Static | ZeroBOX

PE Compile Time

2019-07-30 17:52:08

PE Imphash

f326f88ca83c9aacaa44acfb8884f1d4

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.code 0x00001000 0x00005b79 0x00005c00 5.50779274356
.text 0x00007000 0x00010d25 0x00010e00 6.35313701668
.rdata 0x00018000 0x00004b9d 0x00004c00 6.68530518547
.pdata 0x0001d000 0x00001140 0x00001200 5.00395662987
.data 0x0001f000 0x000023b8 0x00001600 4.38951062529
.rsrc 0x00022000 0x00052430 0x00052600 7.99804703174

Resources

Name Offset Size Language Sub-language File type
RT_RCDATA 0x00022740 0x00051800 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022740 0x00051800 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022740 0x00051800 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022740 0x00051800 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022740 0x00051800 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022740 0x00051800 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x00022740 0x00051800 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x00073f40 0x00000288 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000741c8 0x00000267 LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, ASCII text

Imports

Library msvcrt.dll:
0x14001f6c8 memset
0x14001f6d0 wcsncmp
0x14001f6d8 memmove
0x14001f6e0 wcsncpy
0x14001f6e8 wcsstr
0x14001f6f0 _wcsnicmp
0x14001f6f8 _wcsdup
0x14001f700 free
0x14001f708 _wcsicmp
0x14001f710 wcslen
0x14001f718 wcscpy
0x14001f720 wcscmp
0x14001f728 wcscat
0x14001f730 memcpy
0x14001f738 tolower
0x14001f740 malloc
Library KERNEL32.dll:
0x14001f750 GetModuleHandleW
0x14001f758 HeapCreate
0x14001f760 GetStdHandle
0x14001f768 SetConsoleCtrlHandler
0x14001f770 HeapDestroy
0x14001f778 ExitProcess
0x14001f780 WriteFile
0x14001f788 GetTempFileNameW
0x14001f790 LoadLibraryExW
0x14001f798 EnumResourceTypesW
0x14001f7a0 FreeLibrary
0x14001f7a8 RemoveDirectoryW
0x14001f7b0 EnumResourceNamesW
0x14001f7b8 GetCommandLineW
0x14001f7c0 LoadResource
0x14001f7c8 SizeofResource
0x14001f7d0 FreeResource
0x14001f7d8 FindResourceW
0x14001f7e0 GetShortPathNameW
0x14001f7e8 GetSystemDirectoryW
0x14001f7f0 EnterCriticalSection
0x14001f7f8 CloseHandle
0x14001f800 LeaveCriticalSection
0x14001f810 WaitForSingleObject
0x14001f818 TerminateThread
0x14001f820 CreateThread
0x14001f828 Sleep
0x14001f830 WideCharToMultiByte
0x14001f838 HeapAlloc
0x14001f840 HeapFree
0x14001f848 LoadLibraryW
0x14001f850 GetProcAddress
0x14001f858 GetCurrentProcessId
0x14001f860 GetCurrentThreadId
0x14001f868 GetModuleFileNameW
0x14001f870 PeekNamedPipe
0x14001f878 TerminateProcess
0x14001f880 GetEnvironmentVariableW
0x14001f888 SetEnvironmentVariableW
0x14001f890 GetCurrentProcess
0x14001f898 DuplicateHandle
0x14001f8a0 CreatePipe
0x14001f8a8 CreateProcessW
0x14001f8b0 GetExitCodeProcess
0x14001f8b8 RtlLookupFunctionEntry
0x14001f8c0 RtlVirtualUnwind
0x14001f8d8 HeapSize
0x14001f8e0 MultiByteToWideChar
0x14001f8e8 CreateDirectoryW
0x14001f8f0 SetFileAttributesW
0x14001f8f8 GetTempPathW
0x14001f900 DeleteFileW
0x14001f908 GetCurrentDirectoryW
0x14001f910 SetCurrentDirectoryW
0x14001f918 CreateFileW
0x14001f920 SetFilePointer
0x14001f928 TlsFree
0x14001f930 TlsGetValue
0x14001f938 TlsSetValue
0x14001f940 TlsAlloc
0x14001f948 HeapReAlloc
0x14001f950 DeleteCriticalSection
0x14001f958 GetLastError
0x14001f960 SetLastError
0x14001f968 UnregisterWait
0x14001f970 GetCurrentThread
Library SHELL32.DLL:
0x14001f988 ShellExecuteExW
0x14001f990 SHGetFolderLocation
0x14001f998 SHGetPathFromIDListW
Library WINMM.DLL:
0x14001f9a8 timeBeginPeriod
Library OLE32.DLL:
0x14001f9b8 CoInitialize
0x14001f9c0 CoTaskMemFree
Library SHLWAPI.DLL:
0x14001f9d0 PathAddBackslashW
0x14001f9d8 PathRenameExtensionW
0x14001f9e0 PathQuoteSpacesW
0x14001f9e8 PathRemoveArgsW
0x14001f9f0 PathRemoveBackslashW
Library USER32.DLL:
0x14001fa00 CharUpperW
0x14001fa08 CharLowerW
0x14001fa10 MessageBoxW
0x14001fa18 DefWindowProcW
0x14001fa20 GetWindowLongPtrW
0x14001fa28 GetWindowTextLengthW
0x14001fa30 GetWindowTextW
0x14001fa38 EnableWindow
0x14001fa40 DestroyWindow
0x14001fa48 UnregisterClassW
0x14001fa50 LoadIconW
0x14001fa58 LoadCursorW
0x14001fa60 RegisterClassExW
0x14001fa68 IsWindowEnabled
0x14001fa70 GetSystemMetrics
0x14001fa78 CreateWindowExW
0x14001fa80 SetWindowLongPtrW
0x14001fa88 SendMessageW
0x14001fa90 SetFocus
0x14001fa98 CreateAcceleratorTableW
0x14001faa0 SetForegroundWindow
0x14001faa8 BringWindowToTop
0x14001fab0 GetMessageW
0x14001fab8 TranslateAcceleratorW
0x14001fac0 TranslateMessage
0x14001fac8 DispatchMessageW
0x14001fad0 DestroyAcceleratorTable
0x14001fad8 PostMessageW
0x14001fae0 GetForegroundWindow
0x14001fae8 GetWindowThreadProcessId
0x14001faf0 IsWindowVisible
0x14001faf8 EnumWindows
0x14001fb00 SetWindowPos
Library GDI32.DLL:
0x14001fb10 GetStockObject
Library COMCTL32.DLL:
0x14001fb20 InitCommonControlsEx

!This program cannot be run in DOS mode.
`.text
`.rdata
@.pdata
@.data
UAWAVH
D$XPM1
D$hPM1
HcD$`PH
PLc|$hH
Lc|$hLct$`H
Lct$`H
D$hLc|$`H
Lc|$hI
/PLc|$hI
PLc|$pI
Lc|$`I
D$`Lc|$hLct$`H
D$hLc|$`I
Lc|$hI
/PLc|$hI
PLc|$pI
/Lc|$`I
Mc</Lct$hI
D$pLc|$pI
D$XPM1
D$hPM1
D$(H;D$0
YZAXAYH
YZAXAYH
YZAXAYH
t$pYZAXAYH
t$pYZAXAYH
t$hYZAXH
t$hYZAXH
t$hYZAXH
t$hYZAXAY
t$`YZH
YZAXAY
t$`YZH
YZAXAY
t$`YZH
YZAXAY
t$`YZH
PPPPPPH
$YZAXH
t$8YZAX
$YZAXH
t$xYZAXH
t$hYZAXH
L$XZQH
t$XYZAXAY
HcD$@PM1
L;<$t8I
L;<$t+I
PPPPPH
PYZAXH
PYZAXH
t$xYZAXAYH
t$xYZAXAYH
YZAXAYH
t$pYZH
$YZAXH
t$hYZAXAYH
PPPPPH
t$xYZAXH
t$8YZAX
D$HH;D$P
t$pYZH
YZAXAY
t$8YZAX
t$PYZAXH
t$XYZAXH
t$hYZAXH
L$ UH1
t$hYZH
PPPPPPH
t$XYZAXAY
PYZAXAYH
PPPPPPH
t$XYZAXH
t$`YZH
t$XYZH
YZAXAY
L;<$uFQH
L;<$u<H
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
L;<$uLQH
t$HYZAXH
t$xYZAXH
t$hYZH
t$pYZH
t$xYZH
t$`YZH
YZAXAYH
YZAXAYH
L$ AWH
YZAXAYH
PPPPPH
t$`YZAXAYH
t$`YZH
YZAXAY
PPPPPH
PPPPPH
t$@YZAX
|$8L;|$pu
@UATAUAWH
fA9<Fu
(A_A]A\]
(A_A]A\]
|$ ATAVAWH
A_A^A\
SUVWATAVAWH
H+D$ I
H+D$(H
0A_A^A\_^][
|$ AVH
WAVAWH
A_A^_
@SVWAVH
(A^_^[
(A^_^[
WAVAWH
fD9;t1
A_A^_
@SUVWATAUAVAWH
fC9,~u
fB9,ou
u!Hc\$8H
HA_A^A]A\_^][
UVWATAUAVAWH
A_A^A]A\_^]
t$ AVH
t$ UWAVH
UVWAVAWH
0A_A^_^]
x UATAUAVAWH
A_A^A]A\]
UATAUAVAWH
f9LD^u
A_A^A]A\]
f9(tIH
USVWATAUAVAWH
A_A^A]A\_^[]
HcD$0H
WAVAWH
fD9<Yu
0A_A^_
WAVAWH
A_A^_
WAVAWH
1Lcy(E
A_A^_
t LcC03
LHcO<H
t LcG03
HcQ(;Q<}
Q(;Q<}
M\f9L_
L$@D+A
HcD$@H
VWATAUAWH
A_A]A\_^
|$ AVH
HcD$HH
|$@HcD$HH
l$P9i$
HcD$PH
WATAVH
A^A\_
UVWATAUAVAWH
3t$@D3d$<D
3t$PE3
D3d$(A
D$ 3\$0D
3\$4A#
D3t$`D
nD3t$LD3
D3|$HA
D3l$@D
x D3l$(A
3D$83D$4A3
D$X3D$,D
L$ 3D$03
D$D3D$TA
3D$(A3
D$ 3l$4D
L$ 3D$<3
L$ 3D$,A3
D$ D3d$4D
D3t$XH
D3t$<A
D3t$0#
D3d$HA#
3l$T3|$0D
h<D3d$(
D3|$4A#
|$ 3l$8A
D3t$<A#
D3l$,3l$LA
D3l$P3l$0
3l$PA#
D3t$HD
D$ 3t$(
l$@D3l$4
D3l$0A
D3d$(A
D3|$<A#
D3t$LA#
D3t$,D
3t$<A3
l$@3l$L3t$HA
|$(3l$T
\$X3\$D
D3d$\A
3\$HA3
t$ D3|$T
D3|$PA3
D3|$H3
3l$DD3t$TD
3l$8D3D$4A
3l$PD3D$0
D3d$,D
D3d$4A
D$ 3t$(A
D3D$LD3D$,
D3d$<D3l$D
pA_A^A]A\_^]
WAVAWH
A_A^_
UVWATAUAVAWH
@A_A^A]A\_^]
|$ AVH
!s H!s
A9@ u`A
WATAUAVAWH
A_A^A]A\_
WATAUAVAWH
0A_A^A]A\_
H;G uSH9s
D$(HcD$HH
u%HcD$ H
+HcD$ H
HcD$ 3
HcL$HH
HcD$HH
HcD$ 3
D$ HcD$@H
H9D$@r2H
H9D$@w
D$ HcD$@H
D$XHcD$PH
D$ HcD$ H
HcD$ H
HcD$XH
D$0HcD$XHcL$PH
D$ HcD$@H
HcD$@H
D$ HcD$@H
HcD$0H
D$(HcD$0H
D$8H9D$
UVATAVAWH
A_A^A\^]
wEA;M0w?
MP;H(s
MP;H8s
A;M8v"A
E;}$tXH
L9w@t?
i H9i0u
A0H9i8u
~0L9s0tKL9s8tEH
L9w0t1L9w8t+H
t"H99u
C<;C4A
C8;C4s
USVWAUAVAWH
A_A^A]_^[]
SUVWATAUAVAWH
8A_A^A]A\_^][
HcD$0H
WAVAWH
@A_A^_
|$ AVH
|$ AVH
t$ AVH
|$ AVH
SHBrowseForFolderW
SHGetPathFromIDListW
GetLongPathNameW
SHGetKnownFolderPath
0123456789abcdefK
InitOnceExecuteOnce
1.2.11
incorrect header check
unknown compression method
invalid window size
unknown header flags set
header crc mismatch
invalid block type
invalid stored block lengths
too many length or distance symbols
invalid code lengths set
invalid bit length repeat
invalid code -- missing end-of-block
invalid literal/lengths set
invalid distances set
invalid literal/length code
invalid distance code
invalid distance too far back
incorrect data check
incorrect length check
Qkkbal
[-&LMb#{'
w+OQvr
INSKyu
)\ZEo^m/
H*0"ZOW
mj>zjZ
IiGM>nw
ewh/?y
OZw3(?
V_:X1:
inflate 1.2.11 Copyright 1995-2017 Mark Adler
need dictionary
stream end
file error
stream error
data error
insufficient memory
buffer error
incompatible version
memset
msvcrt.dll
GetModuleHandleW
HeapCreate
GetStdHandle
SetConsoleCtrlHandler
HeapDestroy
ExitProcess
WriteFile
GetTempFileNameW
LoadLibraryExW
EnumResourceTypesW
FreeLibrary
RemoveDirectoryW
EnumResourceNamesW
GetCommandLineW
LoadResource
SizeofResource
FreeResource
FindResourceW
GetShortPathNameW
GetSystemDirectoryW
KERNEL32.dll
ShellExecuteExW
SHGetFolderLocation
SHGetPathFromIDListW
SHELL32.DLL
timeBeginPeriod
WINMM.DLL
CoInitialize
CoTaskMemFree
OLE32.DLL
PathAddBackslashW
PathRenameExtensionW
PathQuoteSpacesW
PathRemoveArgsW
PathRemoveBackslashW
SHLWAPI.DLL
wcsncmp
memmove
wcsncpy
wcsstr
_wcsnicmp
_wcsdup
_wcsicmp
wcslen
wcscpy
wcscmp
wcscat
memcpy
tolower
malloc
EnterCriticalSection
CloseHandle
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
TerminateThread
CreateThread
WideCharToMultiByte
HeapAlloc
HeapFree
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
PeekNamedPipe
TerminateProcess
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcess
DuplicateHandle
CreatePipe
CreateProcessW
GetExitCodeProcess
RtlLookupFunctionEntry
RtlVirtualUnwind
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
HeapSize
MultiByteToWideChar
CreateDirectoryW
SetFileAttributesW
GetTempPathW
DeleteFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
SetFilePointer
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
DeleteCriticalSection
GetLastError
SetLastError
UnregisterWait
GetCurrentThread
RegisterWaitForSingleObject
CharUpperW
CharLowerW
MessageBoxW
DefWindowProcW
GetWindowLongPtrW
GetWindowTextLengthW
GetWindowTextW
EnableWindow
DestroyWindow
UnregisterClassW
LoadIconW
LoadCursorW
RegisterClassExW
IsWindowEnabled
GetSystemMetrics
CreateWindowExW
SetWindowLongPtrW
SendMessageW
SetFocus
CreateAcceleratorTableW
SetForegroundWindow
BringWindowToTop
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyAcceleratorTable
PostMessageW
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetWindowPos
USER32.DLL
GetStockObject
GDI32.DLL
InitCommonControlsEx
COMCTL32.DLL
c````d
rj@X:B
(-F-Br
aAQL'#d
TJYH|=
,u61N|A@E&
"3a#(6
R_OwXX
B(LJ\C
TE1GT7]i
F9ugZ&
RAb^Dw
kiqc7g
zv"p`Q
1,|n9I
`,_TC#4"L
D]pCs3
#aLj.h
t~sp~$
%+XfC
k1rk[F
a'@`\Nd
$vRwu_
tdZHagu
Uk'm1K
|(X>{w
j@`;2N
5=)7'X
-SyOb3
wG}#k\
(bWktP
dk\$nB
}za<kK1
DCRAyY
/Wq]ix.
U|dW8D5
tY&iV3
rzJ&kC
yS:~$)
~cYw<~"
9kJ>e{;
4}\~{6
&IP_<
yi2Qb+Py
|i}ND2
cx4\;$"+
{TrPC_
^F-aso
t'dn8N
!Yk:7)
i$[H%
gu~yZ>Q
Gm]g( h8
N0`S/RMTv
4*2+!i
}ML@,;
<i+x>-
;(Spyg
[P^F0j
~bWPu*!
p~V3A%G+O
}K*ncAe
gM~K1i
dND5RB
fcjZWiz{Q
TvPt,T
_KE'T,
4XxC$r
BYa:k"
x]g#c@[
y<4Y`N
9h$RhTx
<?V@62
@^])"_
3eHFc)
aj$ge]
0mmsX<
EEFZ8o
NJ$Tw[e
bYI8X{
Mt:F=b
Ppw0(|
~#b]cZ
eY~/>P
>UXVkN
Oc/8]X
3>MyZv
r&*Xs.
.|:z?K
= K|,X
<vC>"}
b=qV9{
m~Q{~)_7
tJ;'N%
9GxlrH
^>}oji
-SK?s4
(l!v9]
{;YUD>
t|&:WQ
r'*4DE
=n^"h5M;
t2,y2x
[q^\6)
3A=/:V
ZQ.Y{MJ
;d&)uPiM
!{!QoW
O&K46N
CiXx/"
!H-X40R
~!_t0.
nsujO@&
a_1Xk)}
cBu0R*A
T+UrU
;q-e:k
G>PRrH
2~s7gWS
w^oq~Q
5yup5&
g-!+G
L DArCZ
9L;il{
A9.>1z
m7:^`=:G
W/_s}x
$RyyuS
(]#^6y&8H
VLU Qw
]6o\^XBH
V4~.ej
l3UW!,`u
q/Vx[
'5v.g\Fa9
cNV`BN
>u3wJ8t
bOnO}
~A!6K}h
u69w`4
;%%2u'W
<gpzAG
G:`q1ao
czx3R,
mB/os
J[>cv8b
eB,Xw@V
_'#M+"
=j!tduU
`Ny|3L|
L{PALY
ryfs!o[
A<eAW$
sS%Z,8@
8p5>Zi
@^$2v3ae+
t`H#Ol$
W'615u
>3=}qq
7riP.9
X[6%S9h
SOPz37
@W{1rx
M87Ng.`G
=F%C12
<e^Hgp=
Q11`zi
-,$!a,@
rc_S'y
0\NQFW
>{r^kb
rItcZO7
*4?^]wm%
<(pb6X
+5)RaO
uDAOQchv
;*;TrQ
^bu`F;F
hSQ%PF
qL&%UB
[J{w[wi
X4s2ke
vmk#XX
GHFz p
:Dv(aP
*hnyPGMEl
D@Rq~J6
#D6wW^-
='cs++
w"zgq}ao
X<Ba29
*cPq)n=P
;zB}C-
^j2pd@
.S&[s7
2ma5'5
,Y@HV
OCCQcr>
V~FKnR
N]*{;uh
>l/kD}{
Ah[En8
QZ:$ik
$Fp@G0
:A~e"I
-\~>;H
I*VMf"
[Q7tpV
./,0>[ )`
ljCkk#qS
T%xxnu
'Y%`L#
o&M?z,h
Uw=aF+
i]e;9o
PsBhwN\5
5 Q_:mZBsqb
H>`Id-
hur{b7
f`w}]0
M'''bg
mW!Se
W:])<{
J:NU1n/
Vi~+u6)l
h_9E>-
01FI ,
?TEDoj`
{jK^&^+
U\R)m_
iMih6)
+RFMr<
3j#Nxw
O;v\5Wq
]b%M^C+S
i7fHAXK
G;I+S`
qw{,yD,&<GFNQ@"
$zr@wk
\]E`0;
k9GT2eV
^G^Kuc
6ozlZ3
1|&)v`
}P*',&
v!!R;`>
gplYs3
iQw{9Z3$,
{It5~
1}`j3Zl"
cQ.];{
`n!F _
Ef#yISm
-L6dZ-
K=EJ&NE]h
q%V2mi>
qp|(f.t
Qc~0:k
o\H;uf
t;^j0
PV2%=!
{[p*5N"
AA}NKi
+3ZZoe2?B@
t"~gOq9
H-r^ER-
JuZX8%
" :wDNu
*n ]i<
Y4Vl/-
3*C9z9
q0XO}J
`jx$wl
n1Z}/
?>nj+yRr
J2Dv|L
<0XiaM
4R<u)r'g1
ZAR)p]
~wno\L
>,!!jn
"Y^XO*5y
{{pBt7
0m4e]c
yW"d8J
$*s>E-
*,\_7I
k8V*'ZA
x-7v'0p
*zG6Mc
4]]$}-
p5seB8
4{,+'X
tU|cvg
{q*s*oq
C/]#48%
yHS.(Y
q;3Cep'
!-Q*B&
;vx,]C
=9"\$:
DE6DM]z
*'.B!'
Jo~usd
{v4o3uT
!#QA[B$
l+p};
#+:]T]X
x|lga2X~
.&u_dA
}1\=9E
1>YQ`>
S=Xq|a
wOzX-"
[`vg$ >
70cO]]
N/0A%+
-$wn)*
gW_{,
7nr2:=
2cV,sW
6GC2x<\4
zb+=xp|
pHTP8a
mS}3)EF
&eqk}gi
=9(|o<
2pV"D0i
6_E( 9
+uH\|:
Ro+P*T
~(wgh?[
|8;irE
4aV(vM
EgDO!&
=r#Kl
GDD2pA
7 fy$I%{
r+Va=V
d*83K{
(n0kGl"|
vf,MfZf
6E6rUd
fM&wG`
{*3Y!Q
,(%RcxMpmZ
1x'l/_Jw
!T*b8,
?8vk&:~z
+DRx]!yR
U={ntu
1Rbo3A
k)qX-j
QtBfz`
Xo7ZFM%d
7F0AAKyk
n%@?\@
dcpi]&
q{")?
=C-2~T"
qOAVC+
&cuC)h
]27N]
V/(#{pT
E~cFr5
a7t(s4
'%\#??
K\J2g]\|+
N$S"Uo
kL^T\9e
|2ZVw\0
.eu"E
h14?3i
VN~Cao_
*g;\I:
:.3\w\s
~gXE?m
,E;'M7
L|_i`z
a0O-k6
~;hYDQth
mA!b,W
u,AGzN
[iKv,R
*mi:aXY
v}EW8p
}22:Y2,.=
)K=65
lmD> [
mcCElH
GSp.5OVv,
=dZYDN
Y.=J-m
s(#w%/
KL4Q{Q}5
84}pZH
t<Ap[]
8y9'oP,
[KBlAPs
#zGqEy
{j<R\S
j-2UJyt8
4l6fi*u{q
H.x|}o
u[^2.$6
2( /w?Q
z;}A)!
;7lzCf
bX*I\[H:
l?<&hKt
TLS+do\
s*T5tB7
b}}[['
fPA?;o
YKm&[}
[xZqR4
q~-E~Q<
B_ue5$
jeq1o&[Q
yg}Qb9
Uu/q1G'z9
h^Edox
uqVe.<
U!ZY;P
_B,C}W
7/K`Q<
{N7Ae.z
^!BqT)
Tb$+%~
u]v%0jH
N)ZL8=>"
Kw)28R
<lk:"B
x:Fm1"/\
9Ab*^Y
CBkO"L
o/#k*8I
*ALB(N
U]g|yQ
~mKF@@
(y`~A2I
MZBhN(
(*6ew`TL
xN!RG_
ZkAIya
FXH!xz
4)UX/<L<F_
Z8.]sA
vO@grHl^
es@^fms
m_?;.R
p |,=3
'@3bg9p<
Gd2@{?
mo0lrc
>-LyqN
7C$kV]
t78N,U
Tp`v8\p
Aih5P/
5[MB)tc
'$!DUB
D4nl j
OuH1I
D4bw.[
[pRk8X
=Z`&}X
c6Uy9-
7u6CZS
ko>8\x
adAvU[Y
UJPJf
"Rx4Kt
E4I4W2
2@1o@qI
ov2lfB
8N04}
~`e&JLg
s@l*v<"
4A:1QF
zm-`T-||
"b"0[Sh$%<P.
,GU5jq_\
=HR>?,C
Dk0A.dF
P=f}9\P
)%V_lp
3.<h>\
Jm\# *
x0=*6;
6[m{t=y
y#(iXq
X~]LF}
;KfG"L
B24=Bx
qGQ(lb
V8O*V>
!uLT/(
Hk0NRX
'f;5]iP
#$Ce]/
I1gjuq}/
M;%J9p`
Z^M2J#
?KwtWS
,&{A^N
j$rFOH
<fZCo!1
3/wVI|
cQ*{>(
7j,T*OH
ih/yhj
9\'dn(
EB(Om%
3Sw:'
Z1,k*E
(1J(wb
n3]k+N
>V:4\z`
~(^'D:]
mxaB!t
c-{U{?
xYA.I'
&_[YpT
JpOzOS
UZ0,Oi
?ek$FO
\$,P-(
EnifMU
I,uY4nLQyoT
k@$a1QTv
7vq_+],
AX%U3f
04w!?]
p|-$l3R3
>\}M^m
iV`J-P
K4$m0ZG
pBC^Cs
s,{5,x
-E]_~A
`l`O4N
<6^v]F
,QD"._
aW)sZB
7ha/@u
:9}[9kqh
4&L=KJ&I
T<K+6#
U*0V9}
GKYFn[
7[HJ4>GX
|vdC8:
6J=PXl
ql-5gi
~c1H$der
,Jx78L
td~W#H
\i$}gz
GgdM-J+.
:wEodG
jKtXKcB
>?}b(A
_0;MkN
&l=Sr?Bs
m|R;Im<]
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
version="1.0.0.0"
processorArchitecture="amd64"
name="CompanyName.ProductName.YourApp"
type="win32" />
<description></description>
<dependency>
<dependentAssembly>
<assemblyIdentity
type="win32"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
processorArchitecture="amd64"
publicKeyToken="6595b64144ccf1df"
language="*" />
</dependentAssembly>
</dependency>
</assembly>PPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
InputRequester
STATIC
BUTTON
SHELL32.DLL
Invalid memory access
Array bounds exceeded
Debugger breakpoint reached
Misaligned data access
Denormal floating-point operand
Division by zero (floating-point)
Inexact floating-point result
Invalid floating-point operation
Floating-point overflow (exponent to great)
Floating-point stack overflow or underflow
Floating-point underflow (exponent too small)
Illegal instruction
Memory page error
Division by zero
Integer overflow
Exception handler returned unknown value
Exception handler tried to continue after non-continuable exception
Privileged instruction
Single step trap
Stack overflow
Unknown error code
Kernel32.DLL
Shell32.DLL
Downloads\
Kernel32.dll
#+3;CScs
4A7AED19672708A06F87284AE37EAB3A(5090FB9F64C959C6A69CFA23B0B0A9F3FCADE550(66A3E3A6B3599683DF500A480F8FB21B77C08D4C 8C349E275989748DD257B85C489A6455
9B52211710(C585BE3F1497532A6B2EB402A026A7782B706725(D1117A9BF4749D8E92C04BF6140DC810D74D5623
VS_VERSION_INFO
StringFileInfo
040904E4
FileVersion
1.1.1.2
ProductVersion
1.1.1.2
ProductName
BONNAL LTD
OriginalFilename
BONNAL LTD
CompanyName
LegalCopyright
Microsoft (c)
PrivateBuild
microsoft
SpecialBuild
microsoft
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Cryrar.tqFl
Elastic malicious (high confidence)
DrWeb Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Gen:Variant.Bulz.569703
Cylance Unsafe
VIPRE Clean
Sangfor Clean
CrowdStrike win/malicious_confidence_60% (W)
BitDefender Gen:Variant.Bulz.569703
K7GW Trojan-Downloader ( 0058026e1 )
K7AntiVirus Trojan-Downloader ( 0058026e1 )
BitDefenderTheta Clean
Cyren Clean
Symantec Trojan.Gen.2
ESET-NOD32 BAT/TrojanDownloader.Agent.OIU
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky Trojan.Win32.Bingoml.ceyw
Alibaba TrojanDownloader:BAT/Generic.5e470fec
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Bulz.569703
Tencent Bat.Trojan-downloader.Agent.Lndw
Ad-Aware Gen:Variant.Bulz.569703
Sophos Generic ML PUA (PUA)
Comodo Clean
F-Secure Clean
Baidu Clean
Zillya Trojan.Generic.Win32.922194
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win64.Skintrim.gc
FireEye Generic.mg.a1e0aa315c2caf13
Emsisoft Gen:Variant.Bulz.569703 (B)
SentinelOne Static AI - Malicious PE
GData Gen:Variant.Bulz.569703
Jiangmin Clean
eGambit Clean
Avira TR/Dldr.Agent.oqqxg
MAX malware (ai score=82)
Antiy-AVL Trojan/Generic.ASMalwS.2BB2C00
Kingsoft Clean
Gridinsoft Trojan.Win64.Downloader.sa
Arcabit Trojan.Bulz.D8B167
SUPERAntiSpyware Clean
ZoneAlarm Trojan.Win32.Bingoml.ceyw
Microsoft Trojan:Win32/Sabsik.FL.B!ml
AhnLab-V3 Trojan/Win.Generic.C4603938
Acronis Clean
McAfee Artemis!A1E0AA315C2C
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Downloader
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R049H09HL21
Rising Clean
Yandex Clean
Ikarus Trojan-Downloader.BAT.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet BAT/Agent.OIU!tr.dldr
Webroot Clean
AVG FileRepMalware
Avast FileRepMalware
No IRMA results available.