Static | ZeroBOX

PE Compile Time

2021-07-06 18:03:08

PE Imphash

333a822de49d764043e0a411543a23bb

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000483a1 0x00048400 7.30667212346
.rdata 0x0004a000 0x0000022e 0x00000400 2.83033039013
.data 0x0004b000 0x0000326c 0x00003400 5.65801085193
.text4 0x0004f000 0x00000bb8 0x00000c00 4.95033377922
.text3 0x00050000 0x00000bb8 0x00000c00 4.95033377922
.text2 0x00051000 0x00000bb8 0x00000c00 4.95033377922
.rsrc 0x00052000 0x00000e80 0x00001000 4.46052565774

Resources

Name Offset Size Language Sub-language File type
RT_BITMAP 0x000520e8 0x00000728 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_RCDATA 0x00052810 0x0000035c LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators
RT_VERSION 0x00052b6c 0x00000314 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x44bff0 Sleep
0x44bff4 GetModuleHandleA
0x44c000 GetCurrentProcess
0x44c004 TerminateProcess
0x44c00c GetCurrentThreadId
0x44c010 GetTickCount
0x44c018 CreateFileA
0x44c024 SetFileTime
0x44c028 CloseHandle
0x44c02c SetFileAttributesA
0x44c03c GetCurrentProcessId
0x44c040 GetLastError
0x44c044 Module32FirstW
0x44c048 FindNextFileA
0x44c04c VirtualProtect
0x44c050 OpenEventW
0x44c054 SetCommMask
0x44c058 SetFileApisToOEM
0x44c05c EnumTimeFormatsW
0x44c060 GetModuleFileNameW
0x44c064 MoveFileA
0x44c068 WriteConsoleInputA
0x44c06c EnumDateFormatsW
0x44c074 IsBadStringPtrA
0x44c078 ExitProcess
0x44c07c MoveFileW
0x44c080 GetStartupInfoW
0x44c084 CancelWaitableTimer
0x44c088 BuildCommDCBA
0x44c094 GetConsoleTitleA
0x44c098 GlobalFix
0x44c0a4 CopyFileW
0x44c0a8 Heap32ListFirst
0x44c0ac GetFileType
0x44c0b0 ReadConsoleInputA
0x44c0b4 SetSystemTime
0x44c0b8 _lread
0x44c0bc OpenJobObjectA
0x44c0c0 QueryDosDeviceA
0x44c0c4 GlobalSize
0x44c0c8 CompareStringW
0x44c0cc EscapeCommFunction
0x44c0d0 VerSetConditionMask
0x44c0d4 MoveFileExA
0x44c0d8 GetProcessTimes
0x44c0dc GetDevicePowerState
0x44c0e4 SetEndOfFile
0x44c0e8 GetProfileSectionA
0x44c0ec TlsSetValue
0x44c0f0 TlsGetValue
0x44c0f4 LocalAlloc
0x44c0f8 GetModuleHandleW
0x44c0fc lstrlenW
0x44c100 lstrcmpA
0x44c108 WriteFile
0x44c10c WaitForSingleObject
0x44c110 VirtualQuery
0x44c114 VirtualFree
0x44c118 VirtualAlloc
0x44c11c UnmapViewOfFile
0x44c120 TerminateThread
0x44c128 SuspendThread
0x44c12c SizeofResource
0x44c130 SetThreadPriority
0x44c134 SetLastError
0x44c138 SetFilePointer
0x44c13c SetEvent
0x44c140 ResumeThread
0x44c144 ResetEvent
0x44c148 RemoveDirectoryA
0x44c14c ReleaseMutex
0x44c150 ReadProcessMemory
0x44c154 ReadFile
0x44c158 RaiseException
0x44c160 OutputDebugStringW
0x44c164 OpenProcess
0x44c168 OpenFileMappingA
0x44c16c OpenFileMappingW
0x44c170 MapViewOfFile
0x44c174 LockResource
0x44c178 LocalSize
0x44c17c LocalFree
0x44c180 LoadResource
0x44c184 LoadLibraryExA
0x44c188 LoadLibraryW
0x44c190 IsBadReadPtr
0x44c198 GlobalUnlock
0x44c19c GlobalReAlloc
0x44c1a0 GlobalMemoryStatus
0x44c1a4 GlobalHandle
0x44c1a8 GlobalLock
0x44c1ac GlobalFree
0x44c1b0 GlobalAlloc
0x44c1bc GetVersionExA
0x44c1c0 GetVersionExW
0x44c1c4 GetVersion
0x44c1cc GetThreadPriority
0x44c1d0 GetThreadLocale
0x44c1d4 GetThreadContext
0x44c1d8 GetTempPathA
0x44c1dc GetTempPathW
0x44c1e0 GetSystemTime
0x44c1e4 GetSystemDirectoryW
0x44c1e8 GetProcAddress
0x44c1f0 GetPriorityClass
0x44c1f4 GetModuleFileNameA
0x44c1f8 GetLocaleInfoA
0x44c1fc GetLocalTime
0x44c200 GetFileTime
0x44c204 GetFileSize
0x44c208 GetFileAttributesA
0x44c20c GetFileAttributesW
0x44c210 GetDiskFreeSpaceA
0x44c214 GetCurrentThread
0x44c218 GetComputerNameA
0x44c21c GetComputerNameW
0x44c220 GetCommandLineA
0x44c224 GetCommandLineW
0x44c228 GetCPInfo
0x44c22c FreeResource
0x44c234 InterlockedExchange
0x44c23c FreeLibrary
0x44c240 FormatMessageA
0x44c244 FindResourceA
0x44c248 FindResourceW
0x44c24c FindFirstFileA
0x44c250 FindClose
0x44c25c ExitThread
0x44c264 DuplicateHandle
0x44c268 DeleteFileA
0x44c26c DeleteFileW
0x44c274 CreateThread
0x44c278 CreateRemoteThread
0x44c27c CreateProcessA
0x44c280 CreateProcessW
0x44c284 CreatePipe
0x44c288 CreateMutexA
0x44c28c CreateMutexW
0x44c290 CreateFileMappingA
0x44c294 CreateFileMappingW
0x44c298 CreateFileW
0x44c29c CreateEventW
0x44c2a0 CreateDirectoryA
0x44c2a4 CopyFileA
0x44c2a8 Beep
0x44c2ac RtlUnwind
0x44c2b0 LoadLibraryA
Library USER32.dll:
0x44c2b8 CharNextExA
0x44c2bc UpdateWindow
0x44c2c0 GetWindowRgn
0x44c2c4 IsDlgButtonChecked
0x44c2c8 FindWindowA
0x44c2d0 PostThreadMessageW
0x44c2d8 RemovePropA
0x44c2dc GetMonitorInfoW
0x44c2e0 PeekMessageW
0x44c2e4 ShowCursor
0x44c2e8 UpdateLayeredWindow
0x44c2ec DdeCreateDataHandle
0x44c2f0 GetUpdateRgn
0x44c2f8 ClipCursor
0x44c2fc GetWindowPlacement
0x44c300 GetDlgCtrlID
0x44c304 GetCursor
0x44c308 SetDlgItemTextA
0x44c310 ToUnicodeEx
0x44c314 PostMessageW
0x44c31c LockWorkStation
0x44c320 GetMenuItemInfoW
0x44c328 CharNextA
0x44c330 PostMessageA
0x44c334 DrawFocusRect
0x44c338 ValidateRect
0x44c33c DdeConnect
0x44c340 GetMenuStringW
0x44c344 UnpackDDElParam
0x44c348 DestroyCaret
0x44c34c SubtractRect
0x44c350 GetSystemMenu
0x44c354 SetSystemCursor
0x44c358 GetClipCursor
0x44c35c GetScrollInfo
0x44c360 CreateWindowExA
0x44c364 CreateWindowExW
0x44c368 WindowFromPoint
0x44c36c TranslateMessage
0x44c374 ShowWindow
0x44c378 SetWindowTextA
0x44c37c SetWindowPos
0x44c380 SetWindowLongA
0x44c384 SetTimer
0x44c388 SetRect
0x44c38c SetForegroundWindow
0x44c390 SetFocus
0x44c394 SetCursor
0x44c398 SetClipboardData
0x44c39c SetCapture
0x44c3a0 SetActiveWindow
0x44c3a4 SendMessageTimeoutA
0x44c3a8 SendMessageA
0x44c3ac SendMessageW
0x44c3b0 ScreenToClient
0x44c3b4 RemoveMenu
0x44c3b8 ReleaseDC
0x44c3bc ReleaseCapture
0x44c3c4 RegisterClassA
0x44c3c8 PostThreadMessageA
0x44c3cc PostQuitMessage
0x44c3d0 PeekMessageA
0x44c3d4 OpenClipboard
0x44c3d8 OffsetRect
0x44c3dc MessageBoxA
0x44c3e0 MessageBeep
0x44c3e4 LoadImageA
0x44c3e8 LoadCursorW
0x44c3ec KillTimer
0x44c3f0 IsWindowVisible
0x44c3f4 IsWindowUnicode
0x44c3f8 IsWindowEnabled
0x44c3fc IsWindow
0x44c400 IsIconic
0x44c404 IsDialogMessageW
0x44c408 InvalidateRect
0x44c40c InflateRect
0x44c414 GetWindowTextA
0x44c418 GetWindowRect
0x44c41c GetWindowLongW
0x44c420 GetWindowDC
0x44c424 GetSystemMetrics
0x44c428 GetSysColorBrush
0x44c42c GetSysColor
0x44c430 GetWindow
0x44c434 GetMessageA
0x44c438 GetMessageW
0x44c43c GetKeyState
0x44c440 GetIconInfo
0x44c444 GetFocus
0x44c448 GetDC
0x44c44c GetCursorPos
0x44c450 GetClientRect
0x44c454 GetClassNameA
0x44c458 GetCapture
0x44c45c FrameRect
0x44c460 FindWindowW
0x44c464 FillRect
0x44c468 EnumWindows
0x44c46c EndPaint
0x44c470 EnableWindow
0x44c474 EmptyClipboard
0x44c478 DrawTextA
0x44c47c DrawIconEx
0x44c480 DrawFrameControl
0x44c484 DispatchMessageW
0x44c488 DestroyWindow
0x44c48c DefWindowProcA
0x44c490 DefWindowProcW
0x44c494 CloseClipboard
0x44c498 CallWindowProcW
0x44c49c BringWindowToTop
0x44c4a0 BeginPaint
0x44c4a4 AttachThreadInput
0x44c4a8 GetClipboardData
Library GDI32.dll:
0x44c4b0 SetMetaRgn
0x44c4b4 SetBkColor
0x44c4b8 GdiSwapBuffers
0x44c4bc EngAcquireSemaphore
0x44c4c4 CreateDCA
0x44c4c8 ExtSelectClipRgn
0x44c4cc GdiEntry4
0x44c4d0 SetTextColor
0x44c4d4 CreateFontA
0x44c4d8 StartDocA
0x44c4dc RealizePalette
0x44c4e4 ExtCreatePen
0x44c4e8 GdiConvertBrush
0x44c4ec CreateColorSpaceW
0x44c4f0 NamedEscape
0x44c4f4 CombineTransform
0x44c4fc PolyBezierTo
0x44c500 TextOutA
0x44c504 StartPage
0x44c508 SetMapMode
0x44c50c SetBkMode
0x44c510 SelectObject
0x44c514 SelectClipRgn
0x44c518 MoveToEx
0x44c51c LineTo
0x44c520 GetTextMetricsW
0x44c524 GetTextFaceA
0x44c52c GetStockObject
0x44c530 GetRgnBox
0x44c534 GetObjectW
0x44c538 GetDeviceCaps
0x44c53c GdiFlush
0x44c540 EndPage
0x44c544 EndDoc
0x44c548 DeleteObject
0x44c54c DeleteDC
0x44c550 CreateSolidBrush
0x44c558 CreatePen
0x44c55c CreateFontW
0x44c560 CreateDIBSection
0x44c564 CreateDCW
0x44c568 CreateCompatibleDC
0x44c56c CombineRgn
0x44c570 BitBlt
0x44c574 GetStretchBltMode
Library COMDLG32.dll:
0x44c57c PrintDlgW
0x44c580 GetSaveFileNameA
Library ADVAPI32.dll:
0x44c58c RegSetValueExA
0x44c590 RegQueryValueExA
0x44c594 RegQueryValueExW
0x44c598 RegQueryInfoKeyW
0x44c59c RegOpenKeyExA
0x44c5a0 RegOpenKeyExW
0x44c5a4 RegEnumKeyA
0x44c5a8 RegDeleteValueA
0x44c5ac RegCreateKeyExA
0x44c5b0 RegCloseKey
0x44c5b8 GetUserNameA
0x44c5bc GetUserNameW
0x44c5c0 FreeSid
0x44c5c8 RegOpenKeyA
Library SHELL32.dll:
0x44c5d0 SHAppBarMessage
0x44c5d4 CheckEscapesW
0x44c5d8 DragQueryFileAorW
0x44c5e0 ExtractIconExA
0x44c5e4 SHQueryRecycleBinA
0x44c5e8 ShellExecuteExW
0x44c5ec WOWShellExecute
0x44c5f0 Shell_NotifyIconW
0x44c5f8 SHGetPathFromIDList
0x44c600 SHGetDiskFreeSpaceA
0x44c604 ExtractIconExW
0x44c608 SHAddToRecentDocs
0x44c610 ShellExecuteExA
0x44c614 ShellExecuteA
0x44c620 SHGetMalloc
Library SHLWAPI.dll:
0x44c628 StrChrW
Library COMCTL32.dll:
0x44c630 ImageList_Destroy
0x44c634 ImageList_Create
0x44c638 None

!This program cannot be run in DOS mode.
`.rdata
@.data
.text4
.text3
.text2
\tS2P1
3"q#_# ;
6NP\30a
hAlQjc
ViWquaQCre@
rOf+lle
veaY`FiI`A
SHqFiI`Po<kte7
lsyvcaqC
>re@IibWfry
in @JS
oD|nD$
eD8^]?
zsDLK
]ssD<|
+k}c0;
(;jFK#}
-;}KH;
Q-;jVIjVI
L-;4"N8
\3jt&Q
@3[)l}
~+j4i{
Pjp7a}l
{MmYm*
'W7S*rMi
7_];ncqA^
RI|~+}h
|;~=o}i*
6Nz4+/
:jW=kjW5
jDfZd[
`j}Rp;
b-5{}+
b-M:}+
2jTb_h
QNg6jw
Zd~SpM
h&Q}za
;fwidn}
FiQ{ljI
}m*sMyS
TM}iH^)jW
b%==sb|5
ukfwaQy
`}k4"*
?NlqDj
@ijjWUjj
ONlq :
jDWg}B
7h}~G;
j}h,k}BQ
jMfEhM@m
3.=:N*
0Sa$G*
3.5:G*
lwR'R;
De\c3y
d6jMq`
?B6 fc
w6f[<
A.[y@.^YC
p{Duy6
DiQ=.dy?
:xD}Y/
~aK:{
NM[B TM
g5j4lL
ndV9pdV
g`kMt`
8~+}La
WBNmWIN
`Qi}sb
Jqg}sy
~p1C-}4k
h3k}l8Sc
Q*~ikk7
r.e%g'
~mF2i}*
=i[jMsn
6Rg}1S7
8WQ/4:
Xg}+}7
I8U9l7
KdV9k/
y'}q"7
IfF_=s
Rfas}We
jkDjMmh
j5CjMs
.i1B=<
`6W}4h
@%DQI19j
]M`f-=4
`cVQ|k
+^~7RZ
fH{i|_
}bV!`k
~Ej{aZ{7
BH{iLp
'VYL0V2(
>T~i<|
h8|Sk8
h8|Mn8
Y\(}8W8
UvXPus
cUTM,b
bgH=+bR
_O}/E#
j}p0#(q
zC\Y_+
nJt1U7@
\/6>95
Z~7~+`/
Z}7-k}7
jA1D^1
viYBa}d3
c\&=|i
'jv@i}n
bfjGzg
.ackMs
u:=t}'
jrziIo0
`k&=t^
HhQD\\
j4F!N'
r^VQrj
Z|7~tIzy9|7
KzkX^v
zeYHh
zeI!Hh
c&Q{}#
]Y]$TS
ZYJ$T{
qqMDvi<l
vq2uLj
eIf$Td
gShMtZV
=i!M^V
s&m;^#
tZVARF
jGVljG:
XbjW\cjG
?4#J.4##.
VOs jQN
@4#J54#
OY=3j6
WOi)jaN
.bzFu4#
7b{Fw4#
8TaB0T#
Qf3^i6
|+}r~3
vm9iCh!
yY##jG
_47j}r}
T0y4#X
_5sj=s}
wj|3jQ
jd-~f
2a(KM4
F{yi<S
VbjWZU
aZaVQPi
uy*pI}M
BLyiLt
M(|#j5
f9..p8
}3UR~3
}3UR~3
U$V#P.
;<f{kJ
*n cW&
_|KK,~{
{AW{-r&&
Pe~~#L
-\q?-kc
h,C#>GE
1B,<Knt
_"C*AtL
P4i(z/^
;@I})K
`gtbednijm`t
FEvYXX
E#`zH(r
{(--q%
NAo{GVv
ho E4"iG//bY&8[s
hG*`nP
E~=*Esf
Xd?.Ki
[7ERD,sG=%Y8^
d#_%mI0
r6^q?
NK$W:PRZKYx1ffn([oL#ttJ
h~pU7F
$qV9,9
}yVui\]t
yqoN#(D;D@IJ
ANZdmaek
O`rewx $VHG
"(UZF4RB
pckaX"\o_w
ob"sicdhfug`no]
(rujuhm
=e[rqxr
!imm\T-
fbted]
f^wZ(psas[o
``tue]
q^tka^l
501%790%
401%690%
301%590%
601%490%
101%390%
001%290%
/01%190%
4eHckeO2htUa`l/cbteU]
nki_gcS
K`s`Lqr
ka^3dp5iUo=
ClkSe6kei
hma@rFekTT
4Uo^U`n
mBoQhke^
?mkUjn`n`jTd
1hoj@hl
rnqtQfcP^hkeo1
FiN1dax
O_cbkm
reP/reNg`tT_qr
Oca<ht<
W\eY^gy
OhVn]_
;09sF^
55GVf9VAMqauOo0b24JxJgxSub9jbyfIjeseTShU0utyv5HA
kernel32
kernel32
kernel32
kernel32
kernel32
kernel32
kernel32
kernel32
VirtualAlloc
kernel32
GetModuleHandleW
kernel32
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateFileA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
SetFileAttributesA
GetFileAttributesExA
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetCurrentProcessId
GetLastError
Module32FirstW
FindNextFileA
VirtualProtect
OpenEventW
SetCommMask
SetFileApisToOEM
EnumTimeFormatsW
GetModuleFileNameW
MoveFileA
WriteConsoleInputA
EnumDateFormatsW
WriteConsoleOutputAttribute
IsBadStringPtrA
ExitProcess
MoveFileW
GetStartupInfoW
CancelWaitableTimer
BuildCommDCBA
DeleteTimerQueueTimer
FindFirstVolumeMountPointW
GetConsoleTitleA
GlobalFix
GetPrivateProfileStructW
WaitForSingleObjectEx
CopyFileW
Heap32ListFirst
GetFileType
ReadConsoleInputA
SetSystemTime
_lread
OpenJobObjectA
QueryDosDeviceA
GlobalSize
CompareStringW
EscapeCommFunction
VerSetConditionMask
MoveFileExA
GetProcessTimes
GetDevicePowerState
GetPrivateProfileSectionNamesA
SetEndOfFile
GetProfileSectionA
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
lstrlenW
lstrcmpA
WritePrivateProfileStringW
WriteFile
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateThread
SystemTimeToFileTime
SuspendThread
SizeofResource
SetThreadPriority
SetLastError
SetFilePointer
SetEvent
ResumeThread
ResetEvent
RemoveDirectoryA
ReleaseMutex
ReadProcessMemory
ReadFile
RaiseException
QueryPerformanceFrequency
OutputDebugStringW
OpenProcess
OpenFileMappingA
OpenFileMappingW
MapViewOfFile
LockResource
LocalSize
LocalFree
LoadResource
LoadLibraryExA
LoadLibraryW
LeaveCriticalSection
IsBadReadPtr
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalMemoryStatus
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetWindowsDirectoryW
GetVersionExA
GetVersionExW
GetVersion
GetTimeZoneInformation
GetThreadPriority
GetThreadLocale
GetThreadContext
GetTempPathA
GetTempPathW
GetSystemTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPriorityClass
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetFileTime
GetFileSize
GetFileAttributesA
GetFileAttributesW
GetDiskFreeSpaceA
GetCurrentThread
GetComputerNameA
GetComputerNameW
GetCommandLineA
GetCommandLineW
GetCPInfo
FreeResource
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
FreeLibrary
FormatMessageA
FindResourceA
FindResourceW
FindFirstFileA
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsA
ExitThread
EnterCriticalSection
DuplicateHandle
DeleteFileA
DeleteFileW
DeleteCriticalSection
CreateThread
CreateRemoteThread
CreateProcessA
CreateProcessW
CreatePipe
CreateMutexA
CreateMutexW
CreateFileMappingA
CreateFileMappingW
CreateFileW
CreateEventW
CreateDirectoryA
CopyFileA
RtlUnwind
LoadLibraryA
KERNEL32.dll
CharNextExA
UpdateWindow
GetWindowRgn
IsDlgButtonChecked
FindWindowA
ChangeDisplaySettingsExA
PostThreadMessageW
DdeImpersonateClient
RemovePropA
GetMonitorInfoW
PeekMessageW
ShowCursor
UpdateLayeredWindow
DdeCreateDataHandle
GetUpdateRgn
BroadcastSystemMessage
ClipCursor
GetWindowPlacement
GetDlgCtrlID
GetCursor
SetDlgItemTextA
GetKeyboardLayoutNameA
ToUnicodeEx
PostMessageW
DdeClientTransaction
LockWorkStation
GetMenuItemInfoW
RegisterWindowMessageA
CharNextA
CreateAcceleratorTableA
PostMessageA
DrawFocusRect
ValidateRect
DdeConnect
GetMenuStringW
UnpackDDElParam
DestroyCaret
SubtractRect
GetSystemMenu
SetSystemCursor
GetClipCursor
GetScrollInfo
CreateWindowExA
CreateWindowExW
WindowFromPoint
TranslateMessage
SystemParametersInfoW
ShowWindow
SetWindowTextA
SetWindowPos
SetWindowLongA
SetTimer
SetRect
SetForegroundWindow
SetFocus
SetCursor
SetClipboardData
SetCapture
SetActiveWindow
SendMessageTimeoutA
SendMessageA
SendMessageW
ScreenToClient
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterClassA
PostThreadMessageA
PostQuitMessage
PeekMessageA
OpenClipboard
OffsetRect
MessageBoxA
MessageBeep
LoadImageA
LoadCursorW
KillTimer
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsWindow
IsIconic
IsDialogMessageW
InvalidateRect
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowLongW
GetWindowDC
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetWindow
GetMessageA
GetMessageW
GetKeyState
GetIconInfo
GetFocus
GetCursorPos
GetClientRect
GetClassNameA
GetCapture
FrameRect
FindWindowW
FillRect
EnumWindows
EndPaint
EnableWindow
EmptyClipboard
DrawTextA
DrawIconEx
DrawFrameControl
DispatchMessageW
DestroyWindow
DefWindowProcA
DefWindowProcW
CloseClipboard
CallWindowProcW
BringWindowToTop
BeginPaint
AttachThreadInput
GetClipboardData
USER32.dll
SetMetaRgn
SetBkColor
GdiSwapBuffers
EngAcquireSemaphore
RemoveFontResourceExW
CreateDCA
ExtSelectClipRgn
GdiEntry4
SetTextColor
CreateFontA
StartDocA
RealizePalette
EngCreateDeviceBitmap
ExtCreatePen
GdiConvertBrush
CreateColorSpaceW
NamedEscape
CombineTransform
EngGetCurrentCodePage
PolyBezierTo
TextOutA
StartPage
SetMapMode
SetBkMode
SelectObject
SelectClipRgn
MoveToEx
LineTo
GetTextMetricsW
GetTextFaceA
GetTextExtentPoint32A
GetStockObject
GetRgnBox
GetObjectW
GetDeviceCaps
GdiFlush
EndPage
EndDoc
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreatePen
CreateFontW
CreateDIBSection
CreateDCW
CreateCompatibleDC
CombineRgn
BitBlt
GetStretchBltMode
GDI32.dll
PrintDlgW
GetSaveFileNameA
COMDLG32.dll
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueExA
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExA
RegOpenKeyExW
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
InitializeSecurityDescriptor
GetUserNameA
GetUserNameW
FreeSid
AllocateAndInitializeSid
RegOpenKeyA
ADVAPI32.dll
SHAppBarMessage
CheckEscapesW
DragQueryFileAorW
SHCreateDirectoryExA
ExtractIconExA
SHQueryRecycleBinA
ShellExecuteExW
WOWShellExecute
Shell_NotifyIconW
SHGetSpecialFolderPathA
SHGetPathFromIDList
ExtractAssociatedIconA
SHGetDiskFreeSpaceA
ExtractIconExW
SHAddToRecentDocs
SHGetSpecialFolderPathW
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHELL32.dll
StrChrW
SHLWAPI.dll
ImageList_Destroy
ImageList_Create
COMCTL32.dll
\tS2P1
3"q#_# ;
\tS2P1
3"q#_# ;
\tS2P1
3"q#_# ;
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
<dependency>
<dependentAssembly>
<assemblyIdentity type="win32" name="Microsoft.VC90.DebugCRT" version="9.0.21022.8" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>
</dependentAssembly>
</dependency>
<dependency>
<dependentAssembly>
<assemblyIdentity type="win32" name="Microsoft.VC90.DebugMFC" version="9.0.21022.8" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>
</dependentAssembly>
</dependency>
</assembly>
NAOFKKYEDINHBDEULA0
210704072813Z
391231235959Z0
NAOFKKYEDINHBDEULA0
X3R={nT
NAOFKKYEDINHBDEULA
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Timestamping CA0
210101000000Z
310106000000Z0H1
DigiCert, Inc.1 0
DigiCert Timestamp 20210
http://www.digicert.com/CPS0
,http://crl3.digicert.com/sha2-assured-ts.crl02
,http://crl4.digicert.com/sha2-assured-ts.crl0
http://ocsp.digicert.com0O
Chttp://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
QJxy6z'
dwc_#Ri
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
160107120000Z
310107120000Z0r1
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Timestamping CA0
fnVa')
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
4http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
https://www.digicert.com/CPS0
8aMbF$
V3"/"6
NAOFKKYEDINHBDEULA
,https://www.example.com/my_product/info.html0
DigiCert Inc1
www.digicert.com110/
(DigiCert SHA2 Assured ID Timestamping CA
210706090349Z0/
4~mXO4
$*&-!ZT(I
VS_VERSION_INFO
StringFileInfo
000904B0
CompanyName
Mightywill
FileVersion
2,0,36,0
InternalName
Mightywill.QA.CrashReport.exe
LegalCopyright
2011 Mightywill
OriginalFilename
Mightywill.QA.CrashReport.exe
ProductName
Common
ProductVersion
2,0,36,0
Platform
VarFileInfo
Translation
<<<Obsolete>>
Antivirus Signature
Bkav W32.AIDetect.malware1
Lionic Clean
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
McAfee Artemis!9A2E1BB9AD6F
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_80% (W)
BitDefender Clean
K7GW Clean
K7AntiVirus Clean
Baidu Clean
Cyren W32/Kryptik.EMS.gen!Eldorado
Symantec Packed.Generic.459
ESET-NOD32 Clean
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky UDS:Trojan.Win32.Yakes
Alibaba Trojan:Win32/Kryptik.c24bc02d
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Clean
Rising Trojan.Generic@ML.97 (RDML:CRXILAujLGJJdVh+RBFcuw)
Ad-Aware Clean
Sophos ML/PE-A
Comodo Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
FireEye Generic.mg.9a2e1bb9ad6f1ccf
Emsisoft Clean
Ikarus Trojan.Win32.Crypt
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira Clean
Antiy-AVL Trojan/Generic.ASCommon.1BE
Kingsoft Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Gridinsoft Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Clean
TACHYON Clean
AhnLab-V3 Clean
Acronis suspicious
VBA32 BScope.Virus.Virlock
ALYac Clean
MAX Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
Fortinet Clean
BitDefenderTheta Gen:NN.ZexaF.34790.uC1@aa!ReBei
AVG FileRepMalware
Cybereason malicious.ab8637
Avast FileRepMalware
Qihoo-360 HEUR/QVM19.1.685F.Malware.Gen
No IRMA results available.