Static | ZeroBOX

PE Compile Time

2022-10-28 12:15:53

PE Imphash

8f54c7f89ab7fb80e3cbd057af48cb19

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00062000 0x00029000 7.97721825971
.sedata 0x00063000 0x000e9000 0x000e9000 7.57817651129
.idata 0x0014c000 0x00001000 0x00001000 1.30913488182
.rsrc 0x0014d000 0x00011000 0x00011000 3.43957663882
.sedata 0x0015e000 0x00001000 0x00001000 7.98224452072

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0014d0e8 0x00010828 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_GROUP_ICON 0x0015d910 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_VERSION 0x0015d924 0x00000418 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data

Imports

Library KERNEL32.dll:
0x54c2ae HeapSize
Library USER32.dll:
Library GDI32.dll:
0x54c2c6 SetMapMode
Library comdlg32.dll:
0x54c2d2 GetOpenFileNameA
Library WINSPOOL.DRV:
0x54c2de OpenPrinterA
Library ADVAPI32.dll:
0x54c2ea RegCloseKey
Library SHELL32.dll:
0x54c2f6 SHGetMalloc
Library COMCTL32.dll:
0x54c302 None
Library oledlg.dll:
0x54c30e None
Library ole32.dll:
Library OLEPRO32.DLL:
0x54c326 None
Library OLEAUT32.dll:
0x54c332 SysFreeString
Library MSVCRT.dll:
0x54c33e strncpy
Library IPHLPAPI.DLL:
0x54c34a GetInterfaceInfo
Library PSAPI.DLL:
0x54c356 GetMappedFileNameW

!This program cannot be run in DOS mode.
.sedata
.idata
.sedata
<s_Rw?f
p;/R=a^ 
1{/iCp^
O>_6de
=Nj+2qE
Fo!p/
A]4S0J
:rk9-$:
LB4Ctf<sk
=<q2Tu
V7wFa>
&)`z3t
eOyZG-
Vhq9s:
f&9;iB
R)'._.
g6}6*{
OQ\vEC-
^6^UE+
SXF?nt
Es\ ^z
x=*X]+
*\tT'yd
nNy*h&a
3ogk}F
E@z$n2O
3dM'eD
{ECY&l
kGhOR[%b-6n
;xzZzY
'K0!sh
V{]IXs
>g&$VF
:^=6ZQ
[CaX,HR
HSX@_.1
W@EF$4
wt|M~NT
!z8u}m
7buT-P
aA_cKsS
#b4zKB
UUCyOy7
>${Ln\
B:%To8
Q"+{}d
IF!JUAG
D0mut:
Ya_r-|nbZ,'
6S')qz
ogp5L-
fb.Gua
$"`OZ=
$\"Aqy
mX~{?C
b(m6w+
qxo@V4
OQ#0jsf
d,2rSo
QPf0kC
HS0o/}
!4~6Zm
QGq~R@
1DB%)d9v
OB:;+x
FLOEJm
Wpf&GR
{Avc'&5
zG/M?\@
n&se`!
J|)wtp_
5?#_,Y
yl]3Yo
o]GM[5
\Hud(}fh
@h' Y\
Mqi+mj
kh2y)~
IyUxQK
xX6(5k2
;/*(QSO
4~G3{7
f;jt5NYM
$HUZ!zCc
}.=#Vi;
?e^!F9IL
fYQh@r
mkgwvK
5B.F0F
F%vgDL5|d
cC'xXm
L*pV-!
gE:C/e
KD:)il
HT_kF"X
yNqM'R
<,]bZE
VT:):W
97Lyu2
AQw|1R2
,XhE)_n
xYWA=_
fDvL;7
{y;\V+6&'
'}jjNG
HOrNwLV
EG%qGe
"OI22]
5"K7p|\s
JZ;jMCh
&PUb:
/N7c3}
5lMoJ
Y]DRmu
[|q5|ZK
r;3gts
zpz-ht
0j%Smg
)w}m)x
`iyH=`
.}hbu|
5.05X&
C9/XOB#Cq%
+B0h?n
+5JdE9
6UO|m~
$H9z2.i
sq,~M,
IoWpK,
-fgdVAjX
am8,1|"@k
^M#!mS#
R'#,GZ
6!wl<X
rmlA\`:
|&j OL
!vZ)(z
j6sy9
aDBc~{
4C8l#|
u2)#0{
lMkW~m
pT.mx_
>@ok>5
wy)k-~
zfYJ{O9
291IZN
L;8C=\
w`dBC8
#bvfEe
oQ(u\3(
"XbZbi,V*0
Iilb9y
25eRQJ
vNg5@*y
>]A>yp
VJZKc7S?9
QkteJY
2b.?[a
O58{?{.
&\Y>!j
PN':iJ
K]GYm,
03P9)X
;{TE3j(
n=O2Kn/
.$h~q3
Z^6L6c
EvimDGw}
mzMc9
Mst.Uj
y{gw=w|
8!%7RY
h-KE+
t*2`(D
L'6-n8
fJDAc"
h,xH,IU(iLR
MYllFw{
_@Rj/AiK
]f%}f=_
^q}cF0
Kde^H^4M
~YA6eP
y<y/?q
"8i&RZ
N2P>F[
"A|ky6
xNSM<M
dgX&|V
z8gn~jNI&
SDhkfP
[[6X`X
mrK`C0
@+UO1=
`P2x+m
XduqT6
n_H,[>
sU,G%ARp
(\defc
t8_n$KS
RM)=dJ
Q*MTYu
jJ>l}|
b7$bK%c(
em#Zj_
+:0V+"
J0%4=(
SA(z4lM
k}IYw/
Cn=*Faa
BgWrJk
>TMSk
sCxuwn
5=`BE0
43ckFL}
O3u`RD9%Ex
G"Lt&T
>G<Pq3
V}IN"p
'N1vPv
rlSk?Rxm,
hSJY=H
|MBS@k
3/a[/3
4y\KVy)
9O3-K4
{?5t0t
)x'*STA
pV( 9+
!d),v!\
[OI3QC
b.GG`r#C6%
;S)Rcv
vP-J2Z
z#vICeG
I&q*fX
td,`5A
/U+r[xCU
7,ri%MXA{
yLkD_4
Krj9i)c
Ej/w.y
$s<pyR
BX^OL+_
D2d0=A
2d'+uh
5788YP
2DNEV6
U}'t}hJ
f#L*Qi
[Xg@[
sw2|J/
5>gA:DO
ffLNkvw
LC!Kej
&OFx?~
=>H(1~C
%@v4$?Zs*p
)NY#Yi
/"d?nlql
=o,xi\Vm
Ai`\xm&>
/8|~H3
q$)G&2
oR?e;&
%:5?Y7
AtU}uAx
i[}i:H
r@^h!|y"
,3t0F
BNX,/S`
03*lZ4
"B j>k
r0fHRV
4>YfQf
X>uo\o
{Rh0Cr
;L$,wv)L$,
VkH^pk
03*EBb
cYy2o<
'fUfQf
q7xF&
KRMi<?s
7;FOR+
?-`cUj5
eJB--2
,ru=M8
+l6816!`
nG4oX`LD~
D j%Ll
jn=]<{
#Zf:en
!p2/o#
IY4hE}
/6w^?3M
nR%GX|
7ojb(b
KX%vh`
jI,-*)H
/os03*Ebu
1H.{'DY
K.hZ2o
*L?v[[)
7o[S9{
GetModuleHandleA
GetProcessHeap
HeapCreate
ntdll.dll
RtlAllocateHeap
LoadLibraryExA
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualProtect
GetTickCount
GetProcAddress
RtlFreeHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DbgBreakPoint
DbgUserBreakPoint
DbgUiRemoteBreakin
kernel32.dll
NtQueryInformationThread
NtSetInformationThread
user32.dll
advapi32.dll
hid.dll
iphlpapi.dll
VirtualAlloc
VirtualFree
SetThreadAffinityMask
GetCurrentThread
ExitProcess
GetSystemDefaultLangID
GetSystemTime
SystemTimeToFileTime
WriteFile
GlobalAlloc
GlobalLock
GlobalUnlock
GetCurrentThreadId
GetExitCodeThread
OpenThread
TerminateThread
SuspendThread
MultiByteToWideChar
WideCharToMultiByte
IsWow64Process
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CheckRemoteDebuggerPresent
CreateThread
ResumeThread
GetThreadContext
SetThreadContext
mscoree.dll
mscorwks.dll
mscorsvr.dll
KernelBase.dll
mscoreei.dll
clr.dll
diasymreader.dll
SECheckProtection
SEGetAppStatus
SESetAppStatus
SEGetLicenseUserInfoW
SEGetLicenseTrialInfo
SEGetNumExecUsed
SEGetNumExecLeft
SESetNumExecUsed
SEGetExecTimeUsed
SEGetExecTimeLeft
SESetExecTime
SEGetTotalExecTimeUsed
SEGetTotalExecTimeLeft
SESetTotalExecTime
SEGetNumDaysUsed
SEGetNumDaysLeft
SECheckHardwareID
SECheckExpDate
SECheckExecTime
SECheckTotalExecTime
SECheckCountryID
SEGetHardwareIDW
SECheckLicenseFileW
SEGetLicenseHash
SENotifyLicenseBanned
SEResetTrial
SEGetProtectionDate
SEAddMemoryGuard
SEDelMemoryGuard
CreateFileMappingW
MapViewOfFile
MapViewOfFileEx
UnmapViewOfFile
LoadLibraryExW
LoadLibraryA
=j&&LZ66lA??~
}{))R>
f""D~**T
V22dN::t
o%%Jr..\$
&&Lj66lZ??~A
99rKJJ
==zGdd
""Df**T~
;22dV::tN
$$Hl\\
C77nYmm
%%Jo..\r
>!KK
55j_WW
&Lj&6lZ6?~A?
~=zG=d
"Df"*T~*
2dV2:tN:
x%Jo%.\r.
t>!K
a5j_5W
ggV}++
Lj&&lZ66~A??
bS11*?
Xt,,4.
RRvM;;
MMfU33
PPxD<<%
Bc!! 0
~~zG==
Df""T~**;
dV22tN::
xxJo%%\r..8$
tt>!
pp|B>>q
aaj_55
UUPx((
cccc||||wwww{{{{
kkkkoooo
gggg++++
YYYYGGGG
&&&&6666????
nnnnZZZZ
RRRR;;;;
[[[[jjjj
9999JJJJLLLLXXXX
CCCCMMMM3333
PPPP<<<<
~~~~====dddd]]]]
ssss````
""""****
2222::::
$$$$\\\\
7777mmmm
llllVVVV
eeeezzzz
xxxx%%%%....
ttttKKKK
pppp>>>>
ffffHHHH
aaaa5555WWWW
UUUU((((
BBBBhhhhAAAA
='9-6d
_jbF~T
11#?*0
,4$8_@
t\lHBW
QPeA~S
>4$8,@
p\lHtW
+HpXhE
T[$:.6
00006666
CCCCDDDD
TTTT{{{{
####====
ffff((((
vvvv[[[[
IIIImmmm
%%%%rrrr
]]]]eeee
llllppppHHHHPPPP
FFFFWWWW
kkkk::::
AAAAOOOOgggg
tttt""""
nnnnGGGG
VVVV>>>>KKKK
yyyy
YYYY''''
____````QQQQ
;;;;MMMM
ccccUUUU!!!!
6bad allocation
_except_handler3
MSVCRT.dll
GetInterfaceInfo
IPHLPAPI.DLL
??3@YAXPAX@Z
strncpy
wcsrchr
??2@YAPAXI@Z
strncat
_wcsicmp
_wcsnicmp
__dllonexit
_onexit
_initterm
malloc
_adjust_fdiv
GetMappedFileNameW
PSAPI.DLL
DeviceIoControl
DeleteCriticalSection
GetModuleFileNameW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetModuleHandleExA
LoadLibraryExW
MapViewOfFileEx
GetLogicalDriveStringsW
QueryDosDeviceW
KERNEL32.dll
wsprintfW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MessageBoxW
FindWindowA
GetDesktopWindow
GetClassNameA
GetWindow
USER32.dll
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
ADVAPI32.dll
SHGetFolderPathW
SHELL32.dll
t$<PfR
Eqpsjf
<fHu9f
d/6!`f
strncpy
malloc
_onexit
MSVCRT.dll
wcsrchr
MSVCRT.dll
_except_handler3
_initterm
strncat
IPHLPAPI.DLL
GetInterfaceInfo
??2@YAPAXI@Z
MSVCRT.dll
!`X-;l
??3@YAXPAX@Z
_wcsicmp
MSVCRT.dll
_wcsnicmp
_initterm
MSVCRT.dll
__dllonexit
MSVCRT.dll
MSVCRT.dll
_adjust_fdiv
MSVCRT.dll
MSVCRT.dll
MSVCRT.dll
MSVCRT.dll
MSVCRT.dll
??2@YAPAXI@Z
MSVCRT.dll
PSAPI.DLL
MSVCRT.dll
MSVCRT.dll
MSVCRT.dll
MSVCRT.dll
__dllonexit
MSVCRT.dll
GetMappedFileNameW
PSAPI.DLL
GetMappedFileNameW
GetLogicalDriveStringsW
KERNEL32.dll
QueryDosDeviceW
KERNEL32.dll
MSVCRT.dll
_wcsnicmp
KERNEL32.dll
GetModuleFileNameW
KERNEL32.dll
UnmapViewOfFile
USER32.dll
GetWindow
USER32.dll
strncat
GetClassNameA
MSVCRT.dll
wcsrchr
]=|bt\
USER32.dll
wsprintfW
OpenClipboard
EmptyClipboard
USER32.dll
USER32.dll
SetClipboardData
CloseClipboard
USER32.dll
*03*Ea
KERNEL32.dll
MapViewOfFileEx
crm|OY
MapViewOfFile
KERNEL32.dll
CreateFileMappingW
KERNEL32.dll
USER32.dll
!103*E
MessageBoxW
USER32.dll
KERNEL32.dll
DeleteCriticalSection
KERNEL32.dll
GetModuleHandleExA
MSVCRT.dll
MSVCRT.dll
KERNEL32.dll
LoadLibraryExW
RegDeleteKeyA
ADVAPI32.dll
strncpy
RegSetValueExA
RegCreateKeyExA
ADVAPI32.dll
ADVAPI32.dll
ADVAPI32.dll
RegCloseKey
_wcsicmp
ADVAPI32.dll
RegQueryValueExA
qpsX-B
ADVAPI32.dll
RegOpenKeyExA
KERNEL32.dll
wsprintfW
DeviceIoControl
MSVCRT.dll
USER32.dll
USER32.dll
MessageBoxW
SHELL32.dll
SHGetFolderPathW
MSVCRT.dll
USER32.dll
GetDesktopWindow
FindWindowA
USER32.dll
USER32.dll
FindWindowA
USER32.dll
FindWindowA
5m|u!`
USER32.dll
FindWindowA
Qr@a#w
V*U1{6]}
4'Ni=N
5<4o0|O
Kl:M_Q
$fJt_f
Hp/q-R
IVfPfIv"
bfKrMf
4$`CfI
103*Ef
<@q%p#
TI|A}?u
1e+4&]
~rByXM
;8|il6
*{6h3r
ds>r2$9
03*EE;
U_;[v$>
^;rm|O
fHf@UX
i3o~103*
R%(fL^
n]p? /
3W9P]S
N33o)j
*T33oO
F(-;0[x
d$,j?f
qpsjSf
iI2o$!`
0~Ei%)
103*?G
w GfPf
n^KPo\
O5JiV8
2-~+ePJ
XuvkD2h
0p`ZH[
vN](6%
OZi%E
'YYP)i
j&]y g
trm|O*
oiQ3+xt
S?9wOT
M;G`,l
AX!$O%
W!\jr`
N6i54^
)"e>8P
@aC.zT
7osag
y1kXwdt
Nn[SEn
2_z(1$
Y'1$Nq
Nx0K$d
50W@8r
sc4\m3[&EX
.9~$%x
qps%W5x
+$9eD]
?W!dj=\
;lA>|9L
+6yZH(;[
.\7&bR
/$gIo+t
Hc(R/G
3omMJ%(
UR,kbdl
G8Wj]Yu
">@8r6
B]~aRG
Szy\oG
@B5@#TL
Cb6.er
z-(C2>
]B<p?b
{Fb=f<X
7_WFb;
/?7zCo
`Ebq`h^WB
xw((4Hb*
FG@bK4
-ngdaxS
"g\GP@b
5V]>Q)lv<
*bj&10
s8u,Fl
}8um[=
cG<4ul
c}8u3!j+
,[ :uC
@@hMXN
k#Y2un
E3uLm[h
7uPZF!
4uk*~*o
3uJZn+
aL63u'
N3u"^`I
$#vK6uQQ/f
n2uqPL
8_ 3jSv
)%YJ_^`
D0o^ c
#)KeSQ
]qpsj#
|Urhfl
P'0:OW{
{l{s(l
JWpZVd
9]n4T}Fc
r}FlJO
Y7SQI}Fr
|F"^`
GJ}Ft;
#w}FK3
qK'1J}FB
qpsjW+
rm|+7O
H/f%XW
,R5w&*
VTpGMI
C!CsTC
ECrii{
q6eD(0Q
_y+UO>
BqSJfV
_p9clZ
KZ~E!9
"KWmLz"
vh"QJk
q.SvO|
;jGr]A
NVK2(T
wT*|bIT
{KzIfXLx<
k,(|P'
DVr*@"
v|}k#F
:fItb4$
'Y:VqQ'
E<`cR9%
-l\y9+
v+hzbk
-ue0Y7
'f;9*d.
1FUg"
I6g18]
je^qvs
xoOI?p]
c-O82]
<grm&\
'/42u^
lpq%6z
!r_Iq0
UwBA`$
, ~$4(
M<wOT6o
bRM<%>
TL@C}
u6/!)7
;N=` YP
FOp %NY
;y4QOZ
e~[F)X
@afH%W"
03*Eka
-oR2-<
/6!`fQ
fKfIu[
x)fCfU
FffHMJem
P103*E
NnQN@]
h8)-PV
=5$WP_
x5}}zG
WPi3*E
Xb>`s(
"eoM0R
KrT^_p
kZ9F@5
nHe71;x
_GN%4~
C"oxuy
Cg::e3
,`nRqy
u{p&P'~
Q*[\y~
8pP qf
R;H%il
ye@G,,
%,FW;;
KX(nvu
)%4A;5
7O5TG
6DH+X`
rbP9Dg
phAb/<
GlQt]%
QC79X~
H)iYzX
zWANP&
8@H^>Z
AhV$=f
+r2SzV
bD8+{~
R&w%|`
}yJ7_L
.9pYQN
6){Q[77
h+X^>2
E}3Dd1
V`<\w!
EpsjfU
Wp]/k(
n@;Mh>C
/6!`dg
t}8j5UI
Hr>POr
@4$3tu
~CC !w
Re} dt
Cm|OhW
YG]Uu,?1
z!`>)[N
^IQ+oD
@+_.K+o
?KrWq)l
MJyRd\Yk
-FhTnp
'h24-:
rm|O%b^
(]03*f
x&*KfCfK
+fCfK6
B"7bR%
9zDF?#Z
h-8}Z6
T$DfUf
HIR1L9
[K^L6F
8X]grU
qpsj+l
bwN,3]
7P{hj^
<k3%|=
!@!F%T
:``%0U
m>1hQI
n};^Y=
Evu|+A
Z~ot.?
\2I\O##
aK,okZJ]K
zX;B0
4NA103
D7k$$9
Au2C*o
4'Nxg^1
NmN;YW
O~mj$%
Gaz3*E
*o,2-<
O^+l68
Ff-i w
%\E=#^
>|3L4S8~^
!udWmXw?
10]fQf
%h"\='
UUM+Y`
^_.S|;
(rm|OR
#n7Du
0Scf103*
_O'c^%9
+>4Rh_M
vTOS"B
w^;XPU
d$ 9t8
u1qpsj
HdbmPZ
)oU2-<
<IO<6t
't`AI`
W\s|\\
&]a)o@
;dw,g?
%i*58
@&":=f
D86/anqiq5
!rJ0o\
STvJuQ
Gqpsjt
ht@)o/m|O
&Qvxhg
)h-fo
F+]e+-
>/)o6r
3w0o-5
J=fu59
#EH:q4
<Ao0o+
20oo'7
df+Zzl
?_Q[]Y
frm|hFSj
0ow03*E?
/6!`0x]
yjHM(?
`hIFj
ya/oCKm
G0oj*:4
)Hh2,j
"]=E2z:'
4|f[@9*?te`
LizRD1'c
nyXhT!j
_~Mmr^
r6!`h:
QEEJ.C
mN<Dd+
\P/zCr
=""e-g
(oFy41
y[}`>,
//:qZRO/3
rjL#R@0
O7}(o:
Bh@[v[[
\&oNie
56.erg
5<9j['
EQagkL
NfM,i<
W/>Y@!F8
j jHIm-g
[5C+okj
Y`-(o#
2-<%gB
^yqpsj
103*EC
ju}j}%i
@.p1t$
'DCFo%
5$po<dd
Zzg3
hSB^kRq
(H'0Aa
AARr_W
{{g=EdI
46!Slk
0o[psj
X,W3}F
uJp@q>
Gtrm|O
qw. |:
4'yOY5Rm!
'6>.^`
_V17~,
Sw;FKV
c9C<W
/N/T4y
atL9k^
103*J<
>zX.zr:N
Dg/o.6p
c&s.Fk
KX(n+)
R9)Qr4
:8_h}(
DgEWr"
=]O<x|
rm|OZ>
KQwova
MP+50W@8
Itdj!:#
8yCE>h
ehH_j
d`7!/`
$'ou$W
4$}:|"hf
5T5ZP2
;D6=#|O
1/o|<L>
WoDFV>
e=LgN/
W6/gilhw
@;ds3-
t6!`h>
W+V2|.
mYG/o{3m-
?6AhN!
pBB'_@K
gjMXkCSbKC
3&xNX.Sn
.qpsj0
yi&o>DO
N"M)s8g
&o.6pS
4^P-~n
*rm|Oh
&ol,fp
FfSK=F
ovv>gVP
PHJ^Jj}
-Lspsj
b&f4'N
RS#+(:/^K
Yc?\w+=
)}@L_7{
`h2xq
kS\t(K
/:8_ha
/J>7_7#HB
t>fF^,
Z\!Ppbl
&oz:tW=S
{Rsa^m{
W!,S4$
quXdwO
'{BA--
6/z)C,
u!/6!`
d$DPj`
2!O$Ja
M]k#8R
H@oWn2
aD@[^
//rWfSP:
m9&oXJ
H.N]:2
PDh,^bT
{mlZJZE
Afv9&c
fPXKL7
103#Rn
r~4~&6F(0@
)}iCgN
#{os6|TXrk
D#[/gV
2q_OLW
aiy%|p
i1)5W"
I73u?D
5$Wh'yq
"[+?6V
U103*?
m)r!k8"
qps%7O
RQ0kz1
%o,3*E
cqpsjI
nP13V^
WbPbk)}E=Q
=(0{*s
b6s=8o7
XLp4'j
4DH`\tX
p @xL2
RZzAul?h
5](iOI
\T8Yhn
_Sy1m%
2iQ@<`
2j9?n;
003*E7
|flLDr
F++e=)
b>AS2h
@;f9hn
93ybSp|,
QmzEL#/
s{8tfL
})!Ay1K
06(J^JjI
q{WW24
V.63E#
u%],2?
"];%@l
1.NS?1
arm|hrfi
6T%u}:v
4'h~^i
tE'_S`
7zG; m
Y*`V4o
"fpF-ojr@
],krm|O
h6/G_
'5^/6!`R$
<VyaqO
^h;-obj
103huHl
.oEEUY
"0ugEl_$h
.o`X:
.;?l|T
H03*E9
U_;Xs8~{
X"]5n,
GS3Ub/
FQ^+|n
/5!AF2$
thJ(3i
7IQZp;B
a*2IPe
6x\+e]Z~
@`c~7,
#LtNHh
7o.Hr4
W8-O/k
)wp,[
u03*l#m
8+}S]9'"
BE(4G
3U8o<2
kwP$o2T
eW[M3
-oyqW0
_bd$g%
qpsj|7u
qqv7Se
wFn]E@
Yyf^6;
@?yd <
,qGQ-Je
103*EFD
/1rm|O- =
Zjb^\W
IcB6!SF
RzzHcZ
d(-ck=
CA<3d O
\sJ1HN
oia\Q#
FmUA]j
u0W?+K
k103*kxG
~bdZ$0
dDRG2
fHx2I*2
0CwZ1Z
z\VXoXP
r*=d{e
$;')8%
Y1;,>
=77)ow7
sU4S88|
D%9<1k
qps>=c
dv%ozG-B)p
LnA/fJ
_,:XbE
bZ0SX
.]5`3_
jxSWuA8
yo`=-p&
:HL`ko
JDmx>\
#P(B^<C
BNB+oc
\>s+"0
w*p\2!
:rhR!!
,m3R#1*?
J~DO%Y/!
G%UOam<
D}o~uC
P?JSo.
#6SF}UJ
TpGKWBFZ
kX72Hiv
ccC _7
y{e.YEe
Cm.HMQ
s*F\)?p
-SC`OR6
5"r~f9
>;Y>-
>stq`C
t$"l9W
wmPon
qx9^6+
bt)X0o
#IWbus
T~5dry
zp&lg~
7y{MX
2C63 Z/'KO
5>],JM
5%_>+W
8]7^{0
gFzvL&A
V{ujk=
m\l<AS8
V,;)IW
l0`R}8n-?T
Pe$6XN
e:CHCk
T6OX"4
\_hQ82m
cvp]O9
f%f{p
Gm+XNV)
\/Ml9K
>1ixED3
|Hd#\q
;dGRtG4
8I#cP}b
.xe)y"t=
k&vE%7X
4Oz278
2De-Xf
STx}_~?E
Hvb\;\u
)Ng?s[2
=uo6h`D
*\;c[Y
ur0Qei
?z!9W]I
bdRk\WN]
JI;za*
>I9]sfuT
E^TNBg
jFPtDG
H,_]EB
k}pma?-
=+nS`5
_hFRD!$
YslKQd
%9{M8sx\
TZr=TM
3I"g>
<FDT/M
u\,IsT
S>832'
jdTEZV{
x>)Mj`@
7deeE;Aa(
f&+{KM
,3wD49
7#fB3SeM
+OK_?N
d+rr8Nq``
5>|WIt
]+}'Ia
^y2f{=
Y&#CF>U
|-=&-PL
E5D&Q[^&"*
\!~TFB!
/psw@4t
k%G&=
Gc.o5s
$r8800
{>`,CKB
O{vhv9B
g]YGkA
Ae@q]o
y3'iw).|DC
Agsq;N
~]I;v0,
`56=Ew
6eo"*F
X2(&U7
)E4hYjw
GP5r8jj
hNhJPU
g%XY!V
d:2k@"O
PQxd|R
U&NUt|
$?f!f\
jf]Z+q
n|J)zn($
9Eq<~X^4]$,lZ
jFV]v
:{3`i9
QN~kVW
/FE5Go
f;9]Rf
8%j5{C]+
;JS/HA
; 90RC
"R4ef&
>/;~0Q
:yB[6~
-BPm1[
3{Fgv
6"o(Xe
=\{u4z
urXF06
ph'rvQ
El]z`Li
P\%DbR
6FL" '
De+F`-
FfWcb+
*MM(s8
T LLOt
@H~6I~t
Aowiq8
m(COp{:
6:8Pa9BJ}4
I*gY-W$
w0Ua[2
i{ZMqrOvTx
9hVhdXY
/_FtDQ
66aqM+
IaA.mpKE
W,{4I
<a/XbD
7%2jr)
o8=(FH
QX{<AR'W
T0snPA
n&LMI"
Kf9b6G
"Fv879,
mB.Dw?"
#|yJ?U@
I<=9jo
wk%(J^s
PPdRNF
1 u )@+s
4ABgkP";
lCl}>y
)i{%SJ
Z`&|lz
5B?I"_q-
5i2R`u
?3`XP
qZX/23
uV'1;n
: 7( l
Y@2ZW-
^KU_2=
3p =v$
ac<slr
}+<Vg"
I& k?89
nrUbQE~a
e~;0J&
b<a/$U(
;NpJ _
#I=[;>EG
Qnx{][
_~~RaI]
FIJQ!V
V]W k^
<J+Jn>
yhfdWt
yJkRw.
RRDG$dJ
OefK@|C
7]Enn9
!r,T)m0
Ai,*[-YlJ
$vcdzT
#;eF:
'0+/a2
X?%12l
DWC1MG
UM.;@BChx
eu4g+U
d@&08KW%
a`^:EQ=S
f+TSY^Y
6GetACP
HeapSize
HeapFree
?MulDiv
GetFileType
KERNEL32.dll
PatBlt
GetStdHandle
DPtoLP
GSetHandleCount
#GetVersionExA
-GetOEMCP
HeapDestroy
TlsAlloc
IsBadWritePtr
XLCMapStringA
IsChild
LCMapStringW
gLPtoDP
IsBadCodePtr
GetStringTypeA
eGetStringTypeW
ESetStdHandle
GetMenu
RtlUnwind
CompareStringA
NSaveDC
Escape
DBitBlt
7CompareStringW
6SetRect
GetCPInfo
GTerminateProcess
GetTickCount
:LocalAlloc
GetProfileStringA
GetCommandLineA
lstrcatA
MLockFile
GetFileTime
GetStartupInfoA
?ReadFile
RaiseException
lstrcmpA
GetFileSize
TlsGetValue
GetFileAttributesA
4LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
SizeofResource
lstrcpyA
GetVersion
lstrcpynA
GlobalAddAtomA
GetProcessVersion
FindClose
FindFirstFileA
SetEndOfFile
GlobalGetAtomNameA
XGlobalFindAtomA
lstrlenA
/GetThreadLocale
GetFullPathNameA
"UnlockFile
*FlushFileBuffers
4GlobalAlloc
CopyRect
SetFilePointer
TGetCurrentProcess
DuplicateHandle
GetEnvironmentStrings
kGetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
FileTimeToSystemTime
FreeEnvironmentStringsA
GetEnvironmentStringsW
GetTimeZoneInformation
EnterCriticalSection
GetEnvironmentVariableA
FileTimeToLocalFileTime
SetEnvironmentVariableA
WritePrivateProfileStringA
DeleteCriticalSection
LeaveCriticalSection
GlobalDeleteAtom
cGetModuleFileNameA
lstrcmpiA
GetCurrentThread
GetVolumeInformationA
GlobalFree
LocalFree
GetCurrentThreadId
LoadResource
GlobalLock
FindResourceA
FormatMessageA
GlobalUnlock
LockResource
WideCharToMultiByte
InitializeCriticalSection
InterlockedIncrement
WinHelpA
InterlockedDecrement
SetLastError
SetPropA
GetModuleHandleA
IsBadReadPtr
GetPropA
ExitProcess
VirtualAlloc
HeapReAlloc
HeapAlloc
VirtualFree
FreeLibrary
GetProcAddress
tLoadLibraryA
GetFocus
@P.|aR
CloseHandle
GetWindow
WriteFile
PostThreadMessageA
USER32.dll
GetTopWindow
x[MultiByteToWideChar
GetCapture
GetSubMenu
RegisterClipboardFormatA
GetClassInfoA
HeapCreate
GetDlgCtrlID
IsWindow
GetWindowTextA
CreateWindowExA
GetWindowTextLengthA
UnhookWindowsHookEx
GetClassLongA
OffsetRect
GetMenuItemID
CallWindowProcA
RemovePropA
GetMenuItemCount
GetMessageTime
DefWindowProcA
GetForegroundWindow
GetMessagePos
SetForegroundWindow
SetWindowLongA
RegisterClassA
SetWindowPos
EndPaint
MapDialogRect
CharUpperA
}LGetWindowRect
SetWindowContextHelpId
&GetWindowPlacement
InvalidateRect
wsprintfA
GetMenuState
FillRect
SystemParametersInfoA
SetMenuItemBitmaps
GetNextDlgGroupItem
ModifyMenuA
GetMessageA
SetCursor
EnableMenuItem
eIntersectRect
DispatchMessageA
TranslateMessage
CallNextHookEx
GetKeyState
IsWindowVisible
/6!`ValidateRect
PeekMessageA
GetCursorPos
5$WRegisterWindowMessageA
MessageBoxA
EndDialog
GetLastActivePopup
PostMessageA
SetWindowsHookExA
DestroyWindow
(KSetActiveWindow
GetWindowLongA
GetParent
IsWindowEnabled
GetDlgItem
SendMessageA
HideCaret
ShowCaret
CreateDialogIndirectParamA
ExcludeUpdateRgn
DefDlgProcA
GetActiveWindow
CopyAcceleratorTableA
BeginPaint
LoadIconA
ClientToScreen
GetWindowDC
ScreenToClient
IsWindowUnicode
LoadBitmapA
DrawTextA
ReleaseDC
IsIconic
DrawFocusRect
InflateRect
MessageBeep
TabbedTextOutA
GetMenuCheckMarkDimensions
CGrayStringA
EnableWindow
DrawIcon
GetSysColor
GetClientRect
DGetSystemMetrics
UpdateWindow
AppendMenuA
CharNextA
GetSystemMenu
LoadCursorA
PtInRect
GetSysColorBrush
GetClassNameA
GetDesktopWindow
SetFocus
GetNextDlgTabItem
LoadStringA
GDI32.dll
DestroyMenu
ShowWindow
PostQuitMessage
IsDialogMessageA
CheckMenuItem
SetWindowTextA
MapWindowPoints
SendDlgItemMessageA
AdjustWindowRectEx
MoveWindow
SetViewportOrgEx
;SetMapMode
OffsetViewportOrgEx
SetWindowOrgEx
CreateFileA
IntersectClipRect
SetBkMode
RestoreDC
GetClipBox
GetDeviceCaps
GetTextColor
ScaleWindowExtEx
GetViewportExtEx
SetWindowExtEx
GetBkColor
GetMapMode
GetWindowExtEx
SelectObject
DeleteDC
GetStockObject
CreateBitmap
StretchBlt
ovSetBkColor
TextOutA
RectVisible
aExtTextOutA
udScaleViewportExtEx
CreateCompatibleDC
CreateCompatibleBitmap
SetTextColor
hPtVisible
CreateDIBitmap
"DeleteObject
CreateFontIndirectA
GetTextExtentPointA
comdlg32.dll
GetOpenFileNameA
1GetObjectA
GetSaveFileNameA
GetFileTitleA
WINSPOOL.DRV
CreateSolidBrush
DocumentPropertiesA
ClosePrinter
ADVAPI32.dll
OpenPrinterA
RegCreateKeyExA
RegCloseKey
SHGetMalloc
ole32.dll
SHELL32.dll
7RegSetValueExA
SHBrowseForFolderA
SHGetDesktopFolder
RegOpenKeyExA
COMCTL32.dll
JSHGetPathFromIDListA
oledlg.dll
OleUninitialize
.9SetViewportExtEx
CoTaskMemFree
|{RCoTaskMemAlloc
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
CLSIDFromProgID
>CLSIDFromString
CoRevokeClassObject
CoRegisterMessageFilter
bCoGetClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleInitialize
MSVCRT.dll
StgOpenStorageOnILockBytes
OLEAUT32.dll
OLEPRO32.DLL
IPHLPAPI.DLL
PSAPI.DLL
pStgCreateDocfileOnILockBytes
Safengine Shielden v2.4.0.0
GetProcessHeap
KERNEL32.dll
USER32.dll
GDI32.dll
comdlg32.dll
WINSPOOL.DRV
ADVAPI32.dll
SHELL32.dll
COMCTL32.dll
oledlg.dll
ole32.dll
OLEPRO32.DLL
OLEAUT32.dll
MSVCRT.dll
IPHLPAPI.DLL
PSAPI.DLL
HeapSize
RegisterClipboardFormatA
SetMapMode
GetOpenFileNameA
OpenPrinterA
RegCloseKey
SHGetMalloc
CoFreeUnusedLibraries
strncpy
GetInterfaceInfo
GetMappedFileNameW
HrCg@b
VS_VERSION_INFO
StringFileInfo
080404b0
Comments
CompanyName
(Future Studio)
FileDescription
FileVersion
1, 0, 0, 1
InternalName
FileSplt
LegalCopyright
(C) 2001
(Future Studio)
LegalTrademarks
OriginalFilename
FileSplt.EXE
PrivateBuild
ProductName
ProductVersion
1, 0, 0, 1
SpecialBuild
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Hacktool.Win32.Generic.lC41
Elastic malicious (high confidence)
MicroWorld-eScan Clean
ClamAV Clean
CMC Clean
ALYac Clean
Malwarebytes Malware.Heuristic.1003
K7AntiVirus Trojan ( 005239691 )
K7GW Adware ( 005693e61 )
CrowdStrike win/malicious_confidence_100% (W)
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Packed.NoobyProtect.M suspicious
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Alibaba Backdoor:Win32/Lotok.39f2ce56
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Tencent Win32.Backdoor.Lotok.Zylw
F-Secure Clean
Trapmine malicious.high.ml.score
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
Webroot W32.Adware.Gen
Avira HEUR/AGEN.1237427
MAX malware (ai score=80)
Antiy-AVL GrayWare/Win32.Safeguard.a
Gridinsoft Trojan.Heur!.03010021
Arcabit Clean
ViRobot Clean
Google Detected
AhnLab-V3 Trojan/Win.Leonem.C5391929
Acronis Clean
VBA32 Clean
TACHYON Clean
Cylance unsafe
Zoner Clean
TrendMicro-HouseCall TROJ_FRS.VSNTC723
Rising Trojan.Generic@AI.98 (RDML:YjwgqFFQVg8gtBl8vEIXtw)
Ikarus PUA.NoobyProtect
Fortinet Clean
No IRMA results available.