Static | ZeroBOX

PE Compile Time

1992-06-20 07:22:17

PE Imphash

c9adc83b45e363b21cd6b11b5da0501f

PEiD Signatures

BobSoft Mini Delphi -> BoB / BobSoft

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
CODE 0x00001000 0x000244cc 0x00024600 6.59442804845
DATA 0x00026000 0x00002894 0x00002a00 3.79375704099
BSS 0x00029000 0x000010f5 0x00000000 0.0
.idata 0x0002b000 0x00001798 0x00001800 4.88554506065
.tls 0x0002d000 0x00000008 0x00000000 0.0
.rdata 0x0002e000 0x00000018 0x00000200 0.20448815744
.reloc 0x0002f000 0x00001884 0x00001a00 6.58664786461
.rsrc 0x00031000 0x00001cdc 0x00001e00 4.7478926442

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00031be8 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_ICON 0x00031be8 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_ICON 0x00031be8 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_ICON 0x00031be8 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x000324a0 0x00000110 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x000324a0 0x00000110 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x000325b0 0x0000003e LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x000325f0 0x00000374 LANG_RUSSIAN SUBLANG_RUSSIAN data
RT_MANIFEST 0x00032964 0x00000376 LANG_RUSSIAN SUBLANG_RUSSIAN XML 1.0 document, ASCII text, with CRLF line terminators

Imports

Library kernel32.dll:
0x42b1dc VirtualFree
0x42b1e0 VirtualAlloc
0x42b1e4 LocalFree
0x42b1e8 LocalAlloc
0x42b1ec GetVersion
0x42b1f0 GetCurrentThreadId
0x42b1f4 WideCharToMultiByte
0x42b1f8 GetThreadLocale
0x42b1fc GetStartupInfoA
0x42b200 GetLocaleInfoA
0x42b204 GetCommandLineA
0x42b208 FreeLibrary
0x42b20c ExitProcess
0x42b210 WriteFile
0x42b218 RtlUnwind
0x42b21c RaiseException
0x42b220 GetStdHandle
Library user32.dll:
0x42b228 GetKeyboardType
0x42b22c MessageBoxA
Library advapi32.dll:
0x42b234 RegQueryValueExA
0x42b238 RegOpenKeyExA
0x42b23c RegCloseKey
Library oleaut32.dll:
0x42b244 SysFreeString
0x42b248 SysReAllocStringLen
Library kernel32.dll:
0x42b250 TlsSetValue
0x42b254 TlsGetValue
0x42b258 LocalAlloc
0x42b25c GetModuleHandleA
Library advapi32.dll:
0x42b264 RegCloseKey
0x42b268 OpenThreadToken
0x42b26c OpenProcessToken
0x42b270 GetTokenInformation
0x42b274 FreeSid
0x42b278 EqualSid
Library kernel32.dll:
0x42b288 WriteFile
0x42b28c WinExec
0x42b290 WaitForSingleObject
0x42b294 TerminateProcess
0x42b29c Sleep
0x42b2a0 SetFileTime
0x42b2a4 SetFilePointer
0x42b2a8 SetErrorMode
0x42b2ac SetEndOfFile
0x42b2b0 ReadFile
0x42b2b4 OpenProcess
0x42b2b8 MultiByteToWideChar
0x42b2c0 LoadLibraryA
0x42b2c4 GlobalFree
0x42b2c8 GlobalAlloc
0x42b2cc GetVersion
0x42b2d4 GetProcAddress
0x42b2d8 GetModuleHandleA
0x42b2dc GetLocalTime
0x42b2e0 GetLastError
0x42b2e4 GetFileTime
0x42b2e8 GetFileSize
0x42b2ec GetExitCodeProcess
0x42b2f0 GetCurrentThread
0x42b2f4 GetCurrentProcess
0x42b2f8 FreeLibrary
0x42b2fc FindClose
0x42b30c CompareFileTime
0x42b310 CloseHandle
Library gdi32.dll:
0x42b318 StretchDIBits
0x42b31c StretchBlt
0x42b320 SetWindowOrgEx
0x42b324 SetTextColor
0x42b328 SetStretchBltMode
0x42b32c SetRectRgn
0x42b330 SetROP2
0x42b334 SetPixel
0x42b338 SetDIBits
0x42b33c SetBrushOrgEx
0x42b340 SetBkMode
0x42b344 SetBkColor
0x42b348 SelectObject
0x42b34c SaveDC
0x42b350 RestoreDC
0x42b354 OffsetRgn
0x42b358 MoveToEx
0x42b35c IntersectClipRect
0x42b360 GetStockObject
0x42b364 GetPixel
0x42b368 GetDIBits
0x42b36c ExtSelectClipRgn
0x42b370 ExcludeClipRect
0x42b374 DeleteObject
0x42b378 DeleteDC
0x42b37c CreateSolidBrush
0x42b380 CreateRectRgn
0x42b384 CreateDIBitmap
0x42b388 CreateDIBSection
0x42b38c CreateCompatibleDC
0x42b394 CreateBrushIndirect
0x42b398 CreateBitmap
0x42b39c CombineRgn
0x42b3a0 BitBlt
Library user32.dll:
0x42b3a8 WaitMessage
0x42b3ac ValidateRect
0x42b3b0 TranslateMessage
0x42b3b4 ShowWindow
0x42b3b8 SetWindowPos
0x42b3bc SetTimer
0x42b3c0 SetParent
0x42b3c4 SetForegroundWindow
0x42b3c8 SetFocus
0x42b3cc SetCursor
0x42b3d0 SendMessageA
0x42b3d4 ScreenToClient
0x42b3d8 ReleaseDC
0x42b3dc PostQuitMessage
0x42b3e0 OffsetRect
0x42b3e4 KillTimer
0x42b3e8 IsZoomed
0x42b3ec IsWindowVisible
0x42b3f0 IsWindowEnabled
0x42b3f4 IsWindow
0x42b3f8 IsIconic
0x42b3fc InvalidateRect
0x42b400 GetWindowRgn
0x42b404 GetWindowRect
0x42b408 GetWindowDC
0x42b40c GetUpdateRgn
0x42b410 GetSystemMetrics
0x42b414 GetSystemMenu
0x42b418 GetSysColor
0x42b41c GetParent
0x42b420 GetWindow
0x42b424 GetKeyState
0x42b428 GetFocus
0x42b42c GetDCEx
0x42b430 GetDC
0x42b434 GetCursorPos
0x42b438 GetClientRect
0x42b43c GetCapture
0x42b440 FillRect
0x42b444 ExitWindowsEx
0x42b448 EnumWindows
0x42b44c EndPaint
0x42b450 EnableWindow
0x42b454 EnableMenuItem
0x42b458 DrawIcon
0x42b45c DestroyWindow
0x42b460 DestroyIcon
0x42b464 DeleteMenu
0x42b468 CopyImage
0x42b46c ClientToScreen
0x42b470 BeginPaint
0x42b474 CharLowerBuffA
Library winmm.dll:
0x42b47c timeKillEvent
0x42b480 timeSetEvent
Library oleaut32.dll:
0x42b488 SysAllocStringLen
Library ole32.dll:
0x42b490 OleInitialize
Library comctl32.dll:
0x42b498 ImageList_Draw
0x42b4a0 ImageList_Create
0x42b4a4 InitCommonControls
Library shell32.dll:
0x42b4ac SHGetFileInfoA
Library user32.dll:
0x42b4b4 wvsprintfA
0x42b4b8 SetWindowLongA
0x42b4bc SetPropA
0x42b4c0 SendMessageA
0x42b4c4 RemovePropA
0x42b4c8 RegisterClassA
0x42b4cc PostMessageA
0x42b4d0 PeekMessageA
0x42b4d4 MessageBoxA
0x42b4d8 LoadIconA
0x42b4dc LoadCursorA
0x42b4e4 GetWindowTextA
0x42b4e8 GetWindowLongA
0x42b4ec GetPropA
0x42b4f0 GetClassLongA
0x42b4f4 GetClassInfoA
0x42b4f8 FindWindowA
0x42b4fc DrawTextA
0x42b500 DispatchMessageA
0x42b504 DefWindowProcA
0x42b508 CreateWindowExA
0x42b50c CallWindowProcA
Library gdi32.dll:
0x42b518 GetObjectA
0x42b51c CreateFontIndirectA
0x42b520 AddFontResourceA
Library kernel32.dll:
0x42b52c SetFileAttributesA
0x42b534 RemoveDirectoryA
0x42b538 LoadLibraryA
0x42b540 GetVersionExA
0x42b544 GetTimeFormatA
0x42b548 GetTempPathA
0x42b54c GetSystemDirectoryA
0x42b550 GetShortPathNameA
0x42b558 GetModuleHandleA
0x42b55c GetModuleFileNameA
0x42b560 GetFullPathNameA
0x42b564 GetFileAttributesA
0x42b568 GetDiskFreeSpaceA
0x42b56c GetDateFormatA
0x42b570 GetComputerNameA
0x42b574 GetCommandLineA
0x42b578 FindNextFileA
0x42b57c FindFirstFileA
0x42b584 DeleteFileA
0x42b588 CreateFileA
0x42b58c CreateDirectoryA
0x42b590 CompareStringA
Library advapi32.dll:
0x42b598 RegSetValueExA
0x42b59c RegQueryValueExA
0x42b5a0 RegQueryInfoKeyA
0x42b5a4 RegOpenKeyExA
0x42b5a8 RegEnumKeyExA
0x42b5ac RegCreateKeyExA
0x42b5b4 GetUserNameA
Library shell32.dll:
0x42b5bc ShellExecuteExA
0x42b5c0 ShellExecuteA
Library cabinet.dll:
0x42b5c8 FDIDestroy
0x42b5cc FDICopy
0x42b5d0 FDICreate
Library ole32.dll:
0x42b5d8 OleInitialize
0x42b5dc CoTaskMemFree
0x42b5e0 CoCreateInstance
0x42b5e4 CoUninitialize
0x42b5e8 CoInitialize
Library shell32.dll:
0x42b5f8 SHGetMalloc
0x42b5fc SHChangeNotify
0x42b600 SHBrowseForFolderA

This program must be run under Win32
.idata
.rdata
P.reloc
P.rsrc
Stringl
TObject
YZ]_^[
~KxI[)
SOFTWARE\Borland\Delphi\RTL
FPUMaskValue
_^[YY]
_^[YY]
tVSVWU
_^[YY]
msftedit
riched20
riched32
riched
RichEdit50W
RichEdit20A
RichEdit
SVWUQ3
$Z]_^[
YXZQRPR
C<+u?E
kernel32
GetDiskFreeSpaceExA
_^[YY]
XH;XH~
KH9KLr
KH+KLQ
;CHRQ~
YZ]_^[
{H+<$;
CH;CLv
CLYZ]_^[
RPQR, PQR,
PUh0x@
uxtheme.dll
DrawThemeBackground
OpenThemeData
@=f;B=~
f9X=t`
f9X=},f9H=~&
f9X=~
D$$+D$
D$(+D$
D$,+D$
Ox1RS1
Nu%QRP
PPPPPQRj
PPPPPQRj
u^ZYXPQR)
@tGHuD
RRRBRP
MAINICON
sLf;N u
CLf;H"
tSPRQj
fXfX_^[
comctl32
InitCommonControlsEx
PSAPI.dll
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
GetModuleFileNameExA
GetModuleBaseNameW
GetModuleFileNameExW
GetModuleInformation
EmptyWorkingSet
QueryWorkingSet
InitializeProcessForWsWatch
GetMappedFileNameA
GetDeviceDriverBaseNameA
GetDeviceDriverFileNameA
GetMappedFileNameW
GetDeviceDriverBaseNameW
GetDeviceDriverFileNameW
EnumDeviceDrivers
GetProcessMemoryInfo
kernel32.dll
CreateToolhelp32Snapshot
Heap32ListFirst
Heap32ListNext
Heap32First
Heap32Next
Toolhelp32ReadProcessMemory
Process32First
Process32Next
Process32FirstW
Process32NextW
Thread32First
Thread32Next
Module32First
Module32Next
Module32FirstW
Module32NextW
need dictionary
stream end
file error
stream error
data error
insufficient memory
buffer error
incompatible version
YZ]_^[
{4+{l+{d
;CdwpV
)sh)sd)kT
KX;KxwV
Sp;SxsP
SpJ)Sl
_^[YY]
S0;S(t!
S0;S(t!
C0;C4t8
C4;C0s
L$ #T$
L$ +l$
L$ #T$
T$ +l$
S0;S(t
C(;C0s
C4;C0s
K0;K(t
C(;C0s
K0;K(t
C(;C0s
C4;C0s
K0;K(t
C(;C0s
C4;C0s
K0;K4t.
~0;~4w
_^[YY]
_^[YY]
CA_^[Y]
>;{,}0
YZ]_^[
D$,)D$4
D$,)D$4
D$,)D$4
tRNSPLTEU
YZ]_^[
TRNSSV
IDATIHDRPLTEgAMATRNSIENDS
tahoma
Please select a language.
Cancel
English
tahoma
_^[YY]
tahoma
Cancel
Browse
QQQQQQS
Wizard
MAINICON
tahoma
Verdana
QQQQQQQSV
""""""""""""""""""""
ProgramFilesDir
SOFTWARE\Microsoft\Windows\CurrentVersion
:\Program Files
Quick Launch
Software\Microsoft\Windows\CurrentVersion\GrpConv\MapGroups
\Microsoft\Internet Explorer\Quick Launch
\Common Files
ProgramW6432Dir
QQQQQSV
Software\Microsoft\Windows
\CurrentVersion\Fonts
DllRegisterServer
@$&%19
QQQQQQ3
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
DisplayName
DisplayVersion
VersionMajor
VersionMinor
Publisher
DisplayIcon
UninstallString
URLInfoAbout
HelpLink
InstallLocation
InstallSource
yyyyMMdd
InstallDate
Language
EstimatedSize
NoModify
NoRepair
SeShutdownPrivilege
QQQQQSV
Smart Install Maker
MAINICON
tahoma
Tahoma
$inst\
QQQQQSVW
SOFTWARE\Microsoft\.NETFramework\policy
SMART INSTALL MAKER
..\sim.exe
The setup files are corrupted. Please obtain a new copy of the program.
Runtime error at 00000000
0123456789ABCDEF
msctls_progress32
SysListView32
System
PREV_PROC
MIN_WND
DFLT_BT
CNCL_BT
BUTTON
!
COMBOBOX
STATIC
deflate 1.1.4 Copyright 1995-2002 Jean-loup Gailly
unknown compression method
invalid window size
incorrect header check
need dictionary
incorrect data check
inflate 1.1.4 Copyright 1995-2002 Mark Adler
oversubscribed dynamic bit lengths tree
incomplete dynamic bit lengths tree
oversubscribed literal/length tree
incomplete literal/length tree
oversubscribed distance tree
incomplete distance tree
empty distance tree with lengths
invalid block type
invalid stored block lengths
too many length or distance symbols
invalid bit length repeat
invalid literal/length code
invalid distance code
invalid distance code
invalid literal/length code
kernel32.dll
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
WideCharToMultiByte
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
user32.dll
GetKeyboardType
MessageBoxA
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32.dll
SysFreeString
SysReAllocStringLen
kernel32.dll
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
advapi32.dll
RegCloseKey
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
AdjustTokenPrivileges
kernel32.dll
WriteFile
WinExec
WaitForSingleObject
TerminateProcess
SystemTimeToFileTime
SetFileTime
SetFilePointer
SetErrorMode
SetEndOfFile
ReadFile
OpenProcess
MultiByteToWideChar
LocalFileTimeToFileTime
LoadLibraryA
GlobalFree
GlobalAlloc
GetVersion
GetUserDefaultLangID
GetProcAddress
GetModuleHandleA
GetLocalTime
GetLastError
GetFileTime
GetFileSize
GetExitCodeProcess
GetCurrentThread
GetCurrentProcess
FreeLibrary
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
DosDateTimeToFileTime
CompareFileTime
CloseHandle
gdi32.dll
StretchDIBits
StretchBlt
SetWindowOrgEx
SetTextColor
SetStretchBltMode
SetRectRgn
SetROP2
SetPixel
SetDIBits
SetBrushOrgEx
SetBkMode
SetBkColor
SelectObject
SaveDC
RestoreDC
OffsetRgn
MoveToEx
IntersectClipRect
GetStockObject
GetPixel
GetDIBits
ExtSelectClipRgn
ExcludeClipRect
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreateDIBitmap
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
CombineRgn
BitBlt
user32.dll
WaitMessage
ValidateRect
TranslateMessage
ShowWindow
SetWindowPos
SetTimer
SetParent
SetForegroundWindow
SetFocus
SetCursor
SendMessageA
ScreenToClient
ReleaseDC
PostQuitMessage
OffsetRect
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
InvalidateRect
GetWindowRgn
GetWindowRect
GetWindowDC
GetUpdateRgn
GetSystemMetrics
GetSystemMenu
GetSysColor
GetParent
GetWindow
GetKeyState
GetFocus
GetDCEx
GetCursorPos
GetClientRect
GetCapture
FillRect
ExitWindowsEx
EnumWindows
EndPaint
EnableWindow
EnableMenuItem
DrawIcon
DestroyWindow
DestroyIcon
DeleteMenu
CopyImage
ClientToScreen
BeginPaint
CharLowerBuffA
winmm.dll
timeKillEvent
timeSetEvent
oleaut32.dll
SysAllocStringLen
ole32.dll
OleInitialize
comctl32.dll
ImageList_Draw
ImageList_SetBkColor
ImageList_Create
InitCommonControls
shell32.dll
SHGetFileInfoA
user32.dll
wvsprintfA
SetWindowLongA
SetPropA
SendMessageA
RemovePropA
RegisterClassA
PostMessageA
PeekMessageA
MessageBoxA
LoadIconA
LoadCursorA
GetWindowTextLengthA
GetWindowTextA
GetWindowLongA
GetPropA
GetClassLongA
GetClassInfoA
FindWindowA
DrawTextA
DispatchMessageA
DefWindowProcA
CreateWindowExA
CallWindowProcA
gdi32.dll
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
AddFontResourceA
kernel32.dll
WritePrivateProfileStringA
SetFileAttributesA
SetCurrentDirectoryA
RemoveDirectoryA
LoadLibraryA
GetWindowsDirectoryA
GetVersionExA
GetTimeFormatA
GetTempPathA
GetSystemDirectoryA
GetShortPathNameA
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetFullPathNameA
GetFileAttributesA
GetDiskFreeSpaceA
GetDateFormatA
GetComputerNameA
GetCommandLineA
FindNextFileA
FindFirstFileA
ExpandEnvironmentStringsA
DeleteFileA
CreateFileA
CreateDirectoryA
CompareStringA
advapi32.dll
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
LookupPrivilegeValueA
GetUserNameA
shell32.dll
ShellExecuteExA
ShellExecuteA
cabinet.dll
FDIDestroy
FDICopy
FDICreate
ole32.dll
OleInitialize
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
shell32.dll
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHChangeNotify
SHBrowseForFolderA
0 0@0L0P0T0X0\0`0d0h0v0~0
1:1B1J1R1Z1b1j1r1}1
:":0:6:>:P:`:o:{:
;*;0;8;B;^;i;
>&?/?8?C?L?S?b?i?
041>1Y1b1
3 393B3`3f3n3
5'575=5E5
5@6H6P6V6\6d6j6p6w6
<M<]<s<
? ?8?F?z?
00090k0t0
2,343?3n3
3F4J4P4T4Y4`4f4n4y4
5'5/555C5^5s5}5
6L6U6Z6}6
3&3f3m3
5$5(5.55595S5\5e5q5{5
6D6R6W6p6
77+787J7R7Z7b7j7r7z7
8"8*828:8B8J8R8Z8b8j8r8z8
9"9*929:9B9J9R9Z9b9j9r9z9
:":*:2:::B:J:R:Z:b:j:r:z:
;";*;2;:;B;J;R;Z;{;
<(<,<0<<<@<D<P<T<X<d<h<l<x<|<
=(=,=0=4=@=D=H=T=X=.>6>>>F>N>V>^>f>n>v>~>
?&?.?6?>?F?N?V?^?f?n?v?~?
0&010=0i0n0
3 3F3Q3
95:\:m::;
=q>}>$?
?"?+?4?=?F?
5l7t7~7
9 9&989B9Q9h9w9
9D:f:n:Z;
<8<@<)=
?"?U?z?
> ?:?D?`?m?~?
0|1P2!3)3m3u3
4%4+474B4H4T4
;#;/;6;
==>^>~>
>>?R?W?w?
1B1P1
152V2k2
5&5R5p5
:1;A;2=
3 4+414R4
;V;$=+=
?3J3`3o3
5&51575%616v6`9
;;U;Z;
>H>P>!?
1"171C1Q1b1j1w1
2 2$2(262>2F2N2V2^2n2v2~2
2k6q6w6}6
7-7175797=7A7E7
<*</<<<A<N<S<`<e<r<w<
=&=+=8===J=O=\=a=n=s=
0*0/0<0A0N0S0`0e0r0w0
1&1+181C1
363D3K6b6p6
99#9'9+9/93979q9
4"4'4q4
4d7h7l7p7t7x7|7
1?23+383J3`3l3q3
3-4:4s4
5(5,505<5@5D5P5T5
8R9V9Z9^9b9f9j9n9
0(0,00040
4-5B5]5
<)<-<1<5<?<^<j<v<
=-=4=;=@=`=w=t>
51585M5Q5U5Y5c5
1=1K1p1~1
6@7D7H7L7P7T7X7\7
8,8:8L8T8\8a8v;
>'???E?M?_?t?
1(3>3C3=7N7
=->I>M>Q>U>Y>]>a>e>
0 151G1W1
5!535F5V5]5j5r5z5
66,6>6K6W6d6v6
7 7$717?7
8$969Y9|9B:r:
:$;8;M;W;w;
3$363<3H3L3Y3g3
566A6]6o6
:I<J>}>
5K5\8^9
;);@;R;g;
;&<I<x<#=2>
0!0&0X0
516;6O6`6f6l6r6
9W9_9m9
;<6<~<
=0>I>p>
?4?M?u?
1*1.12161:1>1B1F1J1N1R1V1Z1^1b1f1j1n1r1v1z1~1
292T2o2
3,3G3b3}3
4*4E4`4{4
585S5n5
6A7'828?8L8w8
?>?T?Y?`?
1(171F1R1
6!6'616O6Z6k6u6
;%;/;C;U;i;{;
<'<9<I<]<o<
=)=5=G=j=
>,>I>j>
? ?$?(?,?0?4?
1%1D1h1
1'2N2y2
474K4_4u6y6}6
6*777=7
7O8S8W8[8_8c8g8k8o8s8w8{8
989M9b9y9
:-:D:V:k:}:
:D;I;S;
;(<=<O<a<
2;2\2v2
;6;];m;x;
484j4w4
5=5Z5g5z5
6"6,626<6F6P6Z6d6v6
7 7,747@7L7T7`7l7t7
8 8-858@8M8U8`8m8u8
8&9[9r9
94:M:d:{:
;:;^;x;
9%:0:S:
;(;G;k;v;
<<1<G<j<
<2=>=s=
>.>Q>[>c>n>x>
?7?e?p?
!0,0Q0
0*1[1f1
1#2.2Y2
313Q3W3w3
5(51585M5]5
6&6G6W6g6s6
7+7?7a7}7
:';?;l;
<><U<z<
?%?D?r?
22*202:2D2N2X2b2h2r2x2
3"3(32383J3Z3g3z3
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4d4o4y4
,00040
1@1D1H1L1P1T1X1\1`1d1h1p1t1x1|1
2\2`2x4|4
5(545@5L5X5d5h5
5H7P7T7X7\7`7d7l7t7x7
8 8$8(8,8084888<8@8D8H8L8P8T8X8\8`8d8h8l8p8t8x8|8
wxr""/p
wr""/p
wwwwwwwx
DDDDDOx
DDDDDOx
Install
(ShlObj
System
SysInit
KWindows
UTypes
sActiveX
3Messages
CommCtrl
*ShellAPI
RegStr
?WinInet
UrlMon
WKOLPng
RichEdit
FKolZLib
TlHelp32
GMMSystem
NewDisk
SelectLang
Wizard
=ReplaceFile
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
version="1.0.0.0"
processorArchitecture="*"
name="Microsoft.Windows.SIM"
type="win32"/>
<description>Smart Install Maker - create setup software</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="requireAdministrator"/>
</requestedPrivileges>
</security>
</trustInfo>
<dependency>
<dependentAssembly>
<assemblyIdentity
type="win32"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
language="*"
processorArchitecture="*"/>
</dependentAssembly>
</dependency>
</assembly>
Smart Install Maker v. 5.04
16744576
Welcome to installer Versium Research
Copyright
2021, VR
Tahoma
16777215
16777215
Tahoma
disk@$&%19.pak
1557531
Copyright
2021, VR
Versium Research
http://
Versium Research
Versium Research 10
@$&%01\VR\Versium Research
13533795
Windows 95/98/ME/NT/2000/XP/2003 Server/Vista/2008 Server/7.
Versium Research 10 Installation
16777215
http://
Versium Research 10 Uninstall
@$&%04\Uninstall.exe
@$&%04\Uninstall.ini
8388608
Versium Research
Versium Research
Versium Research 10
1004134
@$&%04\RunWW.exe
@$&%04\VisitTR.url
@$&%04\BSKbrowser.exe
@$&%04\Versium.exe
@$&%04\Uninstall.exe
@$&%04\RunWW.exe
@$&%04\VisitTR.url
@$&%04\BSKbrowser.exe
@$&%04\Versium.exe
English
Welcome to the Versium Research Setup Wizard
This wizard will guide you through the installation of Versium Research.
It is recommended that you close all other applications before starting Setup. This will make it possible to update relevant system files without having to reboot your computer.
Click Next to continue.
Setup will install Versium Research in the following folder. To install in a different folder, click Browse and select another folder. Click Next to continue.
At least 1.49 Mb of free disk space is required.
Click Install to continue with the installation, or click Back if you want to review or change any settings.
Please wait while Versium Research is being installed. The installation will take several minutes.
Completing the Versium Research Setup Wizard
Versium Research has been installed on your computer.
Click Finish to close this wizard.
For installing Versium Research on disk %s insufficiently free place. Try to choose other disk.
License Agreement
Please review the license terms before installing Versium Research.
Choose Install Location
Choose the folder in which to install Versium Research.
Choose a Start Menu Folder for the Versium Research shortcuts.
Select shortcuts
Select additional shortcuts.
Ready to Install
Please wait while Versium Research is being installed.
If you accept the terms of the agreement, click I Agree to continue. You must accept the agreement to install Versium Research.
Select the Start Menu folder in which you would like to create the program's shortcuts. You can also enter a name to create a new folder.
Launch Versium Research
View Readme
I Agree
Next >
< Back
Cancel
Install
Browse...
Do not create shortcuts
Destination folder
Choose Start Menu folder
Create a Desktop icon
Create shortcut in start menu
Create a Quick Launch icon
Information
Copy:
Impossible create file:
Creating registry entries...
Creating shortcuts...
Saving uninstall information...
Removing backup files...
Finish
Installation Versium Research
Destination folder:
Start Menu Folder:
Additional shortcuts:
Are you sure you want to quit Versium Research?
Setup needs the next disk
Please insert disk %s and click OK.
If the files on this disk can be found in a folder other than the one displayed below, enter the correct path or click Browse.
Select the folder to install Versium Research in:
Select any additional shortcuts for Versium Research that you would like created by the installation:
Extracting files...
This program must be run on
Enter the password
This setup is password protected.
A password is required to begin the installation of Versium Research. Type the password and then click "Next".
If you do not know the password then click "Cancel" to cancel the installation.
Installation password
Execute the commands...
Registering:
Install Versium Research is breaking.
Creating INI entries...
Installing
Setup is now ready to begin installing Versium Research on your computer.
Versium Research will be uninstalled from the following folder. Click Uninstall to start the uninstallation.
Uninstall
Uninstalling from:
Yes, restart the computer now
No, I will restart the computer later
Uninstall Versium Research
Remove Versium Research from your computer.
Completed
Uninstallation Complete
Uninstall was completed successfully.
Delete File:
Please wait while each of the following components is removed...
Remove Directory:
Versium Research was successfully removed. Click Finish to close this wizard.
You really want to break removing Versium Research?
Unregistering:
Setup has finished installing Versium Research on your computer.
To complete the installation, Setup must restart your computer. Would you like to restart now?
Creating directories...
Visit product uninstall web page
Please read following information.
Setup has finished installing Versium Research on your computer.
Visit product web site
You must be logged in as an administrator when installing this program.
This setup requires the .NET Framework version . Please install the .NET Framework and run this setup again.
The .NET Framework cab be obtained from the web. Would you like to do this now?
File already exists:
Existing file:
New file:
Overwrite
Overwrite all
Skip all
An error occurred while trying to copy a file:
Click Retry to try again, Ignore to proceed anyway, or Abort to cancel installation.
Please specify the location of the next disk.
The file "%s" could not be located in "%s". Please insert the correct disk or select another folder.
tIyBW1q4!
hG:h"}
DMh;I8
k0KWW@
dO`Ln\x
tv_C5n
dET;'V
]?Xr_}
}1'yHp
YqI7t(bL
K5xOcx
GZl}!<h
[S[S[S
d`~CmQN
ngIqIm
y,7u6-
l!ju@N`fk=v
*c!IK0L
Xw{\zD]
mwHJ"k
I[Lzhh
y'raD3
O%H"~"i
j/EI8>
AdA("'
rV"wXR
8L]%kn*+
yWS{-WM
[dpkC!Vax
wPwR7|i
[WVQf-
BffFNV6
!(taY\
8~+aMiFc
8S^'7e2
+ZwBCMc
]u/%F77u
vdqT*8
+0Dy(
J($'G
n#]@{xe
0bCCP
fTgFS
]%-AK,Y
wQ0De=
YYr85q
Ij\N<$
'fy/Ov
VK\:$
zgu+,n
~hQB+>
HV[-O
cm)S^!
wK%vR~k
%uH^9R
IAveD
~GH=].q
"{G|Rm
R!gi)Cr0*jg
-~C,0.Rp
<T|>i\Ghl
OHj%$'8]z
mgCU2p;
w\-]bV
c0O,`m!
M]Mq]m
>H>$)4
DYYcbN>>
.td<i[~Vw%
^2Us7P
"Fbfe&
RW&.ds
ZWy}[xs7
[YlOuonq
L?wZF
'2o$*q
szILt_Nz)
:J%'.q
[H^AE!
!$oSfG
&kM3t/'
d>COl2*
n"1`k{
&[mG&e
lG,n<bK)
dp#uQ=/(
sU6'!?
h]@0w9
Zkzc3kW
5yA@jq
}vR592\T
tEiQixG
Ii2A!u
{ZZxA<
ao?a0K
+H[&&W
*/AunAj
Y;l&W@MU9
68+)a25k
MLi$k$
3nG(u
B{MaDC
E%i\(t
WaZ'~La^
J6'e(\
hZ.]^P
q|cH<j
eBo3Y]L
Lk%vEa
4{~PL]h&>
.PL;@o
WoM'U@
Wbc{ E
Rx>zL#n0
ZlyhVMX
.yP-h
jb!Z=p
)51i(BW
W;[ktm
j/vGTX
iDPK62
%*a,PK
#G\K;4n
~r1[vr
fDC2)hp
lI"x5>[
L`.as)
O'1^U!
@xm]G;W
R=n,[5
rX+JwNxf
N}a1[7T
6nWatP
ck}oN[vw
5w:0&w
<Q!x4&
}>)n@D-
e3}?hd
ks1[4
q$n-YD
<Wu&R\
(1>k&@
utmOn`
(X!b@.
Y}P\nx_
74HL)()h
!AT?p^
DJz3SO
2OiS0-[x
[FRKix
#OPs]`,
h&YtCz
LYZ;=O>&
nJ^"r0e<
( w^^w
%!^9%#
r[_@{LC
=:X$JRGd
aDl*p>
)/#+'&>>#
V$f3_Y
:_VGc|
/N{y{p
Va6fDy
zyy?Gwu
-O? O4
,''NS],
O?;[`6
%1_"XC
9]4 Mw&
\7XnxL
_y!o!_
LU&>mn
))#i(k`
Vmwxg;
<(^-INH
5FFg<V
2r"&b@
UNWoZN
~)'"LFwc%
>hU`88
1Qj6)
gI6]g#
=&MZ_}#
j(-kQ
M@4g-
N3 NUy
0I:U/
#t5JY
#ev3~C2'=
hgi%%wcSh
}r@@n&7
H>`C5S@
hRyJrK
c]UGT5
VW,x;Q
bzQn|9
:9IlcE
EsWG)1#v
,x^6lR]T
^[Y,3d.e,[
RpHCJC,
xt\<[2-
8f5lp
SQ|RgMU
0MvG$u&awi
[>~nll
E(b_$L
q]:-]2n
ghw_(3
7.z!-n
f\wDr{^@
Dl2u/
{d;==p
$^4gjr9
gyx1qQ
wJ=9>1
bUh>[\
x`#85z
7ZVQm
w]N(=jI
"8MBII0
d_gZ4
jTW9u^`
T~2%q5
8~dfXMg
J"~r<4
{BBJi*
icIN`-
c=Ba<zO)
7p9|9y
v*%M9]
X+c22Ch
2den:&
~$^ksg
)i2"$l
0YncmJ
$ht9W[
?+[z,h{
2EWRgz
+!L&Dp
1LSp`Y
)s=uQ<$
0E7#&$B
=-Z_1N
z($\mf
2A91N<
\0EyB8
.^]`'H
e{NaZt
Ozb>r<
U_4v&HV
r=P<fN
,#!q-`t
6{-[2V
D-EVFE
a~kC+4
BZ<av"8
O'=0}ib
Fis][}L(^tDT
96kBRVQ
*~vqO,
md]f\<
'+CjS?|
k7P(9H
u3LERl
,0U4Z
DZA30Mq
R[j"6srG
kfGs]=|
Jj{6{_
Z@(NpF
<j%%h&
P|FE'^
tWK9swC
}vs}08
;_j'}(G&a
Ok\jX(
H|I9KdB
bn6iNJg
UN@}(%
q/i(,3
~fsqo f
}x[$@^
fTc0e!
+h/-r)
1'i0bh
gQzuCwx
)Zh$BC
G@qwS
?SJTJO'
zmb:0+N
)X/<}b
%z9h2U
c,HpC3
?6m@W=
]\mU{Z2
UXN4]&
Ep,dz"
JG vmK H
N6fTTq
Nme%w/
D4_W8Bx
}X%x^9
FL'=RpwK
0u)Fo0
7mf_POr
=$/nYV
"]"JYz
jFj$I
u2A#Po
c-`rZ}|
H,<i#f
Nd%c^*U
R+FC(N+
4S_jZEk
^VSm1s
tm$453
3Iy|yYsmI
mynBf6
= PUIX
Hce%p(
]K.j*P
J>enOVqRD
":#^~q<
U`K?tj
z!=(N&
"=sMIW
P&#9.U
YM^=_d
(A-~ZF
z}H2ZJ[
5WMdkQ
JG%]DB
q}WJeF
=7k~P
v,5Z}NP
Z 0NZ|
@Sefqc
<v\n)6
B.Hf)j%
BjDGv%H@
1Y9b>?
|Mpm=
}E?`UY
i/Ob!o
Rt4MtK
0+wF{RXU
Qm,@vl
tRrLi;
3_=31L
3E=i*@
^rRjqM
f$EG=I2
,S]%`C g
!tEFp)
]?Sl;1
,2m}n'
3GUv}}K
EwoqPW
$10F,E|$
H+(h{i-
C~Eo**
g!/dr[
\Yy`C{$
4WgQ0f
XW[\T0d-
1^Np%d
i!`wXJ
{"jX1LG]Y
Ammq0&
_g;hog@
DXlIK3
b>^"do`
+AwCCE9
.w45)k{P
Kv`D(
W5UyZfV
cW.avJ
r}Xztd
BMks6E
&}*q\M
m!\$T`H
BY+rBU
t0|us/
}<}.Oa
p.n_-cl
eA-=W`
v)tI2!
1&L(aR
1J:ww}
Bpl+iL'
-DQlb1
{Z^vb35
}+D?[:M
AM!m#Q
-/w3gl
M1)v5S
)9C(2P
K_`inC
\in'%/
&"Zpss
k:.!}:
^OmQ`H
nU>2Nc
QK(\FW
=:Sm!=
_pKw4(
9DKgkq
\xiQ7x(
j4Y/&K4'
C@;SZr?
j=o~Tf>
9zQ:Ye
{wB5w7
|?8Xo$
kfF!3F
>Pfu]y>
,8WvBb
!.1jO@
W{rhfv
wcw`xi
>N*3r9H
?&oHGT
Dx:`!|
II e\}
E(O12]
u|pg5V
J}R_hz
)Gd9KO
w:vh!Zt_
|ft[PM
nSsn~s
&/dU3|l`
G2\&ST
IHTBziE
j+7V$Q
^<[TO]H/
RDcbp:
i7}(ft
deEHzX
Cd i9:
nC,Zc5
])x-P16p
tTL;SI
j8=b_@
K)uSM3n)
15}wF_
[OW7K#
?i*z&c
)pmy|j
ux1f+y
.;"D/H
c94G)i
zd4/#T
jFd;
MB4/76
;OSTeN
g@L[g4
(0DBT<
E_)QBV,
n0#9u-
|8M~V
WV[`y
Wdmr|g
IFyrN;qm
HcV^5^)<
|d!/;&
PPw%Qo
dST.mm
W1o|h_
a=I#FYNB)
&*]M~:
-J~|!O
;ZRRU==
8AJ$%k}B
cEE:l<
%nu@&y
pa XtNI
90I{}h8
R,a}.0SI!
Q@*{z#
"EXa;Cr
EfS~Fm
K{>0!
IFr;ia
wlB)bj
mMja&P6
aJ'&J<
[De;[0
RJMQjq
B@Lg>T*
X:lVX'UX
#eZv{-
*ZVG.
-\Wh.L
\l#aZ
a6etvd
'3./;$
8FH[R(
j@57:.
A\w0G)
/hp5-V
S'm* j
0iE"iARM
nFQWm{
W:b yw
ca19`~
@}%43s
Q|q%l3QA
Xs5?BT
Sj=MJ4a
i*c'%G+
EiC^2G[
/YeO9^e
pm>WKj
% lp6hGj-
kSH9;C
h$`W7!!!x;D.
iaa6JOp
^vFa j
;dS7>c
^k,wc\
{#i=>|
WB$%]O
xBQ- 6
Uug\JYA
C]6>w9
\nmb%+
Ey6$QF
yLre6-
|gO-Q*{
vxT7amS
}&+EKN
tf_U~f
a3ocI!
MJYi@Z
mU=dT
cz"Fkaaq
6c+aA3
Ha/#jP
~5!ykWB
<S!s"8V
?Zc0No
2e&VHIs
j;Ph&U
n'>rSn
]~EiFv%
m96w0AnQ
3$Vd|e
zCn0ti,
FHT/V!
:~k{mEw
@Wtq]J
p&XZydpj
sxBojm
PQ}{F 5g
q}pA+s.X
'[1yo,
-F@B?
gk1>q1_
\XUG;S
w?+IyF
&AXkOY
b1\8J7
RB5^D2:r
\r-`];
B#*ex40
Y~WUK>
a-^O2lO
b5j#hfZEH
EE(4y`
)~cE^}
FOW]f[2J
?IRHOx
;]}OT`
p)_K?8
$Gma6O
.{@@<
J7.O^a
NS} SPl
cmh)O!
J+6+<b
11>Kl%
)^&BD"
ElY:gV;
Cq}7uW.
wvA+QM|\
%fLfTA
_ZTkrz
.mm]O*l
~<VA{>-0
g,rlY$
nJH!G2%
M-V J!9(a/
}H-'Ln
yL/n6'Z
1^TfT-
S1'6n~
df{6)D
bHrm>>
X$H-!r
>0I<JpeF
#gk+Q[D
+NZ#d4
<]:ed5
$@V'[u`
& J}DA
n\$)r5
V98I2|:
C6Nt#;H4\"A
fYjz#S
g"t8-:ix
N_dxvB
$:z2rC
y5Q*UP
Y_tgO9
672E\EJ
\p8F'*3
_6yY.MAf
96q0Iz
}Cb|lnI
f$}o(Y
_xBJS"}
x'M\oc
xjo-`)b
o#*]@;
iO2]:C
{{8gFzi
t`V~7N
!?VB"|h
[m;3T<G
7|[-,O*C
((~9$X
oLrA'y
#;[tb-x
C^s'T%
*GWP.z
"7 J}/
)[=cV5
41s/{AM/
8$~(bOC
SM79Pd
RGsnw$
_ G`ok
b6Bri+
vuW?;5
W.1o YN{
tYRrYpI
`zcf>t
A%cy MU|
#4d-s6
'k#:Zq
vx;?&r{
h]rNW4Y
6giAoud
?od8(7
"e)i3f;c
i%:b{
mGg[(?Ku
54F,k;
K:("/3
F#6CN q
s~,jLS
]+s* 9:
z,~wYR
!XQWT1
Pee>0(
wm#CXY
8u,? e
@LeISYw!D
E [1/#
6!38* >(
etO83cd
Q>bz@Td.
D:3|xy&
{3p11E
Z)n}ca
A!Aj4x
bRDB:H
`K3Pl
Api<S
" nGuN
9y-`"*6
_481MRI
]Sm|;J
p-GM6I)
5&(Y\A
zP{(US
,Lk~WZ
Yt" ?2
R~A\pv
xQj- )B8}u
@("#Cj72
KV7{PyU
N%Gq#7
{nz;/C/N
bQ`|2V
Nnc-s_
BiwZfV
u-B#R-
C23m]]>
JF#J~,
,/.o'JA
]uI.o`
|cVVfR
}C0K'w
R!b!|C
y1w5n"
PDPdGs
:5<"5j
hQ8wcw
TUI/\F
JB!>(T
<&Q,u!d$g
@aY0{9Y
Bd6IJfo
j~0msU
2^vv5\<
kE{`I0#
|i]nW3.r
HhR)2|v
C8&<5
fk^fxo
Imd>4&
cyYo8l9
XR2 w
3QpA!(
?w1c!#(
(sRwJ+
~g9h=[
^GMfv<K2
&g:g'x
9cICHl
aYSLt"
1D`kKn
DW_S9=
yw ?{o
pYO,`(V
`-05Np)
3-|E\aG
d"pLW[
Lw4Hs'
EctW>C8U
V2Ri%Wy:
<:!O]>
uo5RBo
Zx"AhPh
Dl*kfkIR;
-85tSI
hZ'D8;z!F
/"S|"X
F,(M"*
853w^
iAe-LHO
OM)XmQ6
`!N\]
f.Y&Gq=
|Zy\9m
OoOp1o
SK34$A
}|tWy"
lfbY6xM
jt-uu>$
AcvIGa
9Q8?`E
E&8,@=P:@t
zpzIt0
dQKx*`
/[suIhi
gpcVT5DD
89Bj^o
z0(#-;
&uK%*~
24]BeA
\B(fNX
5_hSLb
4[#vY
:}C\1wB
ewK{fb
|=i/Z+
I@KF?)
3(hwe:
p'V^je
aW`W_W^W]+v
W8V$O@
;#1bQ!
T>F1v*|
gpss>2
~,)Hr#"
7Arl74cb9
UC5-
N~"cP*
d*EDj?
=yZt9S"
B"Znkj
O9x''s
FHe(1|
nvI\MP,
$FLv) 
`l&s(e
<6<xQ4
,/bg-[
N#sg?}
[K2Hxd
'JxJzUDd
.-m(6u
<n#u|o-
H+}bEV
}RDQcnR
H *1uA
D%SA}VMP
O{sAFD
"A`3 A
')'44K
-J^TZI
U)1RbK
L6)8}q
;G@G[M
J":IYx
v@qSYa
[<}"wB
Q[!?AJ
6t>Xv
4;HJ7C-
odhM1N
Tjo__?Qy
?'M|JC
D$DSfUudpU{
o?Z"?o
4kA+y%
G"]BGxL
LP^]I)
*$VRWA
3|,@o
NhO %z
Z1zT%U
0z"-my
J;s{YTW
ozX=v!k~
`0z**b-~
P*se~
@nE 
9~\\<'
E}/r;_
SgYvYb\
1&?W2
8^%7kHxs
gZU5j%[En
6A@BlU
q$h818"J
HpDWFf
,MSNa)
+6Ja6#hlb
-&X|85
uGu1^(
B`+!^P
}/-$<*
030"@7
LyMh]$B
3!1XNP
`7SD#D
L2GL"O
XDIb38
FTb[>>
qV ]5%p
+kd(hX
TP#yRb
FM\yT\
T3DGtF
@(4q6!
1+b+@3
RlbkxC
cc% 3^
3tH+d~|O#
d$@;aQ
;^8@A2
+"ENko
6w*'X
c7at1$Ft
M0s|dD
||W'D\
43\ap0
94FpA
,!Odz>
Ig@HCd
q`{><q[
122:,HH
! iPgL,
4OIfaC
4n2IRh
F8%bIgfT
G6xG5n
`7>dM.
iX`hs$
&,DEwc>O
Gj(*BIl_
=\1CQFF
.B'PL@
:g~8$^
`o(3:B
'o<[a
@"`g%c
Sg2L3Z)D
:#[l`-
`7,N$v
N8<taW
>zkxzGD
'U8W8z
ofZ/HO
pZ~ex2k%
8A9]$
Ti%R{Mf};
z6ki6g
+W1N!YpY
xNwsWu^N<
3 B^$@
%L_<8i
<g_N2@.`
ca1N7GP
P=h2Wf r
$Z{tYTSK
Aj<Bzp
.`q_+uJ
$pm*d*H
/lxF~>
&rGL5ci
+,##(x
LN %i5
=(Te"d
C02.P_=C
D!d(|&p
a0~(@
0h\T82
:P5TC>FK
v77 P0T
JFpAoB
lphp47
P<Dcv4
2lt4i9
zdl`X$
T CL-p
oHl`S,
f:^2,
LQ 0*M
vt/o:T
$S~Pf9
8IC="j
%oDth1
PhC%>D
rRl &sEO
>B0@44
tL~X?x
@dnx>-
h9GCCM@
otf=Pc
eh-t3j3
Cl6EwY
ZT[,G^
DW<0Ua
ac7hd;
{g `Q4
uABE> l?
$6p`W1
5yc>b?
dUPm-s/
dFW(W-
#:@~O}e
e/jRh~7b/
hy[A=F
q>(2?.
g*(HY)3
/a1_ |
y0M,I*
ft}Hf
i^^$;0
R>uzA%
Z(Z0R8
IHZPZ@Ry_
-4)<Rp
Vs^CPv]
F@*<54j!
*},)wvQ
r>[0EH
1`?MxD
tqB;FZ
f`hlHj
u8kk*S
q7wf{A%g
CvEV{B
p~_$%X
eOpEJEH
O_uztmDy
^jDgdI,n
nIZzK`)n$
)w)w)w)w)w
~nmd_"
[p3d1y}
Lc+&Sh_'
7oW:1G?
(II<6Be
Y8/"Jq
D_JSAv:-
k:x>N+
};_!YBi
8un&-}V
REwRnZ
TSFNnZ
1"*6(h8>0
%nPjW*
%p^ii%
+Bsx;O
Z8W}d:
_a [Y&
c&:+&M
d9aQ-le
w%<8Om
4ggnz_+
mI8[e_
YzaKR|
Qs:OJw
#$4!K 2
F}D|lM%
i_h?Si+
?IOA1T?
>'8:s5
.xQ^j!
(?Ct&"
d^WMc0H/
I)ceOA>-2
2d<</q>3
~aF0]^
*R3zw+
{jLUGf[
HM,}^'
YQY^R`
J>BkrDr5
t[`N#^
,E;!3ka\
FQ/:0F
4U=ueF
v4|4gTfV!J
XK))2U
>:IN??~
p=-mQB
DKD]*Z
iqg)OK
2ca']I^
aLY9>
NY2Pw[
N?+cAZ
[u|MDl
zCA%46
:ov2@W
L=V if
{y#|wk
z K0Oqc4ex
65de1"
n4Kl$b
s{HgmX
]9.g.HB>
(*:n74
c VwIG
jk5}3[<{
=!R2yb
y2A[wQ"
lzOd3FK
]B{@ IO
x(1uD5
YU<|WX
_Fqt]f
ZQ1{evzH
jl%p8p
{4(<u^
pc\%.?
VDzc\s
#8hC^8,
lg*>|lv
a.KRM~^
/zC<IJ
cv+Nj4
Yl;S|>x
7l+Q4E
OK|[Cs
{L~@Z9|l
H9I8VzK
Q>MuGO
'? mxL?r_
(-V"f{0
V-rdD0
N71<Tf
Yb*!j?CEU
s"VQ`"%
>\LP5GN
DT^3s&
?b`|0_
+j:X_MxNXeCj
H)ow\+cA
'd8y>I
6\2y|0
$"X^]a
T&/[sg
,HTLNs
!tI8)u
X<io&+m9
U-7Dia7
eYjg-"
+|~n'>s
Vp^C! Z#
SaR^}dO)
QN6-g}
y?^56/
m>!(T}
o|}"qW
C/C6 "3
xcJ*h<
ij{:.I
8l{SB5
W[H<Hy
"'iQDK%o
w)Szf.
EJ~KuxQ
Sfs2-^P6
dol8s&
){|Pwa
Vm)WKK+
;r&C8V
zpu(C+
e1cJcBS
f0Z6a7
y6qIPL
^%F3F7#tW"
LOH+-WP
1o?wF90
-U<~-PW
WD4d<w7
-OO{"Nh
YFQh i
\= Jl?`
Ki&awku!
K;=TcU
e^:3*
f|=/Iip
Z!io:a
h|nWI1
j)`15:
^<{h|2
}KqVkFz
oH-'\Dm
wiHP [wX
6A+)2X
+5OzD`
%h:T^"d
>mvPL;Yk
{2dP,4(<0P
)b*m`-V
?0uJ7t
>[Hqx5:f
05zGh4
=V;z`W
aqSLB$u
w#>W*w
PW">|]
mn1;T$S
~[H+*O
@OO]y%
@vXzSSy
7ZKH4m
-zlzU}
6Cq"-b
*52/!x
cDNg}0
PU@MH}
UG|+@|
FY<V9}>
JdU57Z
J*CQN)zGL
n)B9!#7
ll5BNtI
[+XC<%
Inno Setup Setup Data (5.5.7)
Antivirus Signature
Bkav W32.AIDetect.malware2
Elastic Clean
DrWeb Trojan.PWS.Siggen3.109
MicroWorld-eScan Trojan.GenericKD.46340695
FireEye Generic.mg.5499fd2b9a83a2de
CAT-QuickHeal Trojan.Chapak
ALYac Trojan.GenericKD.46340695
Cylance Unsafe
Zillya Clean
Sangfor Clean
K7AntiVirus Trojan ( 0057dfe91 )
BitDefender Trojan.GenericKD.46340695
K7GW Trojan ( 0057dfe91 )
Cybereason malicious.b9a83a
BitDefenderTheta Gen:NN.ZexaF.34744.OuW@aWwEx0nG
Cyren W32/Kryptik.EHT.gen!Eldorado
Symantec Clean
ESET-NOD32 multiple detections
Zoner Clean
TrendMicro-HouseCall Clean
Avast Win32:PWSX-gen [Trj]
ClamAV Win.Malware.Generic-9849070-0
Kaspersky HEUR:Trojan.Win32.Chapak.gen
Alibaba Clean
NANO-Antivirus Trojan.Win32.Chapak.iwixdy
ViRobot Clean
AegisLab Clean
Rising Clean
Ad-Aware Trojan.GenericKD.46340695
Emsisoft Trojan.GenericKD.46340695 (B)
Comodo Clean
F-Secure Clean
Baidu Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Clean
CMC Clean
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Suspicious PE
GData Trojan.GenericKD.46340695
Jiangmin Clean
eGambit Unsafe.AI_Score_99%
Avira TR/AD.VidarStealer.hanva
MAX malware (ai score=83)
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Program:Win32/Wacapew.C!ml
Cynet Malicious (score: 99)
AhnLab-V3 Trojan/Win.Generic.C4477062
Acronis Clean
McAfee Clean
TACHYON Clean
VBA32 BScope.Trojan.Sabsik.FL
Malwarebytes Malware.AI.2628208216
Panda Clean
APEX Malicious
Tencent Clean
Yandex Clean
Ikarus Trojan-Downloader.Win32.Adload
MaxSecure Trojan-Ransom.Win32.Crypmod.zfq
Fortinet Clean
Webroot Clean
AVG Win32:PWSX-gen [Trj]
Paloalto generic.ml
CrowdStrike Clean
Qihoo-360 Clean
No IRMA results available.