://schemas.xmlsoap.org/soap/envelope/PCHelpSoftDriverUpdater.exefalse
                                    high
                                    https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-uninstall.htmPCHelpSoftDriverUpdater.exefalse
                                      high
                                      https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-home.htmPCHelpSoftDriverUpdater.exefalse
                                        high
                                        https://www.pchelpsoft.com/company/privacy-policy/UPCHelpSoftDriverUpdater.exefalse
                                          high
                                          https://www.pchelpsoft.com/es/company/privacy-policy/PCHelpSoftDriverUpdater.exefalse
                                            high
                                            http://www.indyproject.org/PCHelpSoftDriverUpdater.exefalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://www.pchelpsoft.com/es/company/eula/PCHelpSoftDriverUpdater.exefalse
                                              high
                                              https://www.pchelpsoft.com/company/eula/PCHelpSoftDriverUpdater.exefalse
                                                high
                                                https://www.pchelpsoft.com/company/privacy-policy/PCHelpSoftDriverUpdater.exefalse
                                                  high
                                                  https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver_updater_buy.htmPCHelpSoftDriverUpdater.exefalse
                                                    high
                                                    https://www.pchelpsoft.com/de/company/privacy-policy/PCHelpSoftDriverUpdater.exefalse
                                                      high
                                                      https://www.pchelpsoft.com/fr/company/eula/PCHelpSoftDriverUpdater.exefalse
                                                        high
                                                        https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/driver-updater-5-support.htmPCHelpSoftDriverUpdater.exefalse
                                                          high
                                                          No contacted IP infos

                                                          General Information

                                                          Joe Sandbox Version:31.0.0 Emerald
                                                          Analysis ID:373291
                                                          Start date:22.03.2021
                                                          Start time:21:32:21
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 5m 48s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Sample file name:PCHelpSoftDriverUpdater.exe
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:21
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal48.winEXE@1/0@0/0
                                                          EGA Information:Failed
                                                          HDC Information:Failed
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 0
                                                          • Number of non-executed functions: 0
                                                          Cookbook Comments:
                                                          • Adjust boot time
                                                          • Enable AMSI
                                                          • Found application associated with file extension: .exe
                                                          Warnings:
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                          No simulations
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          No context
                                                          No created / dropped files found

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):6.444152498205596
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 98.45%
                                                          • Inno Setup installer (109748/4) 1.08%
                                                          • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          File name:PCHelpSoftDriverUpdater.exe
                                                          File size:7534336
                                                          MD5:f4b86e43f13c4e9600dc455531f5c83d
                                                          SHA1:06c5151bd700d3cf5e25f8bd891b7df0bf8055a4
                                                          SHA256:672325a3d825c1825ec3a9576b490b5fe6c5237a1a5e345c95234e9351f6d9c3
                                                          SHA512:2f129895ef233153357c5b5a68c95d318ffacb377f8eec5d96fc2db7942913bed3e965f5d8ab22290f9f6269dfd6e66af1f067ab8a32115a2385261b1dba6e35
                                                          SSDEEP:98304:1rop0DMd1ZeIGAfhV/G5WCM1om3R113aYskgzAaxXE8I+DP:18p0DMPZeIJb/domZ3Jj1z8IiP
                                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

                                                          File Icon

                                                          Icon Hash:62eececae6b6e120

                                                          General

                                                          Entrypoint:0x97e178
                                                          Entrypoint Section:.itext
                                                          Digitally signed:true
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x6022A598 [Tue Feb 9 15:09:12 2021 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:0
                                                          File Version Major:5
                                                          File Version Minor:0
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:0
                                                          Import Hash:13db1f725255bb231bd388e4cee83093
                                                          Signature Valid:true
                                                          Signature Issuer:CN=GlobalSign Extended Validation CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE
                                                          Signature Validation Error:The operation completed successfully
                                                          Error Number:0
                                                          Not Before, Not After
                                                          • 2/17/2020 1:34:33 PM 6/3/2021 11:15:28 AM
                                                          Subject Chain
                                                          • E=mark@pchelpsoft.com, CN=PC HelpSoft Labs Inc, OU=Software, O=PC HelpSoft Labs Inc, STREET=455 Sitkum Rd Unit 312, L=Victoria, S=British Columbia, C=CA, OID.1.3.6.1.4.1.311.60.2.1.2=British Columbia, OID.1.3.6.1.4.1.311.60.2.1.3=CA, SERIALNUMBER=0884553, OID.2.5.4.15=Private Organization
                                                          Version:3
                                                          Thumbprint MD5:D54A425613E3EF92B691C9F5D9CFC3C0
                                                          Thumbprint SHA-1:739339F5BFCE5D3D35306187EB565D5E3D153104
                                                          Thumbprint SHA-256:B4B17BB6152810B746E55E7B31946396BBD84F002FA677DD8F3A634E9468F258
                                                          Serial:726588307C76C615C7BE4882
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          mov ecx, 00000024h
                                                          push 00000000h
                                                          push 00000000h
                                                          dec ecx
                                                          jne 00007F71748844DBh
                                                          push ecx
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          mov eax, 009638C4h
                                                          call 00007F71743149A8h
                                                          xor eax, eax
                                                          push ebp
                                                          push 0097EA2Ah
                                                          push dword ptr fs:[eax]
                                                          mov dword ptr fs:[eax], esp
                                                          mov edx, 009ADDD0h
                                                          mov eax, 00000001h
                                                          call 00007F717430D38Fh
                                                          call 00007F7174844B12h
                                                          mov al, 01h
                                                          call 00007F71746ED067h
                                                          mov eax, dword ptr [009ADDD0h]
                                                          mov edx, 0097EA48h
                                                          call 00007F717431138Ch
                                                          jne 00007F717488451Ah
                                                          push 0097EA60h
                                                          push 00000000h
                                                          push 001F0001h
                                                          call 00007F71743186D5h
                                                          test eax, eax
                                                          jne 00007F7174884CE4h
                                                          push 0097EA60h
                                                          push 00000000h
                                                          push 00000000h
                                                          call 00007F71743180F7h
                                                          xor eax, eax
                                                          call 00007F71748422ACh
                                                          call 00007F7174868C03h
                                                          jmp 00007F7174884CC4h
                                                          mov eax, dword ptr [009ADDD0h]
                                                          mov edx, 0097EA94h
                                                          call 00007F7174311343h
                                                          jne 00007F7174884535h
                                                          push 0097EAB0h
                                                          push 00000000h
                                                          push 001F0001h
                                                          call 00007F717431868Ch
                                                          test eax, eax
                                                          jne 00007F7174884C9Bh
                                                          push 0097EAB0h
                                                          push 00000000h
                                                          push 00000000h
                                                          call 00007F71743180AEh
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x5b50000x99.edata
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5ae0000x5c7c.idata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b80000x181200.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x72bc000x3b00.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x5b70000x18.rdata
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x5af1380xdf0.idata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x5b40000xebe.didata
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x5774700x577600unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .itext0x5790000x5f2c0x6000False0.441284179688data6.08033157391IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .data0x57f0000x25cf40x25e00False0.333049711221data5.75668513604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                          .bss0x5a50000x8ea80x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                          .idata0x5ae0000x5c7c0x5e00False0.299825465426data5.25983356278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                          .didata0x5b40000xebe0x1000False0.32177734375data4.00225783822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                          .edata0x5b50000x990x200False0.265625data1.88445853555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .tls0x5b60000x64c0x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                          .rdata0x5b70000x5d0x200False0.193359375data1.37922570427IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .rsrc0x5b80000x1812000x181200False0.378956330128data6.52299052797IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountry
                                                          RT_CURSOR0x5bbc840x134dataEnglishUnited States
                                                          RT_CURSOR0x5bbdb80x134dataEnglishUnited States
                                                          RT_CURSOR0x5bbeec0x134dataEnglishUnited States
                                                          RT_CURSOR0x5bc0200x134dataEnglishUnited States
                                                          RT_CURSOR0x5bc1540x134dataEnglishUnited States
                                                          RT_CURSOR0x5bc2880x134dataEnglishUnited States
                                                          RT_CURSOR0x5bc3bc0x134dataEnglishUnited States
                                                          RT_BITMAP0x5bc4f00x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bc6c00x1e4dataEnglishUnited States
                                                          RT_BITMAP0x5bc8a40x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bca740x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bcc440x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bce140x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bcfe40x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bd1b40x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bd3840x1d0dataEnglishUnited States
                                                          RT_BITMAP0x5bd5540x1d0dataEnglishUnited States
                                                          RT_ICON0x5bd7240x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
                                                          RT_ICON0x5c194c0x25a8dataEnglishUnited States
                                                          RT_ICON0x5c3ef40x10a8dataEnglishUnited States
                                                          RT_ICON0x5c4f9c0x988dataEnglishUnited States
                                                          RT_ICON0x5c59240x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                          RT_STRING0x5c5d8c0x284data
                                                          RT_STRING0x5c60100x2b0data
                                                          RT_STRING0x5c62c00x468data
                                                          RT_STRING0x5c67280x55cdata
                                                          RT_STRING0x5c6c840xb04data
                                                          RT_STRING0x5c77880x77cdata
                                                          RT_STRING0x5c7f040x420data
                                                          RT_STRING0x5c83240x898data
                                                          RT_STRING0x5c8bbc0x106cdata
                                                          RT_STRING0x5c9c280x9f8data
                                                          RT_STRING0x5ca6200x894data
                                                          RT_STRING0x5caeb40x87cdata
                                                          RT_STRING0x5cb7300x400data
                                                          RT_STRING0x5cbb300x2ccdata
                                                          RT_STRING0x5cbdfc0x3dcdata
                                                          RT_STRING0x5cc1d80x404data
                                                          RT_STRING0x5cc5dc0x600data
                                                          RT_STRING0x5ccbdc0x3c8data
                                                          RT_STRING0x5ccfa40x48cdata
                                                          RT_STRING0x5cd4300x428data
                                                          RT_STRING0x5cd8580x34cdata
                                                          RT_STRING0x5cdba40x390data
                                                          RT_STRING0x5cdf340x288data
                                                          RT_STRING0x5ce1bc0x4b0data
                                                          RT_STRING0x5ce66c0x49cdata
                                                          RT_STRING0x5ceb080x34cdata
                                                          RT_STRING0x5cee540x368data
                                                          RT_STRING0x5cf1bc0xacdata
                                                          RT_STRING0x5cf2680x15cdata
                                                          RT_STRING0x5cf3c40x108data
                                                          RT_STRING0x5cf4cc0x494data
                                                          RT_STRING0x5cf9600x3ccdata
                                                          RT_STRING0x5cfd2c0x45cdata
                                                          RT_STRING0x5d01880x350data
                                                          RT_STRING0x5d04d80x3e0data
                                                          RT_STRING0x5d08b80x600data
                                                          RT_STRING0x5d0eb80x43cdata
                                                          RT_STRING0x5d12f40x388data
                                                          RT_STRING0x5d167c0x374data
                                                          RT_STRING0x5d19f00x450data
                                                          RT_STRING0x5d1e400x138data
                                                          RT_STRING0x5d1f780xccdata
                                                          RT_STRING0x5d20440x1f8data
                                                          RT_STRING0x5d223c0x40cdata
                                                          RT_STRING0x5d26480x384data
                                                          RT_STRING0x5d29cc0x310data
                                                          RT_STRING0x5d2cdc0x334data
                                                          RT_RCDATA0x5d30100xfcPNG image data, 240 x 24, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d310c0xf4PNG image data, 140 x 28, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d32000x12bPNG image data, 250 x 45, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d332c0xf4PNG image data, 152 x 29, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d34200x158PNG image data, 200 x 45, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d35780xedPNG image data, 99 x 29, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d36680xbcPNG image data, 99 x 29, 4-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d37240x1fbPNG image data, 22 x 22, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d39200x19aPNG image data, 676 x 51, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d3abc0xb64PNG image data, 152 x 29, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d46200x10bPNG image data, 200 x 45, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d472c0x100PNG image data, 99 x 29, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d482c0x10bPNG image data, 229 x 32, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d49380xc21PNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d555c0xc2ePNG image data, 17 x 19, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d618c0xbe9PNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d6d780xc1fPNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d79980x4d2PNG image data, 20 x 20, 8-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d7e6c0x240PNG image data, 20 x 20, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d80ac0xb17PNG image data, 17 x 19, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d8bc40x5c7dataEnglishUnited States
                                                          RT_RCDATA0x5d918c0x10data
                                                          RT_RCDATA0x5d919c0x132PNG image data, 212 x 50, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5d92d00xf99PNG image data, 800 x 606, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5da26c0x7b4PNG image data, 500 x 500, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5daa200x6c7PNG image data, 500 x 375, 8-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5db0e80x69aPNG image data, 400 x 460, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5db7840x3a4PNG image data, 350 x 260, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dbb280x34ePNG image data, 350 x 230, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dbe780x56ePNG image data, 380 x 210, 8-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dc3e80x3e9PNG image data, 450 x 250, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dc7d40x4f6PNG image data, 510 x 310, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dcccc0x52ePNG image data, 450 x 350, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dd1fc0x650PNG image data, 500 x 300, 8-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dd84c0x564PNG image data, 588 x 315, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5dddb00x2cbPNG image data, 680 x 260, 4-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5de07c0x743PNG image data, 680 x 350, 8-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5de7c00x3018PNG image data, 500 x 457, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e17d80x323aPNG image data, 684 x 457, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e4a140x5ccPNG image data, 820 x 568, 4-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e4fe00x649PNG image data, 850 x 624, 4-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e562c0x1046PNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e66740x1059PNG image data, 50 x 50, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e76d00x397PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e7a680xfcdPNG image data, 40 x 47, 8-bit/color RGBA, interlacedRussianRussia
                                                          RT_RCDATA0x5e8a380xeecPNG image data, 40 x 43, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5e99240x10b0PNG image data, 40 x 43, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5ea9d40x104bPNG image data, 40 x 43, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5eba200xf24PNG image data, 40 x 43, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5ec9440x5d2PNG image data, 40 x 40, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5ecf180x317PNG image data, 27 x 27, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5ed2300x286fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5efaa00x3288PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f2d280xef1PNG image data, 40 x 44, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f3c1c0x7eaPNG image data, 40 x 40, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f44080xfa3PNG image data, 40 x 43, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f53ac0xdd5PNG image data, 40 x 43, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f61840x1f8PNG image data, 28 x 28, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f637c0x710PNG image data, 40 x 40, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f6a8c0x10e6PNG image data, 50 x 50, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f7b740x10d8PNG image data, 61 x 48, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f8c4c0xf7aPNG image data, 40 x 47, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5f9bc80xedaPNG image data, 40 x 43, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5faaa40x13c3PNG image data, 48 x 49, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x5fbe680x51b1PNG image data, 250 x 250, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x60101c0xe7cPNG image data, 115 x 26, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x601e980x1bc8data
                                                          RT_RCDATA0x603a600x85ePNG image data, 760 x 450, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6042c00x7d3PNG image data, 750 x 200, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x604a940xecbPNG image data, 760 x 210, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x6059600x862PNG image data, 760 x 450, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6061c40x627PNG image data, 720 x 330, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6067ec0x62ePNG image data, 720 x 330, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x606e1c0x62dPNG image data, 720 x 330, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x60744c0x2294PNG image data, 243 x 50, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x6096e00x22ebPNG image data, 325 x 48, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x60b9cc0x179PNG image data, 765 x 45, 8-bit/color RGBA, non-interlacedRussianRussia
                                                          RT_RCDATA0x60bb480x5891PNG image data, 717 x 321, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6113dc0xad6PNG image data, 790 x 450, 8-bit colormap, non-interlacedRussianRussia
                                                          RT_RCDATA0x611eb40x25cPNG image data, 225 x 53, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6121100x57600PE32+ executable (GUI) x86-64, for MS WindowsRussianRussia
                                                          RT_RCDATA0x6697100xc07PNG image data, 285 x 33, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x66a3180xc10PNG image data, 285 x 33, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x66af280x1b2dPNG image data, 509 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x66ca580x1bbePNG image data, 509 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x66e6180x1aacPNG image data, 509 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6700c40x1b06PNG image data, 509 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x671bcc0x120bPNG image data, 509 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x672dd80x1dd9PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x674bb40x1e14PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6769c80x1d64PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x67872c0x1d19PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x67a4480x1ddfPNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x67c2280x14baPNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x67d6e40x1dd9PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x67f4c00x1e14PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6812d40x1d64PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6830380x1d19PNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x684d540x1ddfPNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x686b340x14baPNG image data, 636 x 35, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x687ff00x15b8PNG image data, 425 x 33, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x6895a80x165ePNG image data, 425 x 33, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x68ac080x15fcPNG image data, 425 x 33, 8-bit/color RGB, non-interlacedRussianRussia
                                                          RT_RCDATA0x68c2040x132Delphi compiled form 'TColection_Main_Form'
                                                          RT_RCDATA0x68c3380x7dbDelphi compiled form 'TDebugForm'
                                                          RT_RCDATA0x68cb140xd98dDelphi compiled form 'TForm1a'
                                                          RT_RCDATA0x69a4a40xdd9Delphi compiled form 'TForm2b'
                                                          RT_RCDATA0x69b2800x12ebDelphi compiled form 'TForm2b2'
                                                          RT_RCDATA0x69c56c0x92aDelphi compiled form 'TForm2c1'
                                                          RT_RCDATA0x69ce980x765Delphi compiled form 'TForm2c2'
                                                          RT_RCDATA0x69d6000x53cDelphi compiled form 'TForm3a'
                                                          RT_RCDATA0x69db3c0x774Delphi compiled form 'TForm3b'
                                                          RT_RCDATA0x69e2b00xabd4Delphi compiled form 'TForm3c'
                                                          RT_RCDATA0x6a8e840x779Delphi compiled form 'TForm3e'
                                                          RT_RCDATA0x6a96000xbdfDelphi compiled form 'TForm4c'
                                                          RT_RCDATA0x6aa1e00x2430Delphi compiled form 'TForm6a'
                                                          RT_RCDATA0x6ac6100x2deeDelphi compiled form 'TForm7a'
                                                          RT_RCDATA0x6af4000x10aa9Delphi compiled form 'TForm8a'
                                                          RT_RCDATA0x6bfeac0xba7Delphi compiled form 'TForm8b'
                                                          RT_RCDATA0x6c0a540x842Delphi compiled form 'TForm8c'
                                                          RT_RCDATA0x6c12980x211c0Delphi compiled form 'TForm8d'
                                                          RT_RCDATA0x6e24580xe21Delphi compiled form 'TFormDM'
                                                          RT_RCDATA0x6e327c0x1913Delphi compiled form 'TFormF1'
                                                          RT_RCDATA0x6e4b900x1385Delphi compiled form 'TFormF2'
                                                          RT_RCDATA0x6e5f180x1f71Delphi compiled form 'TFormF3'
                                                          RT_RCDATA0x6e7e8c0x52dDelphi compiled form 'TFormF4'
                                                          RT_RCDATA0x6e83bc0xf84Delphi compiled form 'TFormFreeDownload'
                                                          RT_RCDATA0x6e93400x7b4Delphi compiled form 'TFormFreeStart'
                                                          RT_RCDATA0x6e9af40x22f1Delphi compiled form 'TFormUpdates'
                                                          RT_RCDATA0x6ebde80x81fDelphi compiled form 'TfrmBackupConfirm'
                                                          RT_RCDATA0x6ec6080x996Delphi compiled form 'TfrmBackupMain'
                                                          RT_RCDATA0x6ecfa00xa0fDelphi compiled form 'TfrmBackupSelectMain'
                                                          RT_RCDATA0x6ed9b00x220dDelphi compiled form 'TfrmCacheCleaner'
                                                          RT_RCDATA0x6efbc00x178Delphi compiled form 'TfrmCheckURL'
                                                          RT_RCDATA0x6efd380x1048Delphi compiled form 'TfrmCtaBig'
                                                          RT_RCDATA0x6f0d800x1ecbDelphi compiled form 'TfrmExit'
                                                          RT_RCDATA0x6f2c4c0x1508Delphi compiled form 'TfrmExpired'
                                                          RT_RCDATA0x6f41540x195a4Delphi compiled form 'TfrmExpiredSoon'
                                                          RT_RCDATA0x70d6f80x104dDelphi compiled form 'TfrmFreeCTA'
                                                          RT_RCDATA0x70e7480x6335Delphi compiled form 'TfrmHistory'
                                                          RT_RCDATA0x714a800x6fc8Delphi compiled form 'TfrmMain'
                                                          RT_RCDATA0x71ba480x15bfDelphi compiled form 'TfrmProFeaturesForm'
                                                          RT_RCDATA0x71d0080xc83Delphi compiled form 'TfrmRegister'
                                                          RT_RCDATA0x71dc8c0x7fe3Delphi compiled form 'TfrmResult'
                                                          RT_RCDATA0x725c700x3cc3Delphi compiled form 'TfrmStartScreen'
                                                          RT_RCDATA0x7299340x1b07Delphi compiled form 'TfrmStartScreenLite'
                                                          RT_RCDATA0x72b43c0x26e3Delphi compiled form 'TfrmSubCta'
                                                          RT_RCDATA0x72db200x776Delphi compiled form 'TfrmSubResultMain'
                                                          RT_RCDATA0x72e2980xf26Delphi compiled form 'TfrmViewRepair'
                                                          RT_RCDATA0x72f1c00x24ecDelphi compiled form 'TfrmViewRepairBig'
                                                          RT_RCDATA0x7316ac0xf86Delphi compiled form 'TfrmViewRepairCTA'
                                                          RT_RCDATA0x7326340xf7dGIF image data, version 89a, 48 x 48EnglishUnited States
                                                          RT_RCDATA0x7335b40x40abGIF image data, version 89a, 48 x 48RussianRussia
                                                          RT_RCDATA0x7376600x110fdataEnglishUnited States
                                                          RT_GROUP_CURSOR0x7387700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                          RT_GROUP_CURSOR0x7387840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                          RT_GROUP_CURSOR0x7387980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                          RT_GROUP_CURSOR0x7387ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                          RT_GROUP_CURSOR0x7387c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                          RT_GROUP_CURSOR0x7387d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                          RT_GROUP_CURSOR0x7387e80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                                          RT_GROUP_ICON0x7387fc0x4cdataEnglishUnited States
                                                          RT_VERSION0x7388480x3a4dataEnglishUnited States
                                                          RT_MANIFEST0x738bec0x583XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminatorsRussianRussia
                                                          DLLImport
                                                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                          advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                          user32.dllCharNextW, LoadStringW
                                                          kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsDBCSLeadByteEx, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetConsoleOutputCP, GetConsoleCP, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, SetCurrentDirectoryW, GetCurrentDirectoryW, RemoveDirectoryW, WriteFile, SetFilePointer, SetEndOfFile, ReadFile, GetFileType, GetFileSize, CreateFileW, GetStdHandle, CloseHandle
                                                          kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
                                                          user32.dllSetClassLongW, GetClassLongW, SetWindowLongW, GetWindowLongW, CreateWindowExA, CreateWindowExW, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindowAsync, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextA, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageTimeoutA, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassA, RegisterClassW, RedrawWindow, PostThreadMessageA, PostThreadMessageW, PostQuitMessage, PostMessageA, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MoveWindow, MessageBoxA, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LockWindowUpdate, LoadStringW, LoadKeyboardLayoutW, LoadImageA, LoadImageW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericW, IsCharAlphaW, InvalidateRect, InsertMenuItemW, InsertMenuW, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextA, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageExtraInfo, GetMessageA, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowA, FindWindowW, FillRect, ExitWindowsEx, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextA, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CountClipboardFormats, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcA, CallWindowProcW, CallNextHookEx, BringWindowToTop, BeginPaint, AttachThreadInput, AdjustWindowRectEx, ActivateKeyboardLayout
                                                          gdi32.dllUnrealizeObject, TextOutA, TextOutW, StretchDIBits, StretchBlt, StartPage, StartDocA, StartDocW, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextFaceA, GetTextExtentPointW, GetTextExtentPoint32A, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExcludeClipRect, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgnIndirect, CreateRectRgn, CreatePenIndirect, CreatePen, CreatePalette, CreateHalftonePalette, CreateFontIndirectW, CreateFontA, CreateFontW, CreateEnhMetaFileW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CombineRgn, CloseEnhMetaFile, Chord, BitBlt, ArcTo, Arc, AngleArc
                                                          version.dllVerQueryValueA, VerQueryValueW, GetFileVersionInfoSizeA, GetFileVersionInfoSizeW, GetFileVersionInfoA, GetFileVersionInfoW
                                                          kernel32.dlllstrlenW, lstrcmpiW, lstrcmpA, lstrcmpW, WritePrivateProfileStringW, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, VerLanguageNameW, UnmapViewOfFile, TerminateThread, TerminateProcess, SystemTimeToFileTime, SwitchToThread, SuspendThread, SleepEx, Sleep, SizeofResource, SetUnhandledExceptionFilter, SetThreadPriority, SetThreadLocale, SetNamedPipeHandleState, SetLastError, SetFilePointer, SetFileAttributesA, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryW, ResumeThread, ResetEvent, RemoveDirectoryA, RemoveDirectoryW, ReleaseMutex, ReadProcessMemory, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, QueryDosDeviceW, IsDebuggerPresent, OutputDebugStringW, OpenProcess, OpenMutexW, OpenFileMappingA, OpenFileMappingW, MultiByteToWideChar, MulDiv, MoveFileExW, MoveFileW, MapViewOfFile, LockResource, LocalSize, LocalFree, LocalAlloc, LoadResource, LoadLibraryA, LoadLibraryW, LoadLibraryExA, LoadLibraryExW, LeaveCriticalSection, LCMapStringW, IsValidLocale, IsBadReadPtr, InitializeCriticalSection, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalMemoryStatusEx, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetWindowsDirectoryA, GetWindowsDirectoryW, GetVolumeInformationW, GetVersionExA, GetVersionExW, GetVersion, GetUserDefaultLCID, GetUserDefaultUILanguage, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetThreadContext, GetTempPathA, GetTempPathW, GetSystemTime, GetSystemInfo, GetSystemDirectoryW, GetSystemDefaultUILanguage, GetStdHandle, GetProcessTimes, GetProcAddress, GetPrivateProfileStringW, GetModuleHandleA, GetModuleHandleW, GetModuleFileNameA, GetModuleFileNameW, GetLogicalDrives, GetLogicalDriveStringsW, GetLocaleInfoA, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileTime, GetFileSize, GetFileAttributesA, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableW, GetDriveTypeW, GetDiskFreeSpaceA, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryA, GetCurrentDirectoryW, GetComputerNameA, GetComputerNameW, GetCommandLineA, GetCommandLineW, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, InterlockedCompareExchange, FreeLibrary, FormatMessageA, FormatMessageW, FlushInstructionCache, FindResourceA, FindResourceW, FindNextFileA, FindNextFileW, FindFirstFileA, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExpandEnvironmentStringsA, ExpandEnvironmentStringsW, ExitThread, ExitProcess, EnumCalendarInfoW, EnterCriticalSection, DuplicateHandle, DeviceIoControl, DeleteFileA, DeleteFileW, DeleteCriticalSection, CreateThread, CreateProcessA, CreateProcessW, CreatePipe, CreateMutexA, CreateMutexW, CreateFileMappingA, CreateFileMappingW, CreateFileA, CreateFileW, CreateEventA, CreateEventW, CreateDirectoryA, CreateDirectoryW, CopyFileA, CopyFileW, CompareStringW, CloseHandle, Beep
                                                          advapi32.dllSetSecurityDescriptorDacl, RegSetValueExA, RegSetValueExW, RegQueryValueExA, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExA, RegOpenKeyExW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueA, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExA, RegCreateKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW, InitializeSecurityDescriptor, GetUserNameA, GetUserNameW, GetTokenInformation, FreeSid, AllocateAndInitializeSid, AdjustTokenPrivileges
                                                          IMAGEHLP.DLLImageRvaToVa, ImageNtHeader
                                                          SHFolder.dllSHGetFolderPathW
                                                          kernel32.dllSleep
                                                          netapi32.dllNetWkstaGetInfo
                                                          oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                                          oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, GetActiveObject, SysFreeString, SysAllocString
                                                          ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, OleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CLSIDFromProgID, ProgIDFromCLSID, StringFromCLSID, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitializeEx, CoInitialize, IsEqualGUID
                                                          comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                                          user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
                                                          msvcrt.dllisxdigit, isupper, isspace, ispunct, isprint, islower, isgraph, isdigit, iscntrl, isalpha, isalnum, toupper, tolower, strchr, strlen, strncmp, memset, memcpy, memcmp
                                                          shell32.dllSHFileOperationW, ShellExecuteExA, ShellExecuteExW, ShellExecuteA, ShellExecuteW, Shell_NotifyIconW, ExtractIconW
                                                          wininet.dllInternetGetConnectedState, InternetSetStatusCallback, InternetSetOptionW, InternetSetFilePointer, InternetReadFile, InternetQueryOptionW, InternetOpenW, InternetGetLastResponseInfoW, InternetConnectW, InternetCloseHandle, HttpSendRequestW, HttpQueryInfoW, HttpOpenRequestW, HttpAddRequestHeadersW
                                                          shell32.dllSHGetPathFromIDListW, SHGetDesktopFolder, SHBrowseForFolderW
                                                          comdlg32.dllPrintDlgW, GetSaveFileNameA, GetSaveFileNameW
                                                          advapi32.dllLookupAccountSidW, AllocateAndInitializeSid
                                                          ntdll.dllRtlGetNtVersionNumbers, NtQueryInformationProcess
                                                          crypt32.dllCryptQueryObject, CertGetNameStringW, CertFindAttribute, CertFreeCTLContext, CertFreeCertificateContext, CertFindCertificateInStore, CertCloseStore, CertOpenStore, CryptMsgGetParam, CryptMsgUpdate, CryptMsgClose, CryptMsgOpenToDecode
                                                          advapi32.dllCryptDestroyHash, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextW
                                                          wsock32.dllWSACleanup, WSAStartup, WSAGetLastError, gethostbyname, socket, setsockopt, sendto, send, select, recvfrom, recv, ioctlsocket, inet_ntoa, inet_addr, htons, connect, closesocket, bind
                                                          winhttp.dllWinHttpWriteData, WinHttpSetOption, WinHttpSetCredentials, WinHttpSendRequest, WinHttpReceiveResponse, WinHttpReadData, WinHttpQueryOption, WinHttpQueryHeaders, WinHttpQueryDataAvailable, WinHttpQueryAuthSchemes, WinHttpOpenRequest, WinHttpOpen, WinHttpGetProxyForUrl, WinHttpGetIEProxyConfigForCurrentUser, WinHttpConnect, WinHttpCloseHandle, WinHttpAddRequestHeaders
                                                          iphlpapi.dllGetIpAddrTable
                                                          iphlpapi.dllIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                          kernel32.dllRtlUnwind
                                                          shell32.dllSHGetPathFromIDListA, SHGetSpecialFolderLocation, SHGetMalloc
                                                          sqlite3.dllsqlite3_finalize, sqlite3_column_type, sqlite3_column_text, sqlite3_column_int, sqlite3_column_double, sqlite3_column_bytes, sqlite3_column_blob, sqlite3_step, sqlite3_column_decltype, sqlite3_column_name, sqlite3_column_count, sqlite3_prepare, sqlite3_free, sqlite3_errcode, sqlite3_errmsg, sqlite3_close, sqlite3_open
                                                          advapi32.dllStartServiceW, QueryServiceStatus, QueryServiceConfigW, OpenServiceW, OpenSCManagerW, EnumServicesStatusExW, EnumDependentServicesW, ControlService, CloseServiceHandle, ChangeServiceConfigW
                                                          kernel32.dllGetProcessId
                                                          kernel32.dllGlobalMemoryStatusEx
                                                          Wintrust.dllCryptCATEnumerateCatAttr, CryptCATEnumerateAttr, CryptCATEnumerateMember, CryptCATClose, CryptCATOpen
                                                          winmm.dlltimeGetTime
                                                          crtdll.dllisprint, tolower, isspace
                                                          NameOrdinalAddress
                                                          TMethodImplementationIntercept20x45e9f8
                                                          dbkFCallWrapperAddr10x9a7c5c
                                                          madTraceProcess30x722cdc
                                                          DescriptionData
                                                          LegalCopyrightCopyright 2021 PC HelpSoft
                                                          InternalNamePC HelpSoft Driver Updater
                                                          FileVersion5.3.524
                                                          CompanyNamePC HelpSoft
                                                          LegalTrademarksCopyright 2021 PC HelpSoft
                                                          ProductNamePC HelpSoft Driver Updater
                                                          ProductVersion5.3.524
                                                          FileDescriptionPC HelpSoft Driver Updater
                                                          OriginalFilenamePCHelpSoftDriverUpdater.exe
                                                          Translation0x0409 0x04e4
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          RussianRussia

                                                          Network Behavior

                                                          No network behavior found

                                                          Code Manipulations

                                                          Statistics

                                                          CPU Usage

                                                          050100s020406080100

                                                          Click to jump to process

                                                          Memory Usage

                                                          050100s0.00510MB

                                                          Click to jump to process

                                                          System Behavior

                                                          Start time:21:33:14
                                                          Start date:22/03/2021
                                                          Path:C:\Users\user\Desktop\PCHelpSoftDriverUpdater.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\PCHelpSoftDriverUpdater.exe'
                                                          Imagebase:0x400000
                                                          File size:7534336 bytes
                                                          MD5 hash:F4B86E43F13C4E9600DC455531F5C83D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000002.348011977.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.334331696.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          Disassembly

                                                          Code Analysis