Static | ZeroBOX

PE Compile Time

2012-02-25 04:20:04

PE Imphash

be41bf7b8cc010b614bd36bbca606973

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000728c 0x00007400 6.49970859063
.rdata 0x00009000 0x00002b6e 0x00002c00 4.49793253515
.data 0x0000c000 0x00072b9c 0x00000200 1.80494062846
.ndata 0x0007f000 0x000e1000 0x00000000 0.0
.rsrc 0x00160000 0x00006d88 0x00006e00 5.36231780005
.reloc 0x00167000 0x00000fd6 0x00001000 5.96947297715

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00166418 0x00000128 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_DIALOG 0x00166840 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00166840 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00166840 0x000000ee LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x00166930 0x00000084 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x001669b8 0x000001ac LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00166b68 0x0000021f LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x409060 SetFileTime
0x409064 CompareFileTime
0x409068 SearchPathW
0x40906c GetShortPathNameW
0x409070 GetFullPathNameW
0x409074 MoveFileW
0x40907c GetFileAttributesW
0x409080 GetLastError
0x409084 CreateDirectoryW
0x409088 SetFileAttributesW
0x40908c Sleep
0x409090 GetTickCount
0x409094 GetFileSize
0x409098 GetModuleFileNameW
0x40909c GetCurrentProcess
0x4090a0 CopyFileW
0x4090a4 ExitProcess
0x4090ac GetTempPathW
0x4090b0 GetCommandLineW
0x4090b4 SetErrorMode
0x4090b8 lstrcpynA
0x4090bc CloseHandle
0x4090c0 lstrcpynW
0x4090c4 GetDiskFreeSpaceW
0x4090c8 GlobalUnlock
0x4090cc GlobalLock
0x4090d0 CreateThread
0x4090d4 LoadLibraryW
0x4090d8 CreateProcessW
0x4090dc lstrcmpiA
0x4090e0 CreateFileW
0x4090e4 GetTempFileNameW
0x4090e8 lstrcatW
0x4090ec GetProcAddress
0x4090f0 LoadLibraryA
0x4090f4 GetModuleHandleA
0x4090f8 OpenProcess
0x4090fc lstrcpyW
0x409100 GetVersionExW
0x409104 GetSystemDirectoryW
0x409108 GetVersion
0x40910c lstrcpyA
0x409110 RemoveDirectoryW
0x409114 lstrcmpA
0x409118 lstrcmpiW
0x40911c lstrcmpW
0x409124 GlobalAlloc
0x409128 WaitForSingleObject
0x40912c GetExitCodeProcess
0x409130 GlobalFree
0x409134 GetModuleHandleW
0x409138 LoadLibraryExW
0x40913c FreeLibrary
0x409148 WideCharToMultiByte
0x40914c lstrlenA
0x409150 MulDiv
0x409154 WriteFile
0x409158 ReadFile
0x40915c MultiByteToWideChar
0x409160 SetFilePointer
0x409164 FindClose
0x409168 FindNextFileW
0x40916c FindFirstFileW
0x409170 DeleteFileW
0x409174 lstrlenW
Library USER32.dll:
0x409198 GetAsyncKeyState
0x40919c IsDlgButtonChecked
0x4091a0 ScreenToClient
0x4091a4 GetMessagePos
0x4091a8 CallWindowProcW
0x4091ac IsWindowVisible
0x4091b0 LoadBitmapW
0x4091b4 CloseClipboard
0x4091b8 SetClipboardData
0x4091bc EmptyClipboard
0x4091c0 OpenClipboard
0x4091c4 TrackPopupMenu
0x4091c8 GetWindowRect
0x4091cc AppendMenuW
0x4091d0 CreatePopupMenu
0x4091d4 GetSystemMetrics
0x4091d8 EndDialog
0x4091dc EnableMenuItem
0x4091e0 GetSystemMenu
0x4091e4 SetClassLongW
0x4091e8 IsWindowEnabled
0x4091ec SetWindowPos
0x4091f0 DialogBoxParamW
0x4091f4 CheckDlgButton
0x4091f8 CreateWindowExW
0x409200 RegisterClassW
0x409204 SetDlgItemTextW
0x409208 GetDlgItemTextW
0x40920c MessageBoxIndirectW
0x409210 CharNextA
0x409214 CharUpperW
0x409218 CharPrevW
0x40921c wvsprintfW
0x409220 DispatchMessageW
0x409224 PeekMessageW
0x409228 wsprintfA
0x40922c DestroyWindow
0x409230 CreateDialogParamW
0x409234 SetTimer
0x409238 SetWindowTextW
0x40923c PostQuitMessage
0x409240 SetForegroundWindow
0x409244 ShowWindow
0x409248 wsprintfW
0x40924c SendMessageTimeoutW
0x409250 LoadCursorW
0x409254 SetCursor
0x409258 GetWindowLongW
0x40925c GetSysColor
0x409260 CharNextW
0x409264 GetClassInfoW
0x409268 ExitWindowsEx
0x40926c IsWindow
0x409270 GetDlgItem
0x409274 SetWindowLongW
0x409278 LoadImageW
0x40927c GetDC
0x409280 EnableWindow
0x409284 InvalidateRect
0x409288 SendMessageW
0x40928c DefWindowProcW
0x409290 BeginPaint
0x409294 GetClientRect
0x409298 FillRect
0x40929c DrawTextW
0x4092a0 EndPaint
0x4092a4 FindWindowExW
Library GDI32.dll:
0x40903c SetBkColor
0x409040 GetDeviceCaps
0x409044 DeleteObject
0x409048 CreateBrushIndirect
0x40904c CreateFontIndirectW
0x409050 SetBkMode
0x409054 SetTextColor
0x409058 SelectObject
Library SHELL32.dll:
0x40917c SHBrowseForFolderW
0x409184 SHGetFileInfoW
0x409188 ShellExecuteW
0x40918c SHFileOperationW
Library ADVAPI32.dll:
0x409000 RegEnumKeyW
0x409004 RegOpenKeyExW
0x409008 RegCloseKey
0x40900c RegDeleteKeyW
0x409010 RegDeleteValueW
0x409014 RegCreateKeyExW
0x409018 RegSetValueExW
0x40901c RegQueryValueExW
0x409020 RegEnumValueW
Library COMCTL32.dll:
0x409028 ImageList_AddMasked
0x40902c ImageList_Destroy
0x409030 None
0x409034 ImageList_Create
Library ole32.dll:
0x4092bc CoTaskMemFree
0x4092c0 OleInitialize
0x4092c4 OleUninitialize
0x4092c8 CoCreateInstance
Library VERSION.dll:
0x4092b0 GetFileVersionInfoW
0x4092b4 VerQueryValueW

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
@.reloc
PWSVh@
v#VhL2@
Instu`
softuW
NulluN
SUVWj 3
D$8PUhd
D$,9-l
[j0Xjxf
D$$+D$
D$4+D$,P
PPPPPP
\u!f9O
v%Phd
QSUVWh
UUVh fF
U@9UTv
ED;uTv
MP+ML3
JN#uH;t
SHGetFolderPathW
SHFOLDER
SHAutoComplete
SHLWAPI
GetUserDefaultUILanguage
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyExW
ADVAPI32
MoveFileExW
GetDiskFreeSpaceExW
KERNEL32
[Rename]
Module32NextW
Module32FirstW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
Kernel32.DLL
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
PSAPI.DLL
MulDiv
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpA
KERNEL32.dll
EndPaint
DrawTextW
FillRect
GetClientRect
BeginPaint
DefWindowProcW
SendMessageW
InvalidateRect
EnableWindow
LoadImageW
SetWindowLongW
GetDlgItem
IsWindow
FindWindowExW
SendMessageTimeoutW
wsprintfW
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextW
SetTimer
CreateDialogParamW
DestroyWindow
ExitWindowsEx
CharNextW
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegEnumValueW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VERSION.dll
2Dl D_
&3i*}E
4e7dQ
&0S@Vj
OORSUO
[WOORRV
_\\ZOORO
_`^^\\ZOO
`a``^^\\ZWX
_bbaa``^^\ZX
[ddcbba``^^\g
||}}}}~~~
ceeddbbaa``Y
vtuuwwwyyy|||}
[ffeededbba`
imrrssttttuuuwx
ffb\RR\adcb
hlnnnnmnpprssss
[cOTUUTTU\eG
hlllkkkkkmmpnpn
]UUTTTTUUUY
zpkknnn
?MQUTUUTTTUC
!>MNQUUTTTTL
ALMNQUTTTT+
AKLMNQTTUM
IKLMNQTTF
EIKLMNQN
BHIKLMPJ
=EHIKLNC
BEHIKL
)BEHII
*)'3BEID
*)42<57@B;
*)'4156,9..
*'41567,-.0$
*'41568,-.0#"&
*)42567,9-/#"$
=*)'2<67,-./##":
*'4157,9-/0#$""
(4157,9-.0##"::
3568,-//#""%:
6669-./##"$:
09-./0#"::
../#$::
|::TTTTT:
<;XWWWWUU:
<>llnp"R^\\ZZYYY8
tx{vlr6S]_______\:
w66N^\[[`____
62ObIMcefi`_9
}613?CIMQeg
CCIMceg
762BCCIMceg
623?CCIMceg
$-.062
CCCIMceg
%,+63HCCCIMceg
CCCCIMPdg
?FJJJPdh
6DDMPeh
Dfffffh
fffffh
DUUDU33fh
DUUDU33fffffh
UUUUUUU36fffffh
UUUUUU338
UUUUUU338
UUUUUUU36gvgvgvh
UUUUUUU36gvgvgvh
UUU337vgvgvfff
UUU337vgvgvfff
UUUU336gvgvgvgv
37vgvgvgvgw
36gvgvgvgvg
UU33vgvgvgvgvg
U33gvgvgvgvgw
U33gvgvgvgvgw
""""")
33vgvgvgvgvg
""""")
3wvgvgvgvgvg
"""""""""#3wwvgvgvgvgww
""""""""!
wwvgvgvgvgww
"""""""!
wwwwwvgwwwww""""""""!
wwwwwvgwwwww""""""""
wwwwwwwwwwww""""""!
wwwwwwwwwww""""""!
wwwwwwwwwww"""""
wwwwwwwwww"""""
wwwwwwwwww
wwwwwwwww
wwwwwwwww
wwwwwwww
wwwwwwww
wwwwwww
wwwwww
tSSMY8
SSSMM8
SSSMM,
tSSSMM&
SSSSM&&
SMMG&&&u
SMMG&&&
MMG&&&u
AZi+\~m
?;>2vc
"""$D{
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.5-Unicode</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency></assembly>
0.0;0I0]0j0
111;1D1Z1a1y1
4#464G4g4~4
5+5;5I5W5i5x5
6>6J6[6z6
797C7I7Y7|7
8,888J8e8y8
979D9L9w9
9::T:e:
;!;2;A;T;
;+<P<w<
?-?I?\?o?w?
020T0y0
1#101>1J1P1U1[1f1l1
2'2B2d2v2
4/4o4t4y4
4a5r5z5
7.7q7v7
8!808D8X8
9+9L9Z9
:-;[;c;l;
?1?<?X?t?
1 1$1(1,1014181<1@1D1H1L1P1T1X1\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<2@2D2H2l2
3"3*303I3O3r3x3
4!4'4+4G4Z4`4k4q4v4
6!6.636B6G6r6
727C7r7y7
99%92999?9K9Y9
:":.:C:H:`:f:}:
:;$;/;7;C;J;Q;Y;g;q;v;
;2<C<n<~<
=+=5=M=^=d=
>%>:>F>i>
?;?L?X?^?d?j?
0>0J0Y0b0k0}0
1.1=1G1S1
1"262M2Y2x2
3$3M3_3u3
3/4q4~4
455:5\5
5=6B6O6k6v6
8"8T8a8
809S9[9a9h9
:%:*:0:6:<:J:V:\:i:p:v:
>\>d>t>
?'?,?S?_?
0&0h0v0}0
1=1I1f1u1}1
1D2N2T2Z2h2p2v2
3+353[3c3j3
4)494?4K4U4i4
505Q5e5l5
66+666?6K6S6Y6d6
667@7X7j7
8/8;8L8R8X8k8u8
9%9+939>9D9`9y9
:#:::L:j:q:|:
;#;';-;2;8;P;_;
< <D<v<
==%=+=B=
>+?M?t?
D0M0S0_0
0 1,121>1L1S1[1c1j1
22,292D2K2
31383C3N3U3k3w3
5)565L5~5
7 7'737V7a7l7s7
8@8Q8Y8
919F9S9
:+:@:u:
; ;8;A;U;k;p;u;{;
<P<e<y<
=)=0=H=P=Z=n=
>*>5>P>a>
>$?4?9?L?
2Q2n2x2
8)8/878?8G8B:s:
2 2$2(2,2024282<2@2D2H2|2
0 0$0(0`0d0h0l0p0t0x0|0
NullsoftInstb
[^mn]`r
G_:Q(5
ss~5'l
Q'&}8O
KtCWG@T
U4*g'3f
N`p"-i
Q}&Y4&
ib F iQ
x& ,Gd
%rx#a#
\~D:3y
Ml)o{Y3
@Gtc@cu
G2PM&=d
!&|=.g
rWy]yC
#y,d,:
W0B+IEi
v}4&5`
lv%/-a
C57DK=S
v(<H(y
oSp,8.
\^f,6c
*/.]Z^`,3
8JHuvz)=
Lp(@ks;
ObObNQ
BGY$tzl4
k,HU{l
[O@SwE
lfeSf;
{'u&f{
j!O'{V~
)lSxRQ
$1JVN6
<Fma)P
-|e!q}
4OtHId.|
G[D+w(
8&2W{;l
XaaM<I
fi?3C
*@an{;lJJ
o0 jB
P6_i!-^
~+GoZk
|SesM%}h
+ob`9n
^hmpX8M
ei^y)F
J{csc5
ujAnc}
:a^BBBu
&=%=3}I
5=uqjCjK
<ET\I?
jlKjim
JWpCk[
0,)D]D
}E;Eo @
QIyl(0=
SYs'+[
`4h7804F
S4bz4c
dZ`wm!z
/!P~pF
1mN0&P
hRkIV(;Ee
z(-_CF
rk`S^`'P
!Oc TW`
qh.O}B
=n'swj
fl<H'G
QCg!,^
X"&+9
KJQLrw
pxx@xO
z/nqa|
m+OZlZ:.
OBc{@EM
T#`@D(v
yF|'t-
.\h/\X
femSS3
im\u+>+
Vq0@+C
Qu$q2i
UWErMc
-r8,=b
U5U6 XE
O0o)+*
=WTT1[
%%jxDs$z
gJxv2x~[^
uTnWE3q
5|Q\tq
0(,Gn/
w:KC)
o@L!Jj
h,M-K5
,sVAVi
,WVKV{VG
1"56uR
T}Z\ZrZeZU
"=.##cM
27%wan[
>=3}Vzm
>qVG*N
RA)Ye%
'jA1=K
i,_CNgC
^yd=c{
N<=l'Z
a+!+;w
kGsE`m8
U2FWQBL
z<%82?r
V#bcuM!
_6z],l
yz*:t.:
(6f_&y
z1/E/n]
dd2%Le%
BHPx9o
N_igni
0I6m`?
`ZX^z`
y%U0]S
A<LZ66
6[Bd*C
hv/4KA
|T(msh
h,0t3H
@EFTSnicEr
4y]{y"
|~YId(
e[W(h
Au&m|=
gR:u,e+
.L3@p)l
?6x#v)
+\!U8,
5Q2vdot
em)JH'
%h0SYd
Xf=&5`Y
x]@jEs{s{
,~c=`u
JWtyXK
,K!Y?0
>9X%7o
PFgti2Be
HfK28r
-((>y^L,
Q`Y{3w+
0uL.$5S
sO,Of9
v*elD`
BP`!_S~
.Zubq"
9HBRb37
(t->Bb b
)LfNr.
`jo*~A0
x#m>qx
:C'Sy:
fF%6n]
'A|OCjn
K&Gu>=,
dyx-gU
{9"V"JZiKL
7$)&@rK
R1H@L*
<03k>)
yJg6~af
t1`]v5@/
q&sR&~
RPqF6sh#
k;{`xo6
O?$ypS
\){9{uk
\Cl#]:
Mv:Iy*
$AUOX&
s; Qnid
)txmY{R
EE*,3w
Y}3MF0
fScL%C
)5#G~@
G{-`/kK
VX1B7%L
Ser,S9
[i-^@3
A0nMzbS
qf?P=,
P!+<-g
Du.fJ
K2jx6@ab)
EU;.Jt
01J!L\
&.%yMX
"wc=pr7
/(7HL
R\Zl\Z
3ZdEO,2
<4QFU3
}VdlQ*F
J4R(fQM;
4sInDmGoD
Lh0^]A1"a)
f$[>{E
9F.1i[
N{T!sL
esVY+IT
a4ZB4E
H|6Wx
<p_}h3
*pj[)VG
}7Bc2[
:_qdb4N
4a)MXH
ctIq%$\
,rx}?^
( as5p
61vD>F)
OY$#6ZThx6W
OW4.=.
d1A+t^
DoTxql
&c}pyC
i:v>><
<:2c!1
S %aI8
R!/T8Y&
1C!7#!
_1H.+
d5&qbbh
V~J')B
ttrvqu
zS{5| i
v-|F/e
|z">ylj
-wmv=
~4n;[^
6c);oIA|
q\~*q~U
<Y?a^$
)^VmUG
<>kE|.X
.U/a8$3
PoABr"
2ZKp_8
7?5EKq
3{?l-b]
xuX\Cb
Wd.SVQ
iH}aS-Y
~/zY%_ysPh
[0}wF^[
)gnk>/
=m|4'>
PvHv>S
=<gh/]or8
8z! 3\vHz
)2&a}HA
HvdB.u
G]oz('l
+#Of8
7:5:'{
o;1;eJ
fB\`O
o?Ve`f
?*>mR3
QnZYFV
/}?Ds`
C][KgX
w9TNDq
;M0d;<
J'_;5Ud-
qzs9.G?
2d31\b
bBqWvY
=nRD7/4+
Vh;X?]
c%FgCd
43!$}Vnmxvr
&mi=)%
pvOB4M
<ct:/q
B_l{X
uQ`|pt
:GE{X&T
G"GOq6
3$`7 %`
}#7I;=.
aw"RvMGTn
;[Lto3w
v{zffO
(y=](V
ZjP9[r
Dn+-P
D[ALaT
?A17 6
_.+SEZI
z#f_V!
L/vJ?v;v
<&)?vf+
_L/VZW*
t <N.jv
o,=`#6
,hED&Q
ehj.G[fb
63}^O4
,.HHnf
;EX~m6+
"x\kSR
q5`}rA
Elllc(
S%\O{j4
*CIw4Z
8qU#eB"
"l~d/
FN(5'"
))" $A
Y;8f09
2hL.Od
Tk4u"I
1|uiM>
^p2{[%Z
 p%>iE<o
!D%CaH#jz
3sk`zu
WYSg n
S#?'d`
[/f=q
K+wz*[TX
<^;UiA
c63,g,<sK
x;i&*{
:Lut7x
Yli?65J&
6zAy9L
qcN$ql#
n\)t~[
KY,ua7/
p\yRVU}8
LHKqEs
HWx{bx
d$`|3V
_ayEi.
AmB471
*K3q]%
~jGQ8n
nh1Kz:
Jq`9f3
TfQ$%?
#7M=-Nk
&6A|1S
GhlL{C
?Fa4ZPm
V:qLV9
Hu'rVd>I
T=;@<4U
H6px>_^EbS
#-><S|
zO=QcL%
'2a)rk
X)iUY>
n~9$>E
9FaY"(
*+s5v<[AYw
XpbtOui
e2706Q
6TaO@T%
; n[7M
b2`ep=UaN$
-7Xr+r
{<<veJ
/J:qXu
<QO5T!
,@-/XQnJ
^FgKez
EjcJ`M=
Rd)]}>
+t~J]PH
9Yv_pL
w'Mb{L
@A&:Z6
,$-Ff3,
q`c?9'A
%nzbsJ
k!N6jg
3?WdJ_)=!+>
`g>]^N
vg3_MU
7L8^d+*
,A&G;+
rHd<i=
4jsJ
t]e-A[
uVfq5d
IHp1U3
8!1KLa]qa
FU+;K=
2DMy0FgG
|Ez*%=r
Hm_UoI
vUjD=N
q^r|w4
J8JM~W
k={tbc
[L*de|
{^6+Ly
\Jv4?b
+2{i]va
o_~,f
8%'<}i
Vo}kSsN
gN,rXw;
zrEp%v
B/Nz:'
vr~u^Ul
iW>o>]u
s.,?tjv
2`WGI\y
w)\tSo
'G>z51
^qrCt[C
=/\k1
yB>e@ct
{_zhov]
iQuN3m
!8_[`yMZY
k<QTP}
GwtdY-vs
VBA5"d
>noQ];
.+NF6~
3rrr}}x
O&Qso9
sj*Eso
jD|#uo
.O:V.T
_%):_+ .T
RBs_fz<
gwJ9YM
_s%WK9
^HT,30]
fqjZ8W
NUN%1*
R9A"PM%D
Hqz#)x
i"B)I,
PRh4q+s
@qRL1UH
o `=5%TJ
h))8Z!
`uD#Wq
sRJy$<
#tKwaY2
z2)^:B
H9)PJ6
5@/08:
Z6`3A{
PFW:(%
ByWw*d
p7 yP#O
@iAS(`
Y^{0m@a*
)xU/@_v@K
@IgPQh
@JE.TB
gS+oNp
stxmD;
mew3es
Q21zzPUV
$~?JIWw
xzZ9NCmD
jSO{ 6
[.D|gG~
zY*reW
>|(m_~
`kZZC<
fQfqW
9I`uM/4
oIZoJ{
Nczgjz
+Ncew*
1@Li=N
[_^i!J
ijnp*}
Yf|kS}
r[?9.9
nb`Hb1"
qX0x+2-N
JCu&sB
6pb%=
l,fC[%
LC+kK(
iyp*o=K&
"!o2@v
<))~aJ
4m9jI]
)^[33}
zim\)a
@sO=;U
|i6%zV4
p=y+ U
cZWqHy
TBtlred
~BAm_O
bg|q:a
l9Xu f
}A'k,i
"7PLhC
"3X&c\=
Bu#cgcH
Dc10aeL\
y~,p}ZWz]
5%rB$f
]Ji_eex
+<}~<
IT)XKAp
W44ihh
n+*R +r
;!IxSK
B.d;4N
Y-6lQv
d79e75'
wq[.4T
WK+`R,>
zK'OjO
K9Bq)}
Iy'$Au
\"}J8y
6Mo~LI
K4Kw4#
#qyQ( ib
l@j*h?UH
,vhLFP
EVt]/
Zu2wI?
P>HNHr8
,rE\BR
FkC5Z_
x!WJe5R%
2*kDeb
DcqV\M&
hC\CO[rZ
h^6KY>
IG~ya".
4Fm35jGK
h5$$5F
2Zn*)Sd
2=kkU5
aV0],XV
||uR|T
i"/T[9
AtdkQd
&V=Lb5
/B`f0
>vt$gp
45$6I1?9|~@
IdlQ+F
!|A7`1Gb1Gb
PlO6(3Va
LyT*wL
Z&>fJ<7
pFT?5H
ZT?%{F
r3T'%b
%*=4B/'
pJZ-VG
A#}JT]
U.AfkH
{eRoc)G
iFTc7^c3
CE|/>o
xK-$v
A9i:EP
4`U%7HJ
^!aj[2
A'lY\(H
X^# :
=4!XPT
nV': #l
}uIg(
>HZi(M
/0(,P
nPJ{n(g
:e8l)R
Z6g$}ZB
2m>]>M>
+($@$S
v1bcc0
&t$s&VG
fhs{vO:~=9
TsHZf~
d/}=.j
}Hf^ L|c
Wk<i'PZ
2h:Gsc
.KA|J~
:l<rG|
3i}Y ^vff
@xoDWm
;e ^qlO
#rg~B=H
`%@8@0
jE#j3-]
4"(T4A
M!~)YF
.{VaO=
+HrY~O
mZ|8zP
:^::Fxc
_l9{Oz
ffI&C7
._6Tk]
P_"m}r
F9e.}s
^=BR}[
Xg;kh+[
jm\:el
]ja6sKq
o6No2r
mt=?4d
f>=0uPx
1z4EYCn_u
LK-jBH
F~W%o:
wuC[j?
5s[rN2
Jb>"F:E
lm-a;{
E*&(%z
mG@U^(
'),`4M
O{iXBC
4U 2@{
~8~yud
zqRcUbT
]6BOB
no"t7>OL
C,+[@r
]CB:'Rq,(b
:,]p/i
Y4^'@E
?6xAM6
"~B-x0
CV6{vr
Qrh18f
]u6!$I_W4
s jMzlY
MN5|0y
[hoh1V
l#0y `FZh
'_ah}n
v)?An'O
Nk_N=V
6;8[.V
KL5ww{
>h|se<
/6D8m[
n~*s,X
eH!0]Oy
._X6@GN
O(g2GVY
.)7W}J
jsb0#j)
%*/A;+
Csv@k~
KWniTZ
I0LXTcR
w|]uS:
)P762|,
U9!P$I
Yguph
2u(-2M
>psp7/
$KaYLmK
C0CU;P%
H-c*[
?Kz~kx2
P\6b^"0
pX@rw=X
s1Nm2|
%w3b|#S*
jVs07=
F8BI}F
|.H*5`
rY9%"@
_~a0y
.Q`\'M
#sOUK
\*=[e67
dY/^Mz
XX.=V2
3IA?(G
Csh4v"+`
rc1B9Ff
1jq]&*
'0Ur"N@
d3+VS%MJ1U0
)cI#!
:,c[GL
vdHDl6!
xl|'6C`
FROT&5c
XQ$:6D
AH@p f
QM$_S"4i
uhipg+
'S$"Ut
+\I&&6
ot6)a
-#c-z-
f8K^T.
'Mt[dK
@gE>rq pAA
.0~dB\
r/BvJEqY
hMRmdAT{
5)H|9!\
86tBLp
2!eWQ<
o\9EX;
<)Vmr=V3
FK"Rr_
};7wrh
[])<I}zxq
9,N5f>
hIS662
h/r%3M
9qDiiJ
FPk7`
>RP$*
<W!Dj?
Ne~aCc,
5\Q*'_
Q$U?T{
"oE6={
=F:VqC
5Za-[C
GFMz][
ge{v!3
H,W\~Kuy[
Z6m7<wv
p|t/dm
V>4s4fQ6P
:ocoEI
]bYjj:
qsst>(
YWsB-?
1VE%RMv
QekzBy
]K}UtaBlh
A<VI823@
,^@iYrt
>=kw-X
68mP~$>
I-|3I4%
k0tG@w
tFPbO(
r[HPGn
iY}`I<
M#(@:m1(
`lE_!_
1=B7M},c
]WooDS/
;xdAK/!)+
f4chz;
""Qa7-lG
EhM'">
Q1KhV^ls
Hr?t Dl'}U
Rz8H^7
]);<CdL
EA:#ZHJ
pr@@/98
_~+Id)
8L@ie+
NHCt*j
7%.C{@
'Z8FR#
9kT #K
g~88^w
[w|7DV
m9voSv
CS`7c
J5<c{%.n
a\z?=&
:-YBwV|
YyYXWJ
3ZH6`%h=n
MPGvbMX;
22w>"w76
;LFdXz
z.O]_wZ
s[;nyg^
:F.L6g
<R~EsU
{oxMC/
hl_>d^
lW>dYe
BI~Iy*q
&Z10%M
"I@\pA*
d5:=aE
;,_ a2r&
CuA$/*
qd{Si?
CEKBGkX
dtWyfJ
$Hi+ys
|%nU>]
Z+q={P
T{;J*/:
vENRk)
=del;'
{9R%R=
HW"=n
yO4 nk
tkT2on
@ij01h
`Pj9.`
xeI/K:
_`A1qX
-\oljG/
J'+JP?w
lm@f>2
))nWx3+l
g2/Kk
qF/P4NC
HtCsdq
q,v,sx
XyGe{ew
"^qwEw
nt-ry\
1f!xYv
logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0x%08x"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not initialize OLE
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")
Exec: success ("%s")
Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")
ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
HideWindow
Pop: stack empty
Exch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: error, user cancel
File: skipped: "%s" (overwriteflag=%d)
File: error, user abort
File: error, user retry
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes failed.
SetFileAttributes: "%s":%08X
BringToFront
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
SeShutdownPrivilege
~nsu.tmp
NSIS Error
Error writing temporary file. Make sure your temp folder is valid.
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
%02x%c
Unknown
RMDir: RemoveDirectory failed("%s")
RMDir: RemoveDirectory on Reboot("%s")
RMDir: RemoveDirectory("%s")
RMDir: RemoveDirectory invalid input("%s")
Delete: DeleteFile failed("%s")
Delete: DeleteFile on Reboot("%s")
Delete: DeleteFile("%s")
%s: failed opening file "%s"
GetTTFNameString
Version
#+3;CScs
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
Please wait while Setup is loading...
VS_VERSION_INFO
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
LegalCopyright
Installation
ProductVersion
1.0.0.0
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Elastic Clean
DrWeb Trojan.Packed2.43126
MicroWorld-eScan MemScan:Trojan.GenericKDZ.75349
FireEye MemScan:Trojan.GenericKDZ.75349
CAT-QuickHeal Trojanransom.Stop
ALYac Gen:Variant.Doina.10795
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0057cc5d1 )
BitDefender MemScan:Trojan.GenericKDZ.75349
K7GW Trojan ( 0057cc5d1 )
Cybereason Clean
BitDefenderTheta Gen:NN.ZexaF.34690.uuW@aSCuVjbG
Cyren W32/Kryptik.EDK.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 multiple detections
TrendMicro-HouseCall TROJ_GEN.R002H0CEK21
Paloalto Clean
ClamAV Win.Malware.Pwsx-9863541-0
Kaspersky HEUR:Trojan-Ransom.Win32.Stop.gen
Alibaba Trojan:Win32/Kryptik.f2b68ed8
NANO-Antivirus Clean
ViRobot Clean
SUPERAntiSpyware Clean
Ad-Aware MemScan:Trojan.GenericKDZ.75349
Sophos Mal/Generic-S
Comodo Clean
F-Secure Clean
Baidu Clean
Zillya Trojan.Generic.Win32.1316556
TrendMicro Clean
McAfee-GW-Edition RDN/Ransom
CMC Clean
Emsisoft MemScan:Trojan.GenericKDZ.75349 (B)
GData Win32.Trojan-Stealer.Clipper.1A7G03
Jiangmin Clean
MaxSecure Clean
Avira HEUR/AGEN.1140896
MAX malware (ai score=100)
Antiy-AVL Clean
Kingsoft Win32.PSWTroj.Undef.(kcloud)
Gridinsoft Clean
Arcabit Clean
AegisLab Trojan.Win32.Stop.j!c
ZoneAlarm Clean
Microsoft Trojan:Win32/Azorult.RTH!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Dropper/Win32.Agent.C4204264
Acronis Clean
McAfee Artemis!E5E087B4C906
TACHYON Clean
VBA32 BScope.Trojan.Wacatac
Malwarebytes Malware.AI.4230390294
Panda Trj/CI.A
APEX Malicious
Tencent Win32.Trojan-qqpass.Qqrob.Amls
Yandex Clean
SentinelOne Clean
eGambit Unsafe.AI_Score_99%
Fortinet W32/Stop!tr
Webroot W32.Malware.Gen
AVG Win32:PWSX-gen [Trj]
Avast Win32:PWSX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
Qihoo-360 Clean
No IRMA results available.