Static | ZeroBOX

PE Compile Time

2013-12-25 14:01:44

PE Imphash

7ed0d71376e55d58ab36dc7d3ffda898

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000606c 0x00006200 6.45706798539
.rdata 0x00008000 0x00001460 0x00001600 4.94596488017
.data 0x0000a000 0x0002af98 0x00000600 3.79535275003
.ndata 0x00035000 0x00055000 0x00000000 0.0
.rsrc 0x0008a000 0x00003428 0x00003600 4.90448180518

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0008a1d8 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0008ca80 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0008ca80 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0008ca80 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0008cb70 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0008cb88 0x00000440 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0008cfc8 0x0000045e LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x408060 CompareFileTime
0x408064 SearchPathW
0x408068 SetFileTime
0x40806c CloseHandle
0x408070 GetShortPathNameW
0x408074 MoveFileW
0x40807c GetFileAttributesW
0x408080 GetLastError
0x408084 GetFullPathNameW
0x408088 CreateDirectoryW
0x40808c Sleep
0x408090 GetTickCount
0x408094 GetFileSize
0x408098 GetModuleFileNameW
0x40809c GetCurrentProcess
0x4080a0 CopyFileW
0x4080a4 ExitProcess
0x4080b0 GetTempPathW
0x4080b4 SetFileAttributesW
0x4080bc LoadLibraryW
0x4080c0 lstrlenW
0x4080c4 lstrcpynW
0x4080c8 GetDiskFreeSpaceW
0x4080cc GlobalUnlock
0x4080d0 GlobalLock
0x4080d4 CreateThread
0x4080d8 CreateProcessW
0x4080dc RemoveDirectoryW
0x4080e0 lstrcmpiA
0x4080e4 CreateFileW
0x4080e8 GetTempFileNameW
0x4080ec lstrcpyA
0x4080f0 lstrcpyW
0x4080f4 lstrcatW
0x4080f8 GetSystemDirectoryW
0x4080fc GetVersion
0x408100 GetProcAddress
0x408104 LoadLibraryA
0x408108 GetModuleHandleA
0x40810c GetModuleHandleW
0x408110 lstrcmpiW
0x408114 lstrcmpW
0x408118 WaitForSingleObject
0x40811c GlobalFree
0x408120 GlobalAlloc
0x408124 LoadLibraryExW
0x408128 GetExitCodeProcess
0x40812c FreeLibrary
0x408134 SetErrorMode
0x408138 GetCommandLineW
0x408140 FindFirstFileW
0x408144 FindNextFileW
0x408148 DeleteFileW
0x40814c SetFilePointer
0x408150 ReadFile
0x408154 FindClose
0x408158 MulDiv
0x40815c MultiByteToWideChar
0x408160 WriteFile
0x408164 lstrlenA
0x408168 WideCharToMultiByte
Library USER32.dll:
0x40818c EndDialog
0x408190 ScreenToClient
0x408194 GetWindowRect
0x408198 RegisterClassW
0x40819c EnableMenuItem
0x4081a0 GetSystemMenu
0x4081a4 SetClassLongW
0x4081a8 IsWindowEnabled
0x4081ac SetWindowPos
0x4081b0 GetSysColor
0x4081b4 GetWindowLongW
0x4081b8 SetCursor
0x4081bc LoadCursorW
0x4081c0 CheckDlgButton
0x4081c4 GetMessagePos
0x4081c8 LoadBitmapW
0x4081cc CallWindowProcW
0x4081d0 IsWindowVisible
0x4081d4 CloseClipboard
0x4081d8 SetClipboardData
0x4081dc wsprintfW
0x4081e0 CreateWindowExW
0x4081e8 AppendMenuW
0x4081ec CreatePopupMenu
0x4081f0 GetSystemMetrics
0x4081f4 SetDlgItemTextW
0x4081f8 GetDlgItemTextW
0x4081fc MessageBoxIndirectW
0x408200 CharPrevW
0x408204 CharNextA
0x408208 wsprintfA
0x40820c DispatchMessageW
0x408210 PeekMessageW
0x408214 ReleaseDC
0x408218 EnableWindow
0x40821c InvalidateRect
0x408220 SendMessageW
0x408224 DefWindowProcW
0x408228 BeginPaint
0x40822c GetClientRect
0x408230 FillRect
0x408234 DrawTextW
0x408238 GetClassInfoW
0x40823c DialogBoxParamW
0x408240 CharNextW
0x408244 ExitWindowsEx
0x408248 DestroyWindow
0x40824c CreateDialogParamW
0x408250 SetTimer
0x408254 SetWindowTextW
0x408258 PostQuitMessage
0x40825c GetDC
0x408260 SetWindowLongW
0x408264 LoadImageW
0x408268 SendMessageTimeoutW
0x40826c FindWindowExW
0x408270 EmptyClipboard
0x408274 OpenClipboard
0x408278 TrackPopupMenu
0x40827c EndPaint
0x408280 ShowWindow
0x408284 GetDlgItem
0x408288 IsWindow
0x40828c SetForegroundWindow
Library GDI32.dll:
0x40803c SelectObject
0x408040 SetBkMode
0x408044 CreateFontIndirectW
0x408048 SetTextColor
0x40804c DeleteObject
0x408050 GetDeviceCaps
0x408054 CreateBrushIndirect
0x408058 SetBkColor
Library SHELL32.dll:
0x408178 SHBrowseForFolderW
0x40817c SHGetFileInfoW
0x408180 ShellExecuteW
0x408184 SHFileOperationW
Library ADVAPI32.dll:
0x408000 RegCloseKey
0x408004 RegOpenKeyExW
0x408008 RegDeleteKeyW
0x40800c RegDeleteValueW
0x408010 RegEnumValueW
0x408014 RegCreateKeyExW
0x408018 RegSetValueExW
0x40801c RegQueryValueExW
0x408020 RegEnumKeyW
Library COMCTL32.dll:
0x408028 ImageList_Create
0x40802c ImageList_AddMasked
0x408030 ImageList_Destroy
0x408034 None
Library ole32.dll:
0x4082a4 CoCreateInstance
0x4082a8 CoTaskMemFree
0x4082ac OleInitialize
0x4082b0 OleUninitialize
Library VERSION.dll:
0x408298 GetFileVersionInfoW
0x40829c VerQueryValueW

!This program cannot be run in DOS mode.
*jRichu
`.rdata
@.data
.ndata
SQSSSPW
v#Vh},@
Instu`
softuW
NulluN
SUVWj 3
@j"@^f
D$$Ph0
D$(UPU
D$$+D$
D$,+D$$P
u49-,OC
PPPPPP
\u f9O
90u'AAf
HtVHtHH
MulDiv
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
ReadFile
MultiByteToWideChar
WriteFile
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
LoadLibraryW
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcpyA
lstrcpyW
lstrcatW
GetSystemDirectoryW
GetVersion
GetProcAddress
LoadLibraryA
GetModuleHandleA
KERNEL32.dll
EndPaint
DrawTextW
FillRect
GetClientRect
BeginPaint
DefWindowProcW
SendMessageW
InvalidateRect
EnableWindow
ReleaseDC
LoadImageW
SetWindowLongW
GetDlgItem
IsWindow
FindWindowExW
SendMessageTimeoutW
wsprintfW
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextW
SetTimer
CreateDialogParamW
DestroyWindow
ExitWindowsEx
CharNextW
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHELL32.dll
RegEnumValueW
RegEnumKeyW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VERSION.dll
SHGetFolderPathW
SHFOLDER
SHAutoComplete
SHLWAPI
GetUserDefaultUILanguage
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyExW
ADVAPI32
MoveFileExW
GetDiskFreeSpaceExW
KERNEL32
[Rename]
%ls=%ls
333N443
333M444
333M443
333L444
333M443
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0a2</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supp
NullsoftInstX
pM$:cm
Hp19]e
|@|kqV
e`<YC:K>
w$\6!\
s?2Wp?^
W/k=m*+
lOYq]|
ok9(kq
$c3uiit
a3`{$2
Qh[y>*
<o <sv
\N#\B{B
.!2\AdP&*J
F?/nO4/H
?k!z>zh
_%61Gb
#2,@dX
NJd8}@
b}V>./[
grLAdW
W4}n py
v'pIF
o2,@d8
^X~<~
lW.q[j
o[HMV?3
|\'3{
S8<;T[
e5l"/#
6n,/1Y
!6:B8{
4-\2q~>
&Iwv46
l{~#];
Cw:P]oj-
hK9xW9
|uoQ:/o
]{eyiS
p*W3^:&
dVWY'iV
~"vs^CD
5fwGkO
V,D)P<D
8)QJGF
6-wAff
L\_xG4
A3w-5!h
@sS\-Z?G
>-/=/#
3]3.o|v
+QKE3>
eVck+!}
,O[~ay
N.-*]P
LpLvlt
'UWOZO
VPV5,
kuM$V-8
WKpWR\
(WEy!rP
S9-6;4
qciQ~d
vu\XC\
m&aT|-4
\u5*a
Z]#VQZ
eaz#5*
\E2%+Y
TmBMGb.
jK1^pRd
H3S83fL,PW
cz8>M|M
3 uq=|q
^i?x<|
aHA`fj(
Je@W!$
'or\xx
{J^avc
G/:`cwaI
axy9(&B
hB[t2:
Cq|'m#u
nlBC*-
$%rQ_s
iGU"rT
aaB;[q
vv:NoN
NG.Sd
bo y
;++pkS*6JC
)0A,6y
\qxg2-u
91Rx\l
G"otAc
g|)~q!ZJ
@~98_w
B5RqxBq
)ciBCyS
45R\T?
#fyM&q
vW\~k2Xf
v@Fpm<
M1;S#S
0)',F[
FM5))Hb1
!QXJp)
)f~wG[
E<Gu:P`
<Gosfm^
P~D9jSPA
9z*D39~sl%
C7z|E7
v=LdTz
TRBGH/u:]|
q%=(?{
,-Z*3.
0[CC`]
+w8eW%
gC)vMk
-UPw!B
,@aNFYY
V63Rulm
BC=|=z
I0Ckyn9Zc
9,C^7p^
z?X#TH
h; /@<
=h+} [+
9DFZL-
Q%'W}NW
@h^Oi(
WnkSG
k4u$b\]W
Kb3.$cOL
M}(3Z;
b[dDCIA
"My3!l )4
U7e`5(
?`&LyiXIs+*p
5D&A:v
K\~^(q
/Z`}Pt
f,;\qTr/P
}SD4,.
U{SZ|Jk
)lY7Zn
"v|Woj
TvX$yA
Pq\VQ
E%xl)T
rpKUg;
M{[WJ(
VSaHZK
:H3Q\9
}TRR=UR^v
eQc,h3
C;LfRRRBjS
et sTu
Mqt~}TN%u~
&1? !T
Hi'&%9-
{M,7z:
"NJrx;-AP
g36V0i
8yNd%
ajv;q"
u^{y5
fslDoB
x'7r9m
ud_fG
HUZtMfp
4DnKnA
XRBy[nOd
"pEcj[
UXdy"{
?zk->e
Yr;D/}
HDc?OEu
I!\?v/
63Zmis
ts<VPu6
a3U1&i<L
5ILz `
Xm+f km
qTLsiu
#&pm9~
`Hp(.\
,cIV|n~
$[RTXP
;OSqqaq\
RL!%3y4n
,\1/'k
WjnfVlNF
3+k%bS
8kI1p*
x1JO|n
/.\6-nf.
KKER:JO
RBxTL&J
ycrL,5
n2E >s
">5/c)?
H!QLP(
#5c5:M
N;E;];G;_Kk
`XaXox
LuI5T=U=G
(uT|TJ
4h.jZ5?i:4
9/2#rI
G1D1F1G
:>4&tI
N=!,:,
T?T?B?N
:74't5P
Y5X=^=I
J*4<tvh
!bfDZDe
_9X9E9
jMX~Xq
aVh7k
:g8Y[qKk
\o|{E
XT:{PU
3)lp>X
3.>%Jmfu
rTT4(v<O}
NdXF<o
Fmnh&
S 8W1E
e&caI.
VQ@!0$#@O
a!|mm%
1d&OqE
j;Emg\J
Y{.vhT
/="3iX
=;b&uX
xY[:"n=I
]*Y;:4jS&
+/xpZ;;
LIBBBBBBBBBBBBBBB
*$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$t!
+$$$$$$$$$$$$$$t
l"$$$$$$$$$$$$$$$$$$$$$$$$$$4
.=7c2
bBVX&-
dkE6&fTd
EDXt!
.0];6Z
|;x'Xmt
TXH)5(t
.-)BK
Ry6x3`
q]07xE
!!!!!!!!!
Ps/'gj
f rr;3X
%i|Pu{
YN{alUq
np?fj!#V
}Mqcs;
QV>f3v}
+7"1^m
Y~81Pg
(yF(nS
3D.%hEJz
a+(q/Y"QnH
3$<=sp
7CUDL4
6=~%Kt
:qRjj85U
KOliiijii
m4mTW-X
XJKG(7
MS]"1#
5>tFhi
_9>*0^
HlRjjjR
INno<r
qu<u\q
TMS=RCC
.] {";b
F9$OND
-fAMvq6
rs88!.7
>;m8Ye5
Mgbn<[
Pg0`O4
SOM;y'
qNkgkD
o"gsvF]
Fpsiu-
M@DEAB
;4Wi^*n
J76vh2u
Z-ke2{
Kpiw B
AY~Q|UZ2C
(Q1@@Q
H87zC^
9)i[U]
#W;k6A|
w1_y"A
Y_=uW*+
YvMbp)
^\<OaI
*hV][:
)q$k(.}
D._R->
=d>_mI
_A#Nt
$(P+KW
*T{t^!`
mWH{p;N
}'vA{/A
/ePxCq
Lf]$U;D
fd$Ri<M
O$.7_L4
9$w\\Pk
Fw>AlN
$qJ.N-+cq
K|LC_H
=@&zn)p>B
u6@Ql
TxmZvd
>i,l)w
R\-yXJ
=(B>R-
W~6CDDQr
/:G=?EK
Q%]Qng
RF~Y8<
jW:r5F`
hgO~xR
U-F"}v
0Th\1]
/{ZX`9
8 *,&o
oU.c3a
_Llc9
;'NR'Q
bq"P4ry
 mI#GS
$ZXc?@
eF}qPdr
2Vod6T
{F:%:ZKVx.>
Ld0'BT9
s[b<@>
@MVLg
}g$n_fR
Q2YK!1)48
jHqTso
B|7Y4Ab
6'+bOU2MT
aP+@5G
Lv6w!B
FlF>'1
=tX:T!
r(4mGD
Kk$%oT
$[=NAM
C%~@'-
zI-y}:|
,<Ibldw<f8
l@ytw^G
azO/vJt$3
B=uEQU&,
5nGMG}
OM8_T)z
G6ZyF~
`[HcDE8
3;LDrP
[+C6or
uMgCLy
HDpaol
sM)n6n*^
Uu6;:.k
K:*i<D
9D}>$*
z80~GIn
`|6LAgz
KWI1~+
.joxLz
gz*-0k
fF@)DE
r-8z?fi
hxk'ni
xze.oG
_{r-f4
h]h&l
{=XPFSn
`IcEZy
ki5ZKO
_]5pW
}0Dxv8Jx
Hxv&,<
\?Qo=$*
#=;5 ={
v3n8na
Edwj/c/h^L
v?rK7p
E]Z,<.
"%NZ"[4P
EIglo{
sK%s.g3
?~+=7\SO
$r00"T
x^1dR'
"[Pm6g
&]W1oy
0-,bGZ
Z?J!bg
6+E2*R
1ds:Y]5
|MLOf/
9LN,DN
5g!jn7
;JOXo<
!+UjhF
E%@2hRDT
j+;,5y<=
9dUq5D
b?Y5Iu$
.rn*J
80dpEB
Mj^rMoZ
$2_v}
vitAEW
,G%{sfYB
l*9p?)
;bMyb2l
C2owXP
29+AJ"
+c(cIRk
^:n;|k
n6J1,'I
tpvT7M
vJ&[w
*${Pt}
fcK>k5
[D*P-I
Y%,B *
_{bbkb!
$t3kqH
!A})DPw
NuXraC
P=n+<{
_'J;/G
q|M;pH
Y4$6v4
fsO3R0)S
:4n>Bt
Y#0O]!
,4sj"R
BV*CY\
q1&P00%@8
!:%\^_L
JPZ$.
W.QNLW
`.4nd8
P6'lAx
g)Epa/
|0,:,
?H(>X(>
PeM1j)
`#@,`?
:&BI+l
$/>?\!
w3 ~BH
E2xeR{(
=z#[@\
f$"MOD
%V%Z/|
L+%C^\
t9>Oe
<Z,>O[
{9RT~9
4IwF830
d,~o@D
uD1TgHQBV
uHBA:.t
^+Q."
~0ifkni
wlSZCq
3233W;Y
g`fbbbae
xSg[Ig
>)xz<@
pqAHL?
yy1aSS
`0"g2m
6Y<T&$
lJgyU=X
.['kR=
^0HyD?
f*;8fOS
w>T/IJ
-[>vT]^
f~}=&|D
tJ\-=7[y
.bt^[o}
{qf+{n
Lb0WUS
P^tiQH
/Y5^hJ
_H}]3N
ddd"""
>DNE<W
*wIXt&
Q+'P&=1
)s+,r?
]=?!q
%|5ISam
m-[zMUs>7
>& 4<&@_
=e78,P
J$IJI:IJ
ZYh<:%
v>Zm1%s
`&vm$g
GH+r$y
YpIh(:,
Z|K\'~)
|P#l4V
PG4H4R
t* o7}
uu.QE<
!_Cm\.
*Lf c
W0UL5S
2I|;sdI
oW3YPyV
R:\E:
AXH;~R
!7r +*$,
%UC.pV
(X4\ZJ
"I{d\e
bn7:$X
EEXDKR
Lb"GFq
mc6j.y
36M_9.
jCY-D3
O}>Y{\e
gZtPxd
'r~k8b
xSToLKD
~c[eYd
o.^^ZT
Xyt|y?
5%'_x7<x
(4oz}e
$I5^Rg
|u!-(a
Kn6}1R}~
[p%K{}
4)!u.z
TycWS7
{+Zor/j
Z.6PsS-57
4.s %o
f3566RCC
JKK)??
OrwnS_r
7ez]d;
8_n%j
&GmYdryTi
58BnD-
7NdmVff
BaB//RtX
.L|(/=
dWX&m*~
5J{uIv
(:c8N/
z\ Vgmw
tBG<^k
An:WO>
J8oRch
;GC;]D"
Western Cape1
Durbanville1
Thawte1
Thawte Certification10
Thawte Timestamping CA0
121221000000Z
201230235959Z0^1
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
http://ocsp.thawte.com0
.http://crl.thawte.com/ThawteTimestampingCA.crl0
TimeStamp-2048-10
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
121018000000Z
201229235959Z0b1
Symantec Corporation1402
+Symantec Time Stamping Services Signer - G40
http://ts-ocsp.ws.symantec.com07
+http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
TimeStamp-2048-20
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
180601000000Z
190620235959Z0
New York1
Yonkers1,0*
#Mindspark Interactive Network, Inc.1,0*
#Mindspark Interactive Network, Inc.0
http://sf.symcb.com/sf.crl0a
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0
http://sf.symcd.com0&
http://sf.symcb.com/sf.crt0
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
100208000000Z
200207235959Z0
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
https://www.verisign.com/cps0*
https://www.verisign.com/rpa0
[0Y0W0U
image/gif0!00
#http://logo.verisign.com/vslogo.gif04
#http://crl.verisign.com/pca3-g5.crl04
http://ocsp.verisign.com0
VeriSignMPKI-2-80
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA
http://eula.mindspark.com/ask/0
Symantec Corporation100.
'Symantec Time Stamping Services CA - G2
181023182830Z0#
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA0
180601000000Z
190620235959Z0
New York1
Yonkers1,0*
#Mindspark Interactive Network, Inc.1,0*
#Mindspark Interactive Network, Inc.0
http://sv.symcb.com/sv.crl0a
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0
http://sv.symcd.com0&
http://sv.symcb.com/sv.crt0
n"1nOB
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
131210000000Z
231209235959Z0
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA0
+ojr\`
http://s2.symcb.com0
http://www.symauth.com/cps0(
http://www.symauth.com/rpa00
http://s1.symcb.com/pca3-g5.crl0
SymantecPKI-1-5670
Symantec Corporation10
Symantec Trust Network100.
'Symantec Class 3 SHA256 Code Signing CA
http://eula.mindspark.com/ask/0
yHFzYYM
RE"1`r
b{u9o!a
20181023182831Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G3
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2008 VeriSign, Inc. - For authorized use only1806
/VeriSign Universal Root Certification Authority0
160112000000Z
310111235959Z0w1
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0.
http://s.symcd.com06
%http://s.symcb.com/universal-root.crl0
TimeStamp-2048-30
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA0
171223000000Z
290322235959Z0
Symantec Corporation10
Symantec Trust Network110/
(Symantec SHA256 TimeStamping Signer - G30
?'J3Nm
https://d.symcb.com/cps0%
https://d.symcb.com/rpa0@
/http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
http://ts-ocsp.ws.symantec.com0;
/http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
TimeStamp-2048-60
U){9FN
Symantec Corporation10
Symantec Trust Network1(0&
Symantec SHA256 TimeStamping CA
181023182831Z0/
/1(0&0$0"
}/!zam ==3
RichEdit
RichEdit20W
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
#+3;CScs
verifying installer: %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
... %d%%
SeShutdownPrivilege
~nsu.tmp
NSIS Error
Error writing temporary file. Make sure your temp folder is valid.
%u.%u%s%s
*?|<>/":
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
Please wait while Setup is loading...
VS_VERSION_INFO
StringFileInfo
04090000
Comments
http://www.mindspark.com
CompanyName
Mindspark Interactive Network, Inc.
FileDescription
FreeMaps Setup
FileVersion
2.7.1.3000
InternalName
FreeMaps
LegalCopyright
2015 Mindspark Interactive Network, Inc. An IAC Company. All rights reserved.
LegalTrademarks
Mindspark Interactive Network, Inc. An IAC Company. All rights reserved.
ProductName
FreeMaps
ProductVersion
2.7.1.3000
VarFileInfo
Translation
FreeMap
FreeMap
Antivirus Signature
Bkav Clean
MicroWorld-eScan Clean
CMC Clean
CAT-QuickHeal PUA.Mindsparki.Gen
McAfee Clean
Cylance Unsafe
SUPERAntiSpyware PUP.MindSpark/Variant
Trustlook Clean
Alibaba Clean
K7GW Adware ( 004e15d51 )
K7AntiVirus Adware ( 004e15d51 )
TheHacker Clean
TrendMicro Clean
Baidu Clean
Babable Clean
F-Prot W32/Adware.ANBU
Symantec Clean
TotalDefense Clean
Zoner Trojan.Win32.70060
TrendMicro-HouseCall Clean
Paloalto Clean
ClamAV Clean
GData Win32.Adware.Mindspark.E
Kaspersky not-a-virus:HEUR:WebToolbar.Win32.Agent.gen
BitDefender Clean
NANO-Antivirus Clean
ViRobot Adware.Mindspark.382768.A
Avast Win32:UnwantedSig [PUP]
Tencent Clean
Ad-Aware Clean
Sophos Clean
Comodo ApplicUnwnt@#101t2rdwcqm0e
F-Secure Clean
DrWeb Adware.MyWebSearch.145
Zillya Clean
Invincea heuristic
McAfee-GW-Edition Clean
Trapmine Clean
Emsisoft Application.WebToolbar (A)
SentinelOne static engine - malicious
Cyren W32/Adware.JQZB-7335
Jiangmin Clean
Webroot W32.Adware.Installcore
Avira Clean
Antiy-AVL GrayWare/Win32.StartPage.gen
Kingsoft Clean
Microsoft PUA:Win32/MyWebSearch
Endgame malicious (high confidence)
AegisLab Clean
ZoneAlarm not-a-virus:HEUR:Downloader.Win32.Agent.gen
Avast-Mobile Clean
TACHYON Clean
AhnLab-V3 PUP/Win32.Mindspark.R233545
Acronis Clean
VBA32 Adware.Agent
ALYac Clean
MAX Clean
Malwarebytes PUP.Optional.MindSpark
Arcabit Clean
ESET-NOD32 Win32/Toolbar.MyWebSearch.BA potentially unwanted
Rising PUF.MySearch!1.AEA3 (CLASSIC:bWQ1OnZ3N/AEVQMtiToiO3hiHy0)
Yandex PUA.Agent!
Ikarus Clean
eGambit Clean
Fortinet Adware/Agent
AVG Win32:UnwantedSig [PUP]
Cybereason Clean
Panda Clean
CrowdStrike malicious_confidence_100% (D)
Qihoo-360 Win32/Virus.Adware.e71
No IRMA results available.