Static | ZeroBOX

PE Compile Time

2018-02-02 04:43:24

PE Imphash

7182b1ea6f92adbf459a2c65d8d4dd9e

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.code 0x00001000 0x00005a99 0x00005c00 5.47130091723
.text 0x00007000 0x000102c5 0x00010400 6.33395190306
.rdata 0x00018000 0x00004b2d 0x00004c00 6.6620733176
.pdata 0x0001d000 0x000010c8 0x00001200 4.88380909719
.data 0x0001f000 0x00002318 0x00001600 4.29939403014
.rsrc 0x00022000 0x00052150 0x00052200 7.99897185361

Resources

Name Offset Size Language Sub-language File type
RT_RCDATA 0x00073ee4 0x00000001 LANG_NEUTRAL SUBLANG_NEUTRAL very short file (no magic)
RT_RCDATA 0x00073ee4 0x00000001 LANG_NEUTRAL SUBLANG_NEUTRAL very short file (no magic)
RT_RCDATA 0x00073ee4 0x00000001 LANG_NEUTRAL SUBLANG_NEUTRAL very short file (no magic)
RT_RCDATA 0x00073ee4 0x00000001 LANG_NEUTRAL SUBLANG_NEUTRAL very short file (no magic)
RT_RCDATA 0x00073ee4 0x00000001 LANG_NEUTRAL SUBLANG_NEUTRAL very short file (no magic)
RT_RCDATA 0x00073ee4 0x00000001 LANG_NEUTRAL SUBLANG_NEUTRAL very short file (no magic)
RT_RCDATA 0x00073ee4 0x00000001 LANG_NEUTRAL SUBLANG_NEUTRAL very short file (no magic)
RT_MANIFEST 0x00073ee8 0x00000267 LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, ASCII text

Imports

Library msvcrt.dll:
0x14001f6a8 memset
0x14001f6b0 wcsncmp
0x14001f6b8 memmove
0x14001f6c0 wcsncpy
0x14001f6c8 wcsstr
0x14001f6d0 _wcsnicmp
0x14001f6d8 _wcsdup
0x14001f6e0 free
0x14001f6e8 _wcsicmp
0x14001f6f0 wcslen
0x14001f6f8 wcscpy
0x14001f700 wcscmp
0x14001f708 memcpy
0x14001f710 tolower
0x14001f718 wcscat
0x14001f720 malloc
Library KERNEL32.dll:
0x14001f730 GetModuleHandleW
0x14001f738 HeapCreate
0x14001f740 GetStdHandle
0x14001f748 HeapDestroy
0x14001f750 ExitProcess
0x14001f758 WriteFile
0x14001f760 GetTempFileNameW
0x14001f768 LoadLibraryExW
0x14001f770 EnumResourceTypesW
0x14001f778 FreeLibrary
0x14001f780 RemoveDirectoryW
0x14001f788 GetExitCodeProcess
0x14001f790 EnumResourceNamesW
0x14001f798 GetCommandLineW
0x14001f7a0 LoadResource
0x14001f7a8 SizeofResource
0x14001f7b0 FreeResource
0x14001f7b8 FindResourceW
0x14001f7c0 GetShortPathNameW
0x14001f7c8 GetSystemDirectoryW
0x14001f7d0 EnterCriticalSection
0x14001f7d8 CloseHandle
0x14001f7e0 LeaveCriticalSection
0x14001f7f0 WaitForSingleObject
0x14001f7f8 TerminateThread
0x14001f800 CreateThread
0x14001f808 Sleep
0x14001f810 WideCharToMultiByte
0x14001f818 HeapAlloc
0x14001f820 HeapFree
0x14001f828 LoadLibraryW
0x14001f830 GetProcAddress
0x14001f838 GetCurrentProcessId
0x14001f840 GetCurrentThreadId
0x14001f848 GetModuleFileNameW
0x14001f850 GetEnvironmentVariableW
0x14001f858 SetEnvironmentVariableW
0x14001f860 GetCurrentProcess
0x14001f868 TerminateProcess
0x14001f870 RtlLookupFunctionEntry
0x14001f878 RtlVirtualUnwind
0x14001f890 HeapSize
0x14001f898 MultiByteToWideChar
0x14001f8a0 CreateDirectoryW
0x14001f8a8 SetFileAttributesW
0x14001f8b0 GetTempPathW
0x14001f8b8 DeleteFileW
0x14001f8c0 GetCurrentDirectoryW
0x14001f8c8 SetCurrentDirectoryW
0x14001f8d0 CreateFileW
0x14001f8d8 SetFilePointer
0x14001f8e0 TlsFree
0x14001f8e8 TlsGetValue
0x14001f8f0 TlsSetValue
0x14001f8f8 TlsAlloc
0x14001f900 HeapReAlloc
0x14001f908 DeleteCriticalSection
0x14001f910 GetLastError
0x14001f918 SetLastError
0x14001f920 UnregisterWait
0x14001f928 GetCurrentThread
0x14001f930 DuplicateHandle
Library SHELL32.DLL:
0x14001f948 ShellExecuteExW
0x14001f950 SHGetFolderLocation
0x14001f958 SHGetPathFromIDListW
Library WINMM.DLL:
0x14001f968 timeBeginPeriod
Library OLE32.DLL:
0x14001f978 CoInitialize
0x14001f980 CoTaskMemFree
Library SHLWAPI.DLL:
0x14001f990 PathAddBackslashW
0x14001f998 PathRenameExtensionW
0x14001f9a0 PathQuoteSpacesW
0x14001f9a8 PathRemoveArgsW
0x14001f9b0 PathRemoveBackslashW
Library USER32.DLL:
0x14001f9c0 CharUpperW
0x14001f9c8 CharLowerW
0x14001f9d0 MessageBoxW
0x14001f9d8 DefWindowProcW
0x14001f9e0 GetWindowLongPtrW
0x14001f9e8 GetWindowTextLengthW
0x14001f9f0 GetWindowTextW
0x14001f9f8 EnableWindow
0x14001fa00 DestroyWindow
0x14001fa08 UnregisterClassW
0x14001fa10 LoadIconW
0x14001fa18 LoadCursorW
0x14001fa20 RegisterClassExW
0x14001fa28 IsWindowEnabled
0x14001fa30 GetSystemMetrics
0x14001fa38 CreateWindowExW
0x14001fa40 SetWindowLongPtrW
0x14001fa48 SendMessageW
0x14001fa50 SetFocus
0x14001fa58 CreateAcceleratorTableW
0x14001fa60 SetForegroundWindow
0x14001fa68 BringWindowToTop
0x14001fa70 GetMessageW
0x14001fa78 TranslateAcceleratorW
0x14001fa80 TranslateMessage
0x14001fa88 DispatchMessageW
0x14001fa90 DestroyAcceleratorTable
0x14001fa98 PostMessageW
0x14001faa0 GetForegroundWindow
0x14001faa8 GetWindowThreadProcessId
0x14001fab0 IsWindowVisible
0x14001fab8 EnumWindows
0x14001fac0 SetWindowPos
Library GDI32.DLL:
0x14001fad0 GetStockObject
Library COMCTL32.DLL:
0x14001fae0 InitCommonControlsEx

!This program cannot be run in DOS mode.
`.text
`.rdata
@.pdata
@.data
UAWAVH
D$XPM1
D$hPM1
HcD$`PH
PLc|$hH
Lc|$hLct$`H
Lct$`H
D$hLc|$`H
Lc|$hI
/PLc|$hI
PLc|$pI
Lc|$`I
D$`Lc|$hLct$`H
D$hLc|$`I
Lc|$hI
/PLc|$hI
PLc|$pI
/Lc|$`I
Mc</Lct$hI
D$pLc|$pI
D$XPM1
D$hPM1
D$(H;D$0
YZAXAYH
YZAXAYH
YZAXAYH
t$pYZAXAYH
t$pYZAXAYH
t$hYZAXH
t$hYZAXH
t$hYZAXH
t$hYZAXAY
t$`YZH
YZAXAY
t$`YZH
YZAXAY
t$`YZH
YZAXAY
t$`YZH
PPPPPPH
$YZAXH
t$8YZAX
$YZAXH
t$xYZAXH
t$hYZAXH
L$XZQH
t$XYZAXAY
PPPPPH
PYZAXH
PYZAXH
t$xYZAXAYH
t$xYZAXAYH
YZAXAYH
t$pYZH
$YZAXH
t$hYZAXAYH
PPPPPH
t$xYZAXH
t$8YZAX
D$HH;D$P
t$pYZH
YZAXAY
t$8YZAX
t$PYZAXH
t$XYZAXH
t$hYZAXH
L$ UH1
t$hYZH
PPPPPPH
t$XYZAXAY
PYZAXAYH
PPPPPPH
t$XYZAXH
t$`YZH
t$XYZH
YZAXAY
L;<$uFQH
L;<$u<H
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
t$HYZAXH
t$xYZAXH
t$hYZH
t$pYZH
t$xYZH
t$`YZH
YZAXAYH
YZAXAYH
PPPPPH
t$`YZAXAYH
t$`YZH
PPPPPH
PPPPPH
t$@YZAX
|$8L;|$pu
@UATAUAWH
fA9<Fu
(A_A]A\]
(A_A]A\]
|$ ATAVAWH
A_A^A\
SUVWATAVAWH
H+D$ I
H+D$(H
0A_A^A\_^][
|$ AVH
WAVAWH
A_A^_
@SVWAVH
(A^_^[
(A^_^[
WAVAWH
fD9;t1
A_A^_
@SUVWATAUAVAWH
fC9,~u
fB9,ou
u!Hc\$8H
HA_A^A]A\_^][
UVWATAUAVAWH
A_A^A]A\_^]
t$ AVH
t$ UWAVH
UVWAVAWH
0A_A^_^]
x UATAUAVAWH
A_A^A]A\]
UATAUAVAWH
f9LD^u
A_A^A]A\]
f9(tIH
WAVAWH
fD9<Yu
0A_A^_
WAVAWH
A_A^_
WAVAWH
1Lcy(E
A_A^_
t LcC03
LHcO<H
t LcG03
HcQ(;Q<}
Q(;Q<}
M\f9L_
L$@D+A
HcD$@H
VWATAUAWH
A_A]A\_^
|$ AVH
HcD$HH
|$@HcD$HH
l$P9i$
HcD$PH
WATAVH
A^A\_
UVWATAUAVAWH
3t$@D3d$<D
3t$PE3
D3d$(A
D$ 3\$0D
3\$4A#
D3t$`D
nD3t$LD3
D3|$HA
D3l$@D
x D3l$(A
3D$83D$4A3
D$X3D$,D
L$ 3D$03
D$D3D$TA
3D$(A3
D$ 3l$4D
L$ 3D$<3
L$ 3D$,A3
D$ D3d$4D
D3t$XH
D3t$<A
D3t$0#
D3d$HA#
3l$T3|$0D
h<D3d$(
D3|$4A#
|$ 3l$8A
D3t$<A#
D3l$,3l$LA
D3l$P3l$0
3l$PA#
D3t$HD
D$ 3t$(
l$@D3l$4
D3l$0A
D3d$(A
D3|$<A#
D3t$LA#
D3t$,D
3t$<A3
l$@3l$L3t$HA
|$(3l$T
\$X3\$D
D3d$\A
3\$HA3
t$ D3|$T
D3|$PA3
D3|$H3
3l$DD3t$TD
3l$8D3D$4A
3l$PD3D$0
D3d$,D
D3d$4A
D$ 3t$(A
D3D$LD3D$,
D3d$<D3l$D
pA_A^A]A\_^]
WAVAWH
A_A^_
UVWATAUAVAWH
@A_A^A]A\_^]
|$ AVH
!s H!s
A9@ u`A
WATAUAVAWH
A_A^A]A\_
WATAUAVAWH
0A_A^A]A\_
H;G uSH9s
D$(HcD$HH
u%HcD$ H
+HcD$ H
HcD$ 3
HcL$HH
HcD$HH
HcD$ 3
D$ HcD$@H
H9D$@r2H
H9D$@w
D$ HcD$@H
D$XHcD$PH
D$ HcD$ H
HcD$XH
D$0HcD$XHcL$PH
D$ HcD$@H
HcD$@H
D$ HcD$@H
HcD$0H
D$(HcD$0H
D$8H9D$
A)|$HA
L$H;H(s
L$H;H8s
E)l$HD
A9D$|s[
D$|A;D$pr
A;L$0v#A
L9w8t?
i H9i0u
A0H9i8u
C4;C,A
C0;C,s
USVWAUAVAWH
A_A^A]_^[]
SUVWATAUAVAWH
8A_A^A]A\_^][
HcD$0H
WAVAWH
@A_A^_
|$ AVH
|$ AVH
t$ AVH
|$ AVH
SHBrowseForFolderW
SHGetPathFromIDListW
GetLongPathNameW
SHGetKnownFolderPath
0123456789abcdefK
InitOnceExecuteOnce
incorrect header check
unknown compression method
invalid window size
unknown header flags set
header crc mismatch
invalid block type
invalid stored block lengths
too many length or distance symbols
invalid code lengths set
invalid bit length repeat
invalid code -- missing end-of-block
invalid literal/lengths set
invalid distances set
invalid literal/length code
invalid distance code
invalid distance too far back
incorrect data check
incorrect length check
Qkkbal
[-&LMb#{'
w+OQvr
INSKyu
)\ZEo^m/
H*0"ZOW
mj>zjZ
IiGM>nw
ewh/?y
OZw3(?
V_:X1:
inflate 1.2.8 Copyright 1995-2013 Mark Adler
need dictionary
stream end
file error
stream error
data error
insufficient memory
buffer error
incompatible version
memset
msvcrt.dll
GetModuleHandleW
HeapCreate
GetStdHandle
HeapDestroy
ExitProcess
WriteFile
GetTempFileNameW
LoadLibraryExW
EnumResourceTypesW
FreeLibrary
RemoveDirectoryW
GetExitCodeProcess
EnumResourceNamesW
GetCommandLineW
LoadResource
SizeofResource
FreeResource
FindResourceW
GetShortPathNameW
GetSystemDirectoryW
KERNEL32.dll
ShellExecuteExW
SHGetFolderLocation
SHGetPathFromIDListW
SHELL32.DLL
timeBeginPeriod
WINMM.DLL
CoInitialize
CoTaskMemFree
OLE32.DLL
PathAddBackslashW
PathRenameExtensionW
PathQuoteSpacesW
PathRemoveArgsW
PathRemoveBackslashW
SHLWAPI.DLL
wcsncmp
memmove
wcsncpy
wcsstr
_wcsnicmp
_wcsdup
_wcsicmp
wcslen
wcscpy
wcscmp
memcpy
tolower
wcscat
malloc
EnterCriticalSection
CloseHandle
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
TerminateThread
CreateThread
WideCharToMultiByte
HeapAlloc
HeapFree
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcess
TerminateProcess
RtlLookupFunctionEntry
RtlVirtualUnwind
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
HeapSize
MultiByteToWideChar
CreateDirectoryW
SetFileAttributesW
GetTempPathW
DeleteFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
SetFilePointer
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
DeleteCriticalSection
GetLastError
SetLastError
UnregisterWait
GetCurrentThread
DuplicateHandle
RegisterWaitForSingleObject
CharUpperW
CharLowerW
MessageBoxW
DefWindowProcW
GetWindowLongPtrW
GetWindowTextLengthW
GetWindowTextW
EnableWindow
DestroyWindow
UnregisterClassW
LoadIconW
LoadCursorW
RegisterClassExW
IsWindowEnabled
GetSystemMetrics
CreateWindowExW
SetWindowLongPtrW
SendMessageW
SetFocus
CreateAcceleratorTableW
SetForegroundWindow
BringWindowToTop
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyAcceleratorTable
PostMessageW
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetWindowPos
USER32.DLL
GetStockObject
GDI32.DLL
InitCommonControlsEx
COMCTL32.DLL
it@~m<z
AB@= M
VoXx^9
n3<9~?"
c=NaGS
8()/ZO
,]dW=5V
rL*M.C
yu{C,6Y7
VO/72J^IQ
[Cx6%
7B9J;K
,zo8$y
3fMK"PNE
&jC/[`
xK]|ZN
Ou'NDB
7REr9D
Nw<ZMN
&G=u7
@<A9eM
L2z3(E*2}+
0eD&ox
ySg[PR2
kSuYZD^
{caCC|
.4;GhH
-Ecnr`
6B dZ-
L:'U02F
C!xgJr]4
PzK'+)(T
4T^9uk"
0};EA3T
M%d=-|2u
R5Exm,
2Y^Pz9
{M=)z!
2k+2M3
s~I2uj
.J3H"@P5
&c22 a
OIWe$w
$uk9Ie}vW
*p-#iR
YUxAi|9
Y7Sp,I
,~U9JO
H59lh:
U06)#(
2{e*5r
qRHH&Y
yLX:T)
55 8av1
8LZGB$cv
Y1h %Ki
Qc)P)2
2sTR..
!>5}4N.
f?^$*5
=@"}fOC
/X`QAvqoJ
=Axbrg
l@bZjL
osPBPC
_3n7Fm
Sc 7&t(
q[3(/!
Dx/?P}
^U%6;.
mOD9Ov
V,CYD<
^#k^5&
c#v<(_
,`#rYBp
"/KF|"
RfacO\
.F-SDW(QpK
uxXA#
-:7' %D
Xw8dp
:btvq2
^%G(CE&I
~Ezt='
sqUii2\
\z,-a}
!4)aQt
BD0O)d>
W70x\j
`O,zYo
nSYvO*F
YW#Abdd
JfXur?+Q
EWh4YF
uC5(l/`:
"@Z&by
isB4@n
L'?rnF[
g:SW}r
oubWF<
NxI*~i
Yw@,v/I
~QNqg
~_6;%+
\+NPpm
BIULmK
0\86:!f;
C2ku_?
^X10&b
[)!'jtd=1
#)U%03
Y 8l"Y
#X)x: ?D
^p]u-\
0vbF1y
ej*=n[
Y[^KY
k"-bza{
~wl^}p
3aV^",i 4[Lk
MP|/[DXk
ql*<Z|
F((E5zn
.Li2[k
0c.xV
wye G(
:x%V?wc
$Mez)qN
$"L@M5>
avVp8;
Bv\\ZE
. %E)5
zwu&@!
#HM6ky
8^m>&Y
vt`-Q!
<B_D9b
a;"1@"#
[Ph&#-
}M^#hkM
BDNWC3s
4FN_NY
K5l^j.
Q%&mNe
?/n]!\^E2;u
(NrH;>
|fYvwPt
p+M\XR\M
A i"8y
io9Q6L\
.;p/r|
jwATe9
oZJDsH
uCm?{_
L<[\P8>H
8J= %6ic{
A"ZbpL
Ny7$~B}
<t<p,=
LRa1-}
`KDXGK
(6A%YtE
9L|&\j
s;`_/)
chAoW2Q
orxI2"vT
qK_^V<1
4.UM$\0
!gGUDK
IDjNgq
vzymH{
Fc1 z{
g_K-#(
710Wx'
j3&0i/
L7+]Ew
Tb.*++Yd
rdq5TF
}w$.pc
]F/7b(
Jz$(q5
_RH"/`9
l1t.N
xjBCFTj
s3oq)
([b=MOY</
(*MM-;]$)Sl
lX^w7B
Mv;m#v
Ui}:@]
gv}pQs
IYcVa
bKo"--
`$qjY0(
`&ooO
iX/0W:
3?d/s5X
BK:'I#s+
.Tqb}JW
\ E&`{<
'wJMIJ
5XtFrTa
tAl%O&
ywwnl?
TU-B{G
vMunX]N
=J>*_l
%(%fp)
T.sJ!n
6idQ[U
SK]7[8
Rt!V=R+c
}u9hI*$
s["~/k
}_K~yz
XO[1RR
SDH7&r
Uhd(b/
T:zF+3
8NTiIi
v)E2)1Yso[
Hpl")C
j5t\De
Nw0%x@
?}=U]#
ZR{&Xj
-T<CPdf
^!aa\d
&pKTDO:
j(7l@y3>
q3P|X[
mm$=S+
n.R.XS
A]i{!?
l_su7&
m&UT*>
DM.@My1a
de#j]%>
<2,7!A
2=qoiu
\N_Kbq
JDGB~K
SDnUo
bQazdG
pHitJ%
3_j!?:2
:6c{#v
l>vA1\
oME`~u:h
'WA|JY
b"WKQt
D;pY[;
,%Uq&d
6BPm8t
D6>]<O
7oFVr-b
.**y[zx9
X;22Kx
B|0S.V+
rYZTSw
_ co&7
}bf4c1
*j(xX_
Z=lh<HT
rNnPs)
iGhQ}L
A/yABS
QWYsKGN
9"\pH*
wK)=mlV
k(LWM
8^ZY!k
7S~GFM6_H-/
g5\rc-
J<3 P1
::P6Ri
Y@a01t
/]m9)r
m-pb$7
nm$H-7
Q~cu,k
D"N6-{
u|XW_F4
QT,wWRx
S"!,VQ
h*hOxo
[)&{1(QM\
>R>%Y=
w)9PP=WAl
.[x6rma
;yMFj9
Lf5lT.R
=N_|"}
3`*A>d
y+We*b
#Kxk"
9AU.x(
jCVB,9
(E~woki
6)SY<T
?)U~{0
&5f;zF
#6cjqX
&'c>1D
|Hgm}
mhx<y6Z
|>z@CG
&YAB8,
Rv"]Au
j=0s+b5
=N3Jk
:SNs8S
?l9V"?
|;-XqPZ
MDASpKCH{
5rd",d
32gGRA8
aP+[F8
uc{VeL
g34$rA
t)UCer
y3.(Ph
lVPmk2
ameHZF6
?A5&Jq
<We$H_
nB 3sf
xjPs,YA
@(S7O8
$EXDB
5MHU^Li^
r6%D9R
[v,45a
m64m"I*
g"}*C
#p&(NJ
_]/Lb&
xo,8[?
[Mi\]x?i
,]mS|_
eQHn0,vI
K#xwf
td!SUZ
C<Q4{z
)3#Y;l
5XHVqs
v{"<$$
!#|X!g
n]8~92
,PDAx]
!FfUJ-z
<!1E%!
Pu{'McS
Rbvu9#N
:.QFHD&
fM])o{
nsT[iei
1S{khk
~iM'DsxQ
(%g*A{
#Sl9=i
% 'NvC
PT/5M'R
e(ciFW
j!rbW9
FlP3MP
G+Yt&Y!|
d6QP&)T
|KjR^?
&`Be&m!
tQD,ey
=v-N;I
eXN"7V
OSixn^
_Es%{%
A#W%RS
aYLwns
3/7`x\
Qy!z=&
5).%8a
h<U~z.
oDeO!Y
*EZgV"
w4wBd8
U*0jy\
{Ji&A S
:loNmg
nPbIW8
Ziho(B
|(QWzm
[v*ES(
=J<}5.
(:],g=
`zc"66v+
x5j"6h
fA>xNI
t>s;%"
7qZK"8
'iebljr
Y^?~<j
.eVQwla<
w#B+`(
i%*hR-
O}~]`;
7C1& -
/=P;M`
GPh}M
nQdgI`
8\CIB[
dMtj[w
vfr&y
e'y@*p
b;1-{,
,?.BZM
2Z=yH%s
)KZMBB
:6!o=+}
Cx@<\W3
920 4V
O*~OO`
tf"M_w4
'Qq$'>
+45pQ}
lO0|;l
a)&3T7
rsP!V_+
liWT[z
]30w2/]
kN+9E>
-e|5]m4
q*}*f!
#rQ\wuJ
b3:Q9
s&=K$G
:Awg:
si]psf
q!5$RoQS
$^QspA
0W/b=HcX
F@Gy4G
nF;z~
DFunY)
\uSQSP
{HFlfut
u9CWK^
dV^2a,
-LX!iXi
t\Umh(
<mx&X~\
(4m7]h
5lGh}M
/bQE]9
`cx#-h
{,T;gy/
[22rO7
69y#I:
5worJC
.OAT_SI
T w`"0;
I27{;dh
?:Tc,P37j#
({~^ou
RF<lim
*/u,J>
"/%L(Pw|
)!^+umO
:f2S::
<;qwH8W
''x9*ts
sX^\qV
&r_*7XjWj
YP?>Frv39
M`''[&Q
PvUwZw,
,&f/eUG
@k?hGa
wqH~]"mtUP
< BfGc
_dEb{F
xF-Li7$
A|DdCc
G-m"lA
YrQ *ii
KAow-;mA,k-
34k20<
\v[z([
8.)2K]
KOi^=k
MO<dlp
Ot/AJC
xf\6%!
~XzoGa
UjOp;V2
`.om0L
TQwOfGX
}_}%cK
MYl|T{
b%m'<=
Q*#5KT
!@MCWo
_c2Ia?pq
-e7bG~
gCtfhx7
,S4D>cn
Q>%!ehs
-/Y<[!
}\<Z:=
Z\N~DB@M
ZJ`uf
fMz+T)
/;g4eh!;NX
/=Ab2>
#143i
d/!W"5;
2US6$DzN
hI?@+t1
\<;tS3
kl*o.p
=vH0b:
5ds5m(
Ph+r>g
{+e;R
@->]K]
pUdQf&q*&
5rDp"$
{FlXhN
SU2W+I
Kv"gH*+
qJ}Iwu
biRMx,B}(f
nq/[CZXRe
iK@e.y\9
"l|Fg F
lR?A_
,GHi5%#
>RM]gC
H;_?u@
DS1Y6d
@36dQF
A<O],K
cCO\2I
<SVg(
R8p\:{
cnjkUx
$=?,>
py!l`)
(LHivvkU
CKScSi
PAD<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
version="1.0.0.0"
processorArchitecture="amd64"
name="CompanyName.ProductName.YourApp"
type="win32" />
<description></description>
<dependency>
<dependentAssembly>
<assemblyIdentity
type="win32"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
processorArchitecture="amd64"
publicKeyToken="6595b64144ccf1df"
language="*" />
</dependentAssembly>
</dependency>
</assembly>PPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
InputRequester
STATIC
BUTTON
SHELL32.DLL
Invalid memory access
Array bounds exceeded
Debugger breakpoint reached
Misaligned data access
Denormal floating-point operand
Division by zero (floating-point)
Inexact floating-point result
Invalid floating-point operation
Floating-point overflow (exponent to great)
Floating-point stack overflow or underflow
Floating-point underflow (exponent too small)
Illegal instruction
Memory page error
Division by zero
Integer overflow
Exception handler returned unknown value
Exception handler tried to continue after non-continuable exception
Privileged instruction
Single step trap
Stack overflow
Unknown error code
Kernel32.DLL
Shell32.DLL
Downloads\
Kernel32.dll
#+3;CScs
(088F33071164AFDD13A1D8D3F033D4354C25ADA3 38F79B3BE557F324A3690942EA02BD4E(3BC34CB636B06DB6485FEF9432C182A88664CCD6(52D128DF253DEEB204A6836E56C8F580A1D6C151 5A36767C2D17F4283F675EBB3000DCCC(A04570847E674294ECB3840C16FFCD86E5DC5A9D
CD95BFF167
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.ClipBanker.7!c
Elastic Clean
MicroWorld-eScan Gen:Variant.Bulz.577413
CMC Clean
CAT-QuickHeal Clean
ALYac Gen:Variant.Bulz.577413
Cylance Unsafe
VIPRE Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Gen:Variant.Bulz.577413
K7GW Trojan-Downloader ( 0058026e1 )
Cybereason malicious.4c6466
BitDefenderTheta Clean
Cyren Clean
Symantec Trojan.Gen.2
ESET-NOD32 BAT/TrojanDownloader.Agent.OIU
Baidu Clean
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky Trojan-Banker.Win32.ClipBanker.qcm
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Tencent Clean
Ad-Aware Gen:Variant.Bulz.577413
Sophos Mal/Generic-S
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win64.Dropper.gc
FireEye Generic.mg.17b0dca4c5d5c303
Emsisoft Gen:Variant.Bulz.577413 (B)
Ikarus Win32.Outbreak
GData Gen:Variant.Bulz.577413
Jiangmin Clean
MaxSecure Trojan.Malware.300983.susgen
Avira Clean
MAX malware (ai score=100)
Antiy-AVL Clean
Kingsoft Win32.Troj.Banker.(kcloud)
Gridinsoft Clean
Arcabit Trojan.Bulz.D8CF85
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Conteban.A!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!17B0DCA4C5D5
TACHYON Clean
VBA32 Trojan.Win64.MulDrop
Malwarebytes Trojan.PowerShell
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H0DGU21
Rising Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
eGambit Clean
Fortinet BAT/Agent.OIU!tr.dldr
Webroot W32.Trojan.Gen
AVG Win64:Trojan-gen
Avast Win64:Trojan-gen
CrowdStrike win/malicious_confidence_60% (W)
Qihoo-360 Clean
No IRMA results available.