Static | ZeroBOX

PE Compile Time

2016-07-25 09:55:57

PE Imphash

e2a592076b17ef8bfb48b7e03965a3fc

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000637b 0x00006400 6.48463588503
.rdata 0x00008000 0x000014b0 0x00001600 5.033673391
.data 0x0000a000 0x0002afd8 0x00000600 4.03955137722
.ndata 0x00035000 0x00029000 0x00000000 0.0
.rsrc 0x0005e000 0x000449d0 0x00044a00 6.80071033991

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000a1f20 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_DIALOG 0x000a25a8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x000a25a8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x000a25a8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x000a2608 0x00000084 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000a2690 0x0000033d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x408074 GetFileAttributesW
0x408078 GetFullPathNameW
0x40807c Sleep
0x408080 GetTickCount
0x408084 GetFileSize
0x408088 GetModuleFileNameW
0x40808c MoveFileW
0x408090 SetFileAttributesW
0x408094 GetCurrentProcess
0x408098 ExitProcess
0x4080a4 GetTempPathW
0x4080a8 GetCommandLineW
0x4080ac GetVersion
0x4080b0 SetErrorMode
0x4080b4 lstrlenW
0x4080b8 WaitForSingleObject
0x4080bc CopyFileW
0x4080c0 CompareFileTime
0x4080c4 GlobalLock
0x4080c8 CreateThread
0x4080cc GetLastError
0x4080d0 CreateDirectoryW
0x4080d4 CreateProcessW
0x4080d8 RemoveDirectoryW
0x4080dc lstrcmpiA
0x4080e0 CreateFileW
0x4080e4 GetTempFileNameW
0x4080e8 WriteFile
0x4080ec lstrcpyA
0x4080f0 lstrcpyW
0x4080f4 MoveFileExW
0x4080f8 lstrcatW
0x4080fc GetSystemDirectoryW
0x408100 GetProcAddress
0x408104 GetModuleHandleA
0x408108 GlobalFree
0x40810c GlobalAlloc
0x408110 GetShortPathNameW
0x408114 SearchPathW
0x408118 lstrcmpiW
0x40811c SetFileTime
0x408120 CloseHandle
0x408128 lstrcmpW
0x40812c GlobalUnlock
0x408130 lstrcpynW
0x408134 GetDiskFreeSpaceW
0x408138 GetExitCodeProcess
0x40813c FindFirstFileW
0x408140 FindNextFileW
0x408144 DeleteFileW
0x408148 SetFilePointer
0x40814c ReadFile
0x408150 FindClose
0x408154 MulDiv
0x408158 MultiByteToWideChar
0x40815c lstrlenA
0x408160 WideCharToMultiByte
0x40816c FreeLibrary
0x408170 LoadLibraryExW
0x408174 GetModuleHandleW
Library USER32.dll:
0x408198 GetSystemMenu
0x40819c SetClassLongW
0x4081a0 IsWindowEnabled
0x4081a4 EnableMenuItem
0x4081a8 SetWindowPos
0x4081ac GetSysColor
0x4081b0 GetWindowLongW
0x4081b4 SetCursor
0x4081b8 LoadCursorW
0x4081bc CheckDlgButton
0x4081c0 GetMessagePos
0x4081c4 LoadBitmapW
0x4081c8 CallWindowProcW
0x4081cc IsWindowVisible
0x4081d0 CloseClipboard
0x4081d4 SetClipboardData
0x4081d8 EmptyClipboard
0x4081dc OpenClipboard
0x4081e0 wsprintfW
0x4081e4 ScreenToClient
0x4081e8 GetWindowRect
0x4081ec GetSystemMetrics
0x4081f0 SetDlgItemTextW
0x4081f4 GetDlgItemTextW
0x4081f8 MessageBoxIndirectW
0x4081fc CharPrevW
0x408200 CharNextA
0x408204 wsprintfA
0x408208 DispatchMessageW
0x40820c PeekMessageW
0x408210 GetDC
0x408214 ReleaseDC
0x408218 EnableWindow
0x40821c InvalidateRect
0x408220 SendMessageW
0x408224 DefWindowProcW
0x408228 BeginPaint
0x40822c GetClientRect
0x408230 FillRect
0x408234 EndDialog
0x408238 RegisterClassW
0x408240 CreateWindowExW
0x408244 GetClassInfoW
0x408248 DialogBoxParamW
0x40824c CharNextW
0x408250 ExitWindowsEx
0x408254 DestroyWindow
0x408258 LoadImageW
0x40825c SetTimer
0x408260 SetWindowTextW
0x408264 PostQuitMessage
0x408268 ShowWindow
0x40826c GetDlgItem
0x408270 IsWindow
0x408274 SetWindowLongW
0x408278 FindWindowExW
0x40827c TrackPopupMenu
0x408280 AppendMenuW
0x408284 CreatePopupMenu
0x408288 DrawTextW
0x40828c EndPaint
0x408290 CreateDialogParamW
0x408294 SendMessageTimeoutW
0x408298 SetForegroundWindow
Library GDI32.dll:
0x40804c SelectObject
0x408050 SetBkMode
0x408054 CreateFontIndirectW
0x408058 SetTextColor
0x40805c DeleteObject
0x408060 GetDeviceCaps
0x408064 CreateBrushIndirect
0x408068 SetBkColor
Library SHELL32.dll:
0x408184 SHBrowseForFolderW
0x408188 SHGetFileInfoW
0x40818c ShellExecuteW
0x408190 SHFileOperationW
Library ADVAPI32.dll:
0x408000 RegDeleteKeyW
0x408004 SetFileSecurityW
0x408008 OpenProcessToken
0x408014 RegOpenKeyExW
0x408018 RegEnumValueW
0x40801c RegDeleteValueW
0x408020 RegCloseKey
0x408024 RegCreateKeyExW
0x408028 RegSetValueExW
0x40802c RegQueryValueExW
0x408030 RegEnumKeyW
Library COMCTL32.dll:
0x408038 ImageList_AddMasked
0x40803c None
0x408040 ImageList_Destroy
0x408044 ImageList_Create
Library ole32.dll:
0x4082a0 OleUninitialize
0x4082a4 OleInitialize
0x4082a8 CoTaskMemFree
0x4082ac CoCreateInstance

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
SQSSSPW
Instu`
softuW
NulluN
SVWj _3
Aj"A[f
D$ Ph0
D$$SPS
Vj%SSS
D$$+D$
D$,+D$$P
u49-lOC
\u f9O
90u'AAf
HtVHtHH
UXTHEME
USERENV
SETUPAPI
APPHELP
PROPSYS
DWMAPI
CRYPTBASE
OLEACC
CLBCATQ
RichEd32
RichEd20
MulDiv
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
ReadFile
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
SetFileAttributesW
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
KERNEL32.dll
EndPaint
DrawTextW
FillRect
GetClientRect
BeginPaint
DefWindowProcW
SendMessageW
InvalidateRect
EnableWindow
ReleaseDC
LoadImageW
SetWindowLongW
GetDlgItem
IsWindow
FindWindowExW
SendMessageTimeoutW
wsprintfW
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextW
SetTimer
CreateDialogParamW
DestroyWindow
ExitWindowsEx
CharNextW
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHELL32.dll
RegEnumValueW
RegEnumKeyW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
SetFileSecurityW
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VERSION
SHGetFolderPathW
SHFOLDER
SHAutoComplete
SHLWAPI
SHELL32
InitiateShutdownW
RegDeleteKeyExW
ADVAPI32
GetUserDefaultUILanguage
GetDiskFreeSpaceExW
SetDefaultDllDirectories
KERNEL32
[Rename]
%ls=%ls
d7 mCU
}f_&nr(e@
~ EO=9O
AVSt5%+KU@t
I-$H[<
1P7SL5
Y$rJEg@jrJD
CV'K*;):
sF.^'w
UO1vN;
aDms(1
18t5!%W
8zzkhGB
)J(t5/\
H9!DE&
hUQO.08
6JTd"BMq}
zMv=I@#k
aYD0bXPM/
H21zL3%y_
;'3AD@W
v]B#\"EI
HcAj$#
v;{(MP
!.WhSq
J!s$oz
$h._f
]uWWuU
_%jJCC
RAVC*o
D1eb_`M
%FOWi]
=B5M$]#v<
IDAT)\8G
-bW&5w
~B,@U%D$
(<w.)u
yT[EQR
VZ )2j
;5|Ybx
tJc9d]ev
n 3 r"
1x}}H/
<k:NH|
:!v6Ezt
T_/v>G
eTl@;_
(6xC6m
] @Xhi
iY$qBa
f+3Ba{
>rV.K
:Zkt7D
"nu!Rhia
7fPqLn
B7;$Z#
9s;86Bk
Bj3:H@n
'&U:6s
SSh!(
6f BJ,/E
sez?r/
:!XYD8
)Z7fM\\
=E%[2^
$=<@{e
:/?1F}EP
wPQHsi
aw0nO{
,,2[Jq
1~"Ibt
jdJXpi
x=yz=
kt[a:!
goPOgX
Irr3Bx
}x=Y*g
8~@eaQE
"<iS}W
w?"l5(o
Ds+01L
qHmqc"
dwmCz>B+
a4Z8V#
vb"!(hEo.G
RiSp4D
4`gMRH6
0WXg`0
4*!=c}
D74\!C>B
B3Tp\
2bZ3tD
&F]'BS
g_%u^7z:3
hi]B4b
S,U)v6
IDATR=
3>4037
g~7NP!
<dr2K+
vKG$Hv
bU<l'd~s
1"BPv\
BjRIVt/@-V
,^ZL/_
*F:%U{
D psy&w
e{,@7t<
M4^r!]
T*EF7^
!1a3<E
P\{*G*
:2()xy
.{C7$D
ecjuf^}}
LCl0V>
O<C!Rxg
mYXHf9F
!,NaT1
a9i,;I]K
::0AH0|
C8;Mu`
dO\MqO\
uld]aeS
t\t>S[^
Z!loFJh;
.Nk+1%_
e}lX{"hE
L/YH0>
3/q]K3B)l
?=Aj~N&MT*ce3s
LIl_21;
Ar^7H(
IDAT,"-
ATAZ6FI
I&pS9*
ft-@`S
@FX.c%
!%*RXB
]}5cO>M~
2ZS:x8
=ct-ibtd
Bz|EMGx
F%]p%n
I}d,6&
w|ZO_/
p%#o%]
$$2pH!0V"
To/6+h
41A<6Myb
),%%H[=~
(@:G|d
p?*RXS`
4=J6<@
T{0s+I9
W(ML3x
E$YJ|d
,,S4}$
/"u@ka
<GtQw+
c-;o_DVJ~
*I,$qQ0
vJ5w4;
BPou0EA|
DV+~=f<C
k"+}D
H%1YJi|
,.o1XX
Dn=G]J/
*v/]"YXf
haSM<=I
4NJvRK
2=5Jq,
"3>Moe
F\O1cRJ
{}`GLq
+RPAj-Ua
I^mK~Eg
Er;wP>|
g8qtg.
H1O8X@
Z]6Bp2Y<
_&75Jq
D}|;`
H#H4t-
:j#ppK
lTo+m$j
C&Jpz!
"X\JqS
S'HjUt
RKevr"u
5[2wb/
t"mPR
\H7_[cyN
f*t*MT
pGJX""
~XX_{Z'1
Ll(V/zQ
Afc#V;
.*bWae
2QZcZ&Vl
4f1Oaf
3P#\[C
!;6Bov
W_#34L
#75Bnz
l#gA
C+l-%V
]ZFG1v
WRY/aCnr
G%\[K
(CO=Nvf7Bj
_X$?9F
^'X['l
"j%850
,YkTd3
gwj\Q*
(>Dnl0
8v>Con
]XM7H-'
&iw pI
mh2CUL
7q!5LY{
cv|#dw})bv|)`u{)ew|)fx})bu{)^sy)au{)bu|)at{)at{(`tz(\v~
>Ms!]m|)v
DS|(`p|/
)6X>IZ|Q{
8M~PM\~Uy
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>
NullsoftInst
hbL4QH|D
21maZ>
cqv)H~;
h{"2j|S2
GIOdc5
Nl59N|
y{/+M
mUVAb79
"_>mZb
anv1w\%
9z\/uRc
@Iju?}o
-5jDV(SW%
O*?Vc)j
vM+-GsA%
JGH>42
~n2UAW
;9tL8H
'Z`Y3A
6[tU\v
Bcd2.[:
oX|x*
b)A|aH
M3kG3{t
2d`^K]
~&HKu0:{
~BtHhZp
Ts9]MB2m
aeX!xc
8^=*wI
"_QCQk
)?d4@bx
?EBoo/A
GSSa{+F`
g)Fl:i
<f}2Bt
vbA>Kv
A~][+K
?;VYvH
&.=]S4
)[HN7]_
mzb j\
SBg[O0\5
F,@Zhw,;h
Lfb7xo
_g9pOh
Yu$`&+j*
do9.q(
l^mVx='
6er)5^
OrI#;
[[O`}+
?6~q3Dg
F]0x\kp
}d<N%
K5W,)l
D1]TF>
}fJ89J
Is3x=
saN85k
I };s4$
`jj{ZC
o`F8%M
^%ceu2
?Nyex@
#UNK|[+5E
\bcrh?F
1Rz-T*4
jdE5d';l
|KD$|p#
\jb<(9
<pJBpu6
:V:oa
RpM[mx~
Y4,y~]F?<H
iGq2[/p3
"IE.i.
/ -_w
Bd\e \
@S@/zq[
MFF!:0
95|e0wx
8v_7Ql
Z4sd;N
bsWa~G]
/3@eNy]
^T3[|d
vz7Q~OS
A9:Qb
iz>F?L
PJ|jy|
/AIo9\'d
Zf$B tH
=c;`ylw
zmo!G}
M#woQ_
;} "[+
<xj!tM
)SiMzM
n[D6pB
5`Z"1|
cM$PXn
kaVKERvH
HKXM?I
pd@.;
*=vIfAs
&G]9Vc
U^m|R]\
VnyBKSi
,A=VtywM
-[4F@1
UB3\c!
8-g<Eyo
A;wn<E~
Wp J+-4
EZRDF-
_=Qw79j]
Cb[|38^
I+W@)x
2T1nZ0
|#wYb]Z
|/27vm
.#pe<t
C{?,?tx?
"sXf5A
nAk(fq
XG_{YE
k+zBo(Lf#r=5
C-E}ae
d jE7`
o`Hh<H1
K@Qrk_
**?Ya@
wBqg$,[
?o_Two
7NPVC(
><g>u1
A^4m=!XMBSK
"}[4Ly
*\.~3K
yz&TY|
,2'M"J
gdKjOZ/c?
W@"Jsp*
02jX'9UR
3zED=g
R{j98E|
Lz^DTGe
`d,,[<
oVrj"r
;ZxtaY
J?FNr
lxQ0;z
xap{6n
R:n`k?
gfarGf&
3<99'J
;GMplKD
^4f]Y=
#r n$u
rSrfx%
s5G YJ
u1}^.7
e.C[ "
b?CDgqe
?yHF:
9>4~Mq
nCin-6^
gNeIlq
F<$don:
>o7OLt
.w@z37|JV
zkt.C{V
'iER*2
9Bhkt%
z(LT[U
Ft&>x:
7@{7+"
7\Fj3e
vMr|S<6
zyr][bOe
/`m}y_F
Hs6`];W;XG}
2$m7n\
MRt8CS
![CTcf(
d8oK_K
p^!li
4`vM[_
-cUma+a
qy--|YL
a4nwJC
SpO)|zY
b-.gA~
,{cwn/
B{`sR1.
wxov4c
]'&x/*lA
O@,iz.
3*Com@
UTwX{^
t^W%#h7
}2U( L
M2XJLX
;~cf+it
[9`x6T
9e[AHt]
nNe51FU.:
SQq_9olz,
E ?1k6
1Sud+oGl
yB(qCC;
yQxQIsl
whY,~{
auOQ-[
]po-LCv
v2"_wV-
8jgS{BT
h@\6rfP
kr /1l
;Mf9alYqW
$%RP]-
647K}}E
7C24k%
^+$Oe"]
y#%$q\_
8CFD(D
>X#q4r,5
?FzqQ%
S+wY>
(Ap,Q"
Rc(O'R
Auu5@s
4iGFFF
Tav7d[
1`AB7$
` +{=."
}`S7@D
J.-C%p|
]vbQd]
]Qy2N4z
,ywlK}
Z&OiK0
*gx=}~
tWy0`!\
u(diLU
h"r^G
@1.<r~
I/8moo
o=@7rs
z|5k_%
?2{)1wnB
1o8/g-
V}C@nB
/FFqkO
b``9i?
/N:"S;S
n5/}rz
pm/onS
(#RltN@
Mh4C@a
d="au#!
>/'74I
V|s5](
9AD\3=
Mvp4K]>
jFf4v
0ME{d{
&cF{uiZ
:8C;7O
lWjw,J
Pz,2bV
lN{.pt!3\
35-N4lk
O:L4N{Q
QPAyrHP
21<~CO
0i\|tv
;#0r^r
C+vjec
IVT-`HE
j-ek=
8|>}V5
NJ5! @t
RoW!A>%
<<dU;F
UNT2-`
6($ s h
@9BsYw[u
I J4-eio
5J^tJz;($
_B1]Gp
z=kwVO
@Xmz0Y
?N9QD@
.q!TZh
5i%_^U
pUx5R;&[#
G?/;[:
4R@UtX
`8:O.1
LCy?BQK
b@TO;'
qx`a5UK-]
[94$0O
VA~do1O
iI]v|QO
>c^`D!
VRc_6=yY
tG}Bmw#
V#k1B=
!CjWZ}g
C#QT/"
!<m,qZ
=y`(D"
j4\|\i
sADW.
#i}=J{D'
]?m@F*
:8*jDc
*'e)uK!
a=5Ja]l
&7MS(2
&^zTR!
]}VZw-%
I&}0_q
SS=63s@
aSHk\tb
D=^(rm
}Un<}cw
;0K7}3
KH21Q
3om62[U$
/@i+[q
d4Zy\e
LPw,F
oFN,uo
WaxjnK
GkrJ"#t
Fe;Sif9M?
]zS0UVn
iv|nM*
ZX8Mg
I--FJ6
JU6! ,
xh+r9u1
RichEdit
RichEdit20W
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
#+3;CScs
verifying installer: %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
... %d%%
SeShutdownPrivilege
NSIS Error
Error writing temporary file. Make sure your temp folder is valid.
%u.%u%s%s
*?|<>/":
%s%S.dll
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
tehtris Clean
DrWeb Clean
MicroWorld-eScan Clean
FireEye Generic.mg.5e6ffe8f38644e73
CAT-QuickHeal Clean
ALYac Clean
Cylance Clean
VIPRE Clean
Sangfor Trojan.Win32.Agent.Vxqn
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike win/malicious_confidence_70% (D)
Arcabit Clean
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Tencent Clean
TACHYON Clean
Sophos Clean
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Trojan.Win32.GULOADER.YXDF1Z
McAfee-GW-Edition BehavesLike.Win32.GuLoader.hc
Trapmine Clean
CMC Clean
Emsisoft Clean
Ikarus Trojan.NSIS.Agent
Jiangmin Clean
Webroot W32.Malware.Gen
Avira Clean
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Microsoft Trojan:Win32/Casdet!rfn
ViRobot Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Clean
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!5E6FFE8F3864
MAX Clean
DeepInstinct MALICIOUS
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.GULOADER.YXDF1Z
Rising Trojan.Injector/NSIS!1.E690 (CLASSIC)
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
AVG FileRepMalware [Misc]
Cybereason malicious.9c90e7
Avast FileRepMalware [Misc]
No IRMA results available.