Static | ZeroBOX

PE Compile Time

2009-07-14 08:56:05

PDB Path

cleanmgr.pdb

PE Imphash

b5bfd9f5c740d22e228bf934c6651a65

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00007d78 0x00007e00 6.13699639371
.data 0x00009000 0x00000748 0x00000200 0.433980398467
.pdata 0x0000a000 0x00000318 0x00000400 3.61222573976
.rsrc 0x0000b000 0x0002c000 0x0002be00 6.51250833393
.reloc 0x00037000 0x000000cc 0x00000200 0.444210256431

Resources

Name Offset Size Language Sub-language File type
MUI 0x0000b7c8 0x000000e0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x00036234 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x000367e0 0x000000ae LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x000367e0 0x000000ae LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x000367e0 0x000000ae LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x00036890 0x000003b4 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library ADVAPI32.dll:
0x100001000 RegOpenKeyExW
0x100001008 RegEnumKeyW
0x100001010 RegCloseKey
0x100001018 RegQueryValueExW
0x100001020 RegSetValueExW
Library KERNEL32.dll:
0x1000010a0 Sleep
0x1000010a8 SetEvent
0x1000010b0 GetDriveTypeW
0x1000010b8 FormatMessageW
0x1000010c0 GetWindowsDirectoryW
0x1000010c8 CreateThread
0x1000010d0 GetDiskFreeSpaceW
0x1000010d8 GetVolumeInformationW
0x1000010e0 FreeLibrary
0x1000010e8 LoadLibraryExW
0x1000010f0 GetProcessHeap
0x1000010f8 HeapFree
0x100001100 lstrlenW
0x100001108 GetTickCount
0x100001110 CheckElevationEnabled
0x100001118 GetModuleFileNameW
0x100001120 GetLastError
0x100001128 LocalFree
0x100001130 HeapSetInformation
0x100001138 CreateEventW
0x100001140 CloseHandle
0x100001148 WaitForSingleObject
0x100001150 GetDiskFreeSpaceExW
0x100001158 GetCommandLineW
0x100001160 SetErrorMode
0x100001168 GetStartupInfoA
0x100001170 GetModuleHandleW
0x100001178 MulDiv
0x100001180 WideCharToMultiByte
0x100001188 LocalAlloc
0x100001190 RtlCaptureContext
0x100001198 RtlLookupFunctionEntry
0x1000011a0 RtlVirtualUnwind
0x1000011a8 UnhandledExceptionFilter
0x1000011b0 GetCurrentProcess
0x1000011b8 TerminateProcess
0x1000011c0 GetSystemTimeAsFileTime
0x1000011c8 GetCurrentProcessId
0x1000011d0 GetCurrentThreadId
0x1000011d8 QueryPerformanceCounter
0x1000011e8 HeapAlloc
Library GDI32.dll:
0x100001068 GetLayout
0x100001070 ExtTextOutW
0x100001078 SetBkMode
0x100001080 SetTextColor
0x100001088 SetBkColor
0x100001090 GetTextExtentPoint32W
Library USER32.dll:
0x100001298 MessageBoxW
0x1000012a0 ShowWindow
0x1000012a8 SetFocus
0x1000012b0 SendMessageW
0x1000012b8 GetDlgItem
0x1000012c0 EndDialog
0x1000012c8 DialogBoxParamW
0x1000012d0 DestroyWindow
0x1000012d8 CreateDialogParamW
0x1000012e0 IsDialogMessageW
0x1000012e8 LoadStringW
0x1000012f0 LoadIconW
0x1000012f8 GetWindowLongPtrW
0x100001300 EnableWindow
0x100001308 GetWindowLongW
0x100001310 GetSystemMetrics
0x100001318 SetWindowLongPtrW
0x100001320 GetClientRect
0x100001328 SetDlgItemTextW
0x100001330 EnumWindows
0x100001338 DispatchMessageW
0x100001340 TranslateMessage
0x100001348 PeekMessageW
0x100001350 GetSysColor
0x100001358 SetForegroundWindow
0x100001360 GetWindowTextW
0x100001368 DrawFocusRect
0x100001370 DestroyIcon
0x100001378 DrawIconEx
0x100001380 GetParent
0x100001388 PostMessageW
0x100001390 SendDlgItemMessageW
Library msvcrt.dll:
0x1000013b8 __set_app_type
0x1000013c0 _fmode
0x1000013c8 _commode
0x1000013d0 ?terminate@@YAXXZ
0x1000013d8 memset
0x1000013e0 __setusermatherr
0x1000013e8 _amsg_exit
0x1000013f0 _initterm
0x1000013f8 exit
0x100001400 _cexit
0x100001408 _exit
0x100001410 _XcptFilter
0x100001418 __C_specific_handler
0x100001420 __getmainargs
0x100001428 _vsnwprintf
0x100001430 toupper
0x100001438 _wcsicmp
Library ntdll.dll:
0x100001448 NtOpenProcessToken
0x100001450 NtClose
0x100001458 NtOpenThreadToken
0x100001460 RtlNtStatusToDosError
0x100001468 WinSqmAddToStream
0x100001470 NtQueryInformationToken
Library ole32.dll:
0x100001480 CoTaskMemAlloc
0x100001488 CoInitialize
0x100001490 CoUninitialize
0x100001498 CLSIDFromString
0x1000014a0 CoTaskMemFree
0x1000014a8 CoCreateInstance
0x1000014b0 CoInitializeEx
Library SHLWAPI.dll:
0x100001248 StrStrIW
0x100001250 StrToIntW
0x100001258 StrCmpW
0x100001260 StrCmpNW
0x100001268 PathStripToRootW
0x100001270 None
0x100001278 StrFormatByteSizeW
0x100001280 None
0x100001288 SHDeleteKeyW
Library SHELL32.dll:
0x100001220 ShellExecuteExW
0x100001228 SHGetFileInfoW
0x100001230 ExtractIconExW
0x100001238 None
Library VSSAPI.DLL:

!This program cannot be run in DOS mode.
`.data
.pdata
@.rsrc
@.reloc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
msvcrt.dll
ole32.dll
OLEAUT32.dll
SHLWAPI.dll
COMCTL32.dll
SHELL32.dll
VSSAPI.DLL
cleanmgr.pdb
@SUVWATH
NfD9 t>f
NfD9 t>f
NfD9 t>f
0A\_^][
f93tuf
f9l$ t
f9l$ t
f9l$ t
f9l$ t
UVWATAUAVAW
uF9|$0t@H
A_A^A]A\_^]
L$ SUVWH
H#D$HH
l$htgH
t$ WATAUH
t$ WATAUAVAWH
A_A^A]A\_
UVWATAUH
PA]A\_^]
s WATAUAVAWH
D9\$@D
A_A^A]A\_
WATAUAVAWH
A_A^A]A\_
AUWVSH
x[^_A]
LoadLibraryA
msvcrt
wininet
memcpy
VirtualAlloc
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
HTTPREAD
LAVAUWVSH
[^_A]A^
t,f9;t'
UVWATAUH
L$(+D$TH
A]A\_^]
t$ WATAUAVAWH
A_A^A]A\_
UVWATAVH
@A^A\_^]
LcA<E3
u*9Q<|%
RegOpenKeyExW
RegEnumKeyW
RegCloseKey
RegQueryValueExW
RegSetValueExW
ADVAPI32.dll
HeapAlloc
GetProcessHeap
HeapFree
lstrlenW
GetTickCount
CheckElevationEnabled
GetModuleFileNameW
GetLastError
LocalFree
HeapSetInformation
CreateEventW
CloseHandle
WaitForSingleObject
GetDiskFreeSpaceExW
GetCommandLineW
SetErrorMode
GetStartupInfoA
GetModuleHandleW
MulDiv
WideCharToMultiByte
LocalAlloc
GetVolumeNameForVolumeMountPointW
LoadLibraryExW
FreeLibrary
GetVolumeInformationW
GetDiskFreeSpaceW
CreateThread
SetEvent
GetDriveTypeW
FormatMessageW
GetWindowsDirectoryW
KERNEL32.dll
GetTextExtentPoint32W
SetBkColor
SetTextColor
SetBkMode
GDI32.dll
GetWindowTextW
SetForegroundWindow
PeekMessageW
TranslateMessage
DispatchMessageW
EnumWindows
LoadStringW
MessageBoxW
ShowWindow
SendMessageW
GetDlgItem
SetWindowLongPtrW
SendDlgItemMessageW
PostMessageW
GetParent
SetDlgItemTextW
GetClientRect
GetSystemMetrics
GetWindowLongW
EnableWindow
GetWindowLongPtrW
LoadIconW
DestroyIcon
IsDialogMessageW
CreateDialogParamW
DestroyWindow
DialogBoxParamW
EndDialog
SetFocus
GetSysColor
DrawIconEx
DrawFocusRect
USER32.dll
toupper
_vsnwprintf
_wcsicmp
__getmainargs
__C_specific_handler
_XcptFilter
_cexit
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
msvcrt.dll
?terminate@@YAXXZ
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlNtStatusToDosError
WinSqmAddToStream
ntdll.dll
CoCreateInstance
CoTaskMemAlloc
CoInitialize
CoUninitialize
CLSIDFromString
CoTaskMemFree
ole32.dll
OLEAUT32.dll
StrStrIW
StrToIntW
StrCmpW
StrCmpNW
StrFormatByteSizeW
SHDeleteKeyW
PathStripToRootW
SHLWAPI.dll
CreatePropertySheetPageW
PropertySheetW
ImageList_Create
ImageList_ReplaceIcon
COMCTL32.dll
ShellExecuteExW
ExtractIconExW
SHGetFileInfoW
SHELL32.dll
CreateVssBackupComponentsInternal
VssFreeSnapshotPropertiesInternal
VSSAPI.DLL
ExtTextOutW
GetLayout
memset
NtOpenThreadToken
NtClose
NtOpenProcessToken
NtQueryInformationToken
CoInitializeEx
http://us.imgjeoigaa.com/sts/imagc.jpg
xxxxwp
xxxxxx
xxxs3;;;;3xx
3;;;;;;;7
ws33;;;;;;;;3xxwp
{;;;;;;;33;;wwp
;;;;;33333;
;;;33333333
;3333333333
33333333777
333333ssssww
33333377777wwp
33333sssswwwp
77777wwwp
xxxpwwx
sss330
3ss333330
3333337www
3337wwww
wwwwwwpp
wwwwwwp
333333
B@<8GF:8
A?VWSjiiggffE#
A+*;HMM^ihrr
qnn53E@
YNQRS^mhqss
}zIIIV
fosqssss
u^NLZ$(FK
rq]PJJRj{
cbgONJL^vx{{
[LLT^jlv
wv^P1"!!
{l]52200-"!!!
7654220/J`
sp$31FECEB
4%*19IL_e_RK))6y
MMMMMQIG99U
d@A7,.;VZ\^'
;1;TTS.&
c[[HWY,.?
A<@E<@
A@L`dbT
vsd`E@]]L@@
vdNLLQbqq]J@<:
qdhbTQQNZbba]Q]bqhQA@:
]bhzzuhmqttnVJ=A]qbNL
%+55/!
*---)'(#
8704XY2W
$&&&&&&&&
$&&&&&&&&
$&&&&&&&&
#"())***)("#
~km())))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))y
{&Zi*AB
/0r}L(
J,~^,x$
](M1Yb
,oq4\`:
Po-oyA
3[)zAX
-e.~.n
i79O,N
eszeZN-
jT]E.|
IvG`Zd
2MT&1L
M:k6:S
l4$Oc*
6I4F:6q<
L&OhR*_X#A
9al!d@
HY<s@L
6'N688
gNGuee
BoGyQJ
^W7fq\S8
{sjczE
Z-6.E,-
cE%dqF
iJo8BJ
VA2K;Y I
=J7HY_Y
XY^fqa
>R2!K2
e6y?E0-
=FVF9*G
(%I%i&!
DY9hkTX
IBo0$I
>[e)iZLV
]_^)mU
<- WAS
t3O%@e
A5+M`1E
C`VQ+
5fgaqi
>9ad65V
s5vvvXZZ
URRJ.\
"KKK||
"'},$,
J_];l&
|Kf>;?
V)&~n"
uKf>[?
T+5]4"';
VVVYY^
h4ix5Zs
?nooosk
tYIP:hI
AE7Cm/,
OT:hL*
tNO/oy
eyQv#
Hn&']-
J%loo/_
mlll```
lmmauu
^JT4$&
@QT@ba@
Pxf~~>
k~~~q~~
gfgff^\
+++X^^F
fw:"2mx
wPZ-a}}
;;Mlnn
UUU6RRR8SSS-WWW
>>>2hbd
VVV*YZY
GGG;edc
@?@b^^^#WWW
YYY)YYY
NMMGwtt
CBCf]]]'WWW
ZZZ,ZZZ
DDDj^^^,WWW
[[[=XXX
HHHt\\\2WWW
888m[[[$
UST\Z\KPPPGTST
PQQ/ljjm|wx|
EEE_XXX
NNNfYYY
XXX'ZZZ
KKKjVVV
wwwwwwp
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,(''''''''''$'$'$'$'$'$$$$$$$,
,((''''''''(''''''''''(((''$$,
,((''''''''''$($'$'$'$'$'$'$$,
,(((('''''''((('''''''''''''$,
,,$,$((''''''''''$'$'$'$'$'$',
,',$((((('''''''((('''''''''$,
,'','(((((''''''''''$'$'$'$'$,
,,$'(((((((''''''''(('''''''$,
,',',$,$,$((''''''''''$'$'$($,
,(((',$,$((((''''''''(('''''$,
,,',$''','((((''''''''''$'$($,
,','(,'''(,$(((''''''''(((''$,
,,$(((,',$',$(((('''''''''''',
,',',''(',$(,$,$((('''''''''',
,,$,',',$(,$(,$(((((('''''''',
,(,'(','(((,$','((((('''''''',
,,'(,'',(,'(,$',$,$(((''''''',
,,',','',$,'(,'',$,'((((('''',
,,','(,'',','(((''',$,$(((''',
,,',',','''',',',''',$(((((($,
,,',','(,(,$,$,$(,'(','((((,$,
,,(,',',',',',','','(',$,$('(,
,,(,',',','(,$,$,'','(',$,'((,
,,,',',',','(,'((,$,',$('',$(,
,,',',',',','(,(,',$,'(,''',$,
,,,',(,',',','(,'(',','(,''',,
,,',,',(,',',,'(,(,$,$,'','($,
,,,',,',',',$,,'(,'(',$(''(($,
,,',',,',(,',',',',(,',,,,,,$,
,,,',',,',(,',',',',',
,,',,',',,',(,',','(,,
,,,',,',',,',',',','(,
,,,(,',,',',,',(,',,',
,,,,',',,',',,',',',',
,,',,,,',,',',,',(,'',
,,,,',,(,',,',',,',$$(
,,,,,,,,,,,,,,,,,,,''
$ "
nl}ec1
UEDlB$
^{-VWWq
}_F\*,
@`[OM-Y
u,--aii
D2O'U'
@%i*P~]>V
\*,/%&
4fffv<
j"PF]Xt
F<=(N>I
S'1N6<
hm@V(8
xxxxwp
xxxxxx
xxxs3;;;;3xx
3;;;;;;;7
ws33;;;;;;;;3xxwp
{;;;;;;;33;;wwp
;;;;;33333;
;;;33333333
;3333333333
33333333777
333333ssssww
33333377777wwp
33333sssswwwp
77777wwwp
xxxpwwx
sss330
3ss333330
3333337www
3337wwww
wwwwwwpp
wwwwwwp
333333
B@<8GF:8
A?VWSjiiggffE#
A+*;HMM^ihrr
qnn53E@
YNQRS^mhqss
}zIIIV
fosqssss
u^NLZ$(FK
rq]PJJRj{
cbgONJL^vx{{
[LLT^jlv
wv^P1"!!
{l]52200-"!!!
7654220/J`
sp$31FECEB
4%*19IL_e_RK))6y
MMMMMQIG99U
d@A7,.;VZ\^'
;1;TTS.&
c[[HWY,.?
A<@E<@
A@L`dbT
vsd`E@]]L@@
vdNLLQbqq]J@<:
qdhbTQQNZbba]Q]bqhQA@:
]bhzzuhmqttnVJ=A]qbNL
%+55/!
*---)'(#
8704XY2W
$&&&&&&&&
$&&&&&&&&
$&&&&&&&&
#"())***)("#
~km())))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))y
{&Zi*AB
/0r}L(
J,~^,x$
](M1Yb
,oq4\`:
Po-oyA
3[)zAX
-e.~.n
i79O,N
eszeZN-
jT]E.|
IvG`Zd
2MT&1L
M:k6:S
l4$Oc*
6I4F:6q<
L&OhR*_X#A
9al!d@
HY<s@L
6'N688
gNGuee
BoGyQJ
^W7fq\S8
{sjczE
Z-6.E,-
cE%dqF
iJo8BJ
VA2K;Y I
=J7HY_Y
XY^fqa
>R2!K2
e6y?E0-
=FVF9*G
(%I%i&!
DY9hkTX
IBo0$I
>[e)iZLV
]_^)mU
<- WAS
t3O%@e
A5+M`1E
C`VQ+
5fgaqi
>9ad65V
s5vvvXZZ
URRJ.\
"KKK||
"'},$,
J_];l&
|Kf>;?
V)&~n"
uKf>[?
T+5]4"';
VVVYY^
h4ix5Zs
?nooosk
tYIP:hI
AE7Cm/,
OT:hL*
tNO/oy
eyQv#
Hn&']-
J%loo/_
mlll```
lmmauu
^JT4$&
@QT@ba@
Pxf~~>
k~~~q~~
gfgff^\
+++X^^F
fw:"2mx
wPZ-a}}
;;Mlnn
UUU6RRR8SSS-WWW
>>>2hbd
VVV*YZY
GGG;edc
@?@b^^^#WWW
YYY)YYY
NMMGwtt
CBCf]]]'WWW
ZZZ,ZZZ
DDDj^^^,WWW
[[[=XXX
HHHt\\\2WWW
888m[[[$
UST\Z\KPPPGTST
PQQ/ljjm|wx|
EEE_XXX
NNNfYYY
XXX'ZZZ
KKKjVVV
SAGESET
SAGERUN
TUNEUP
VERYLOWDISK
LOWDISK
/USAGE
Local\Cleanmgr: Instance event
cleanmgr [/SAGESET:n | /SAGERUN:n | TUNEUP:n | /LOWDISK | /VERYLOWDISK | /SETUP]
NoRemovePage
Uninstall
<A HREF="">%s</A>
(null)
mshelp://windows/?id=1264bc24-72a8-48aa-84e3-a355327139d9
DISK_CLEANUP_HELP_BUTTON
srclient.dll
Microsoft.ProgramsAndFeatures
Software\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches
PropertyBag
display
Description
AdvancedButtonText
Priority
StateFlags
%s%04d
IconPath
CLSID\%s\DefaultIcon
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Disk Space Cleanup Manager for Windows
FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)
InternalName
CLEANMGR
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
CLEANMGR.DLL
ProductName
Microsoft
Windows
Operating System
ProductVersion
6.1.7600.16385
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic Clean
MicroWorld-eScan Trojan.GenericKD.67172011
FireEye Clean
CAT-QuickHeal Clean
McAfee Artemis!B44B3FD2F45D
Malwarebytes Clean
VIPRE Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Cyren Clean
Symantec Trojan.Gen.2
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky Trojan-Downloader.Win32.Agent.xyatyd
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Downloader.Agent!8.B23 (CLOUD)
Sophos Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
Trapmine Clean
CMC Clean
Emsisoft Clean
SentinelOne Clean
GData Clean
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira Clean
MAX Clean
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Trojan-Downloader.Win32.Agent.xyatyd
Microsoft Trojan:Win32/Casdet!rfn
Cynet Clean
AhnLab-V3 Clean
Acronis Clean
BitDefenderTheta Clean
ALYac Clean
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Clean
MaxSecure Clean
Fortinet Clean
AVG Clean
Avast Clean
CrowdStrike Clean
No IRMA results available.