Static | ZeroBOX

PE Compile Time

2012-07-14 07:47:16

PDB Path

                                                                                                        

PE Imphash

bf5a4aa99e5b160f8521cadd6bfe73b8

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00019718 0x00019800 6.74857390054
.rdata 0x0001b000 0x00006db4 0x00006e00 6.44295624763
.data 0x00022000 0x000030c0 0x00001600 3.2625868398
.rsrc 0x00026000 0x0005ca64 0x0005cc00 7.99831073591

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000261b4 0x0000325c LANG_NEUTRAL SUBLANG_NEUTRAL PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_RCDATA 0x000824d8 0x00000020 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_RCDATA 0x000824d8 0x00000020 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x000824f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0008250c 0x0000036c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00082878 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x41b000 RaiseException
0x41b004 GetLastError
0x41b008 MultiByteToWideChar
0x41b00c lstrlenA
0x41b014 GetProcAddress
0x41b018 LoadLibraryA
0x41b01c FreeResource
0x41b020 SizeofResource
0x41b024 LockResource
0x41b028 LoadResource
0x41b02c FindResourceA
0x41b030 GetModuleHandleA
0x41b034 Module32Next
0x41b038 CloseHandle
0x41b03c Module32First
0x41b044 GetCurrentProcessId
0x41b048 SetEndOfFile
0x41b04c GetStringTypeW
0x41b050 GetStringTypeA
0x41b054 LCMapStringW
0x41b058 LCMapStringA
0x41b05c GetLocaleInfoA
0x41b060 HeapFree
0x41b064 GetProcessHeap
0x41b068 HeapAlloc
0x41b06c GetCommandLineA
0x41b070 HeapCreate
0x41b074 VirtualFree
0x41b084 VirtualAlloc
0x41b088 HeapReAlloc
0x41b08c HeapSize
0x41b090 TerminateProcess
0x41b094 GetCurrentProcess
0x41b0a0 IsDebuggerPresent
0x41b0a4 GetModuleHandleW
0x41b0a8 Sleep
0x41b0ac ExitProcess
0x41b0b0 WriteFile
0x41b0b4 GetStdHandle
0x41b0b8 GetModuleFileNameA
0x41b0bc WideCharToMultiByte
0x41b0c0 GetConsoleCP
0x41b0c4 GetConsoleMode
0x41b0c8 ReadFile
0x41b0cc TlsGetValue
0x41b0d0 TlsAlloc
0x41b0d4 TlsSetValue
0x41b0d8 TlsFree
0x41b0e0 SetLastError
0x41b0e4 GetCurrentThreadId
0x41b0e8 FlushFileBuffers
0x41b0ec SetFilePointer
0x41b0f0 SetHandleCount
0x41b0f4 GetFileType
0x41b0f8 GetStartupInfoA
0x41b0fc RtlUnwind
0x41b114 GetTickCount
0x41b120 GetCPInfo
0x41b124 GetACP
0x41b128 GetOEMCP
0x41b12c IsValidCodePage
0x41b130 CompareStringA
0x41b134 CompareStringW
0x41b13c WriteConsoleA
0x41b140 GetConsoleOutputCP
0x41b144 WriteConsoleW
0x41b148 SetStdHandle
0x41b14c CreateFileA
Library ole32.dll:
0x41b17c OleInitialize
Library OLEAUT32.dll:
0x41b154 SafeArrayCreate
0x41b158 SafeArrayAccessData
0x41b160 SafeArrayDestroy
0x41b168 VariantClear
0x41b16c VariantInit
0x41b170 SysFreeString
0x41b174 SysAllocString

!This program cannot be run in DOS mode.
~2#{~-q
~Rich,q
`.rdata
@.data
D$<RSP
L$PQSV
D$HUWP
FD)np)nl
Vlf+Vp
Vlf+Vd
tr9_ tm9_$th
O(9O$u
t*9Qlu%
)Nd)Vh
FL9~Xu
~\wu(j
CP_^][
T$h9T$
t:<wuE
t.9Vlt)
)Vd)Nh
^(9^$u
D$$)G@
w<9G,s
T$<PQR
D$Tt*;
;l$TsY)l$T
L$4;D$Ts<)D$T
p<O#|$
~(9~$u
O@;H s
O@;H(s
T$$QUR
D$ )D$
Oh;O\sN
Gh9Ghr
L$(9ODv
L$(+L$
D$(+D$
D$0^][_
N(Uh0%
t$H;t$8
|$ WSPV
@PAQBR
8VVVVV
uL9=\9B
0SSSSS
0WWWWW
HHtXHHt
>If90t
j@j ^V
0SSSSS
<at9<rt,<wt
URPQQh
>=Yt1j
_VVVVV
^WWWWW
0SSSSS
0A@@Ju
^SSSSS
j"^SSSSS
tGHt.Ht&
^SSSSS
8VVVVV
;t$,v-
UQPXY]Y[
0SSSSS
_VVVVV
t"SS9]
v$;540B
PPPPPPPP
PPPPPPPP
t+WWVPV
<+t(<-t$:
+t HHt
Delete
NoRemove
ForceRemove
Qkkbal
[-&LMb#{'
w+OQvr
INSKyu
)\ZEo^m/
H*0"ZOW
mj>zjZ
IiGM>nw
ewh/?y
OZw3(?
V_:X1:
bad allocation
Visual C++ CRT: Not enough memory to complete call to strerror.
Unknown exception
CorExitProcess
runtime error
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
Illegal byte sequence
Directory not empty
Function not implemented
No locks available
Filename too long
Resource deadlock avoided
Result too large
Domain error
Broken pipe
Too many links
Read-only file system
Invalid seek
No space left on device
File too large
Inappropriate I/O control operation
Too many open files
Too many open files in system
Invalid argument
Is a directory
Not a directory
No such device
Improper link
File exists
Resource device
Unknown error
Bad address
Permission denied
Not enough space
Resource temporarily unavailable
No child processes
Bad file descriptor
Exec format error
Arg list too long
No such device or address
Input/output error
Interrupted function call
No such process
No such file or directory
Operation not permitted
No error
UTF-16LE
UNICODE
GAIsProcessorFeaturePresent
KERNEL32
Complete Object Locator'
Class Hierarchy Descriptor'
Base Class Array'
Base Class Descriptor at (
Type Descriptor'
`local static thread guard'
`managed vector copy constructor iterator'
`vector vbase copy constructor iterator'
`vector copy constructor iterator'
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector vbase copy constructor iterator'
`eh vector copy constructor iterator'
`managed vector destructor iterator'
`managed vector constructor iterator'
`placement delete[] closure'
`placement delete closure'
`omni callsig'
delete[]
new[]
`local vftable constructor closure'
`local vftable'
`udt returning'
`copy constructor closure'
`eh vector vbase constructor iterator'
`eh vector destructor iterator'
`eh vector constructor iterator'
`virtual displacement map'
`vector vbase constructor iterator'
`vector destructor iterator'
`vector constructor iterator'
`scalar deleting destructor'
`default constructor closure'
`vector deleting destructor'
`vbase destructor'
`string'
`local static guard'
`typeof'
`vcall'
`vbtable'
`vftable'
operator
delete
__unaligned
__restrict
__ptr64
__clrcall
__fastcall
__thiscall
__stdcall
__pascal
__cdecl
__based(
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
CONOUT$
1#QNAN
1#SNAN
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
`h`hhh
xppwpp
RaiseException
GetLastError
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetProcAddress
LoadLibraryA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
Module32Next
CloseHandle
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
KERNEL32.dll
OleInitialize
ole32.dll
OLEAUT32.dll
HeapFree
GetProcessHeap
HeapAlloc
GetCommandLineA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
ReadFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
FlushFileBuffers
SetFilePointer
SetHandleCount
GetFileType
GetStartupInfoA
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CompareStringA
CompareStringW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
.?AV_com_error@@
.?AVtype_info@@
.?AVbad_alloc@std@@
.?AVexception@std@@
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
yoj 4A
D#w@kr9PE
hIE-1
$A'`]A;
JE`#%J
/KQp}Y
!D XM.
I>%~Q94
f?%dE>b
"0?b1D
yJ|sT'
$~m0K0=
#F@xB.D
kv@s6&nY
B3!9UfV
)5nMXP
smvZez
eAk?ig
,pM Le
KKo#;lEcP
^,,l!b!p
}/Vmz(Z
P1"/jif
: oJ"$
WXck6E
w7.l?V
sFi~mhg
gSZAS=
8WVit6
$C,ALd
rb;rZ+
j/G6he2&
"RTMF=
)=z'6`mY
\_\x{A`
_/ecQD
mx"^tJ
zN{Jbl
_bBHF6Z#
J!+d_O
\uoAk}
Dec|RDC&O98
nOy8V=
tO4u`}
f%#(*%<
hv4;uy=
V@j%>r0u~
fS+Pz/
~sFctC
g)5-?S
MeEdx
l<2,|i#
jG$blI@+
<8b6Kk
Q'v9j'
8|SQRPk
uDLWzT
>|N,A@
ooCC<m
8L6m@:
"eqMUS
u;pkHh.
s_Z&Uz;
tB`h.k
OI0G~'b
)%Hl(8
V:7N=P
-+!*~d
_0qzE^
k/!+dG
]~egJe
0:HW)!
{nH;}O
~vqKsXI
($}"v7-,HThh
#Hm&s[v
b)K9'!%
)#U\`t]IW1
?7x((
6-.s2h
VI>eM4
RkB.4i7y
*rH3G>
epMXb
s1e&)x
uIrcxMO
tL\0]#6[}r
c7S`1Y]o`
O{'|`V
J*s4 $
;X@Bp
/-rSEA
y~ A@I
2pM0[v
~Zlrar
i!rU.0
&KEwt3
*pxvV
oH]#`z
j~3D!\
o7(\ZF
Ood5f@
r[06x4
Rop'$a$
.,U*c!H
_)sdV{HjF
CIE0FV
,{&CU9J
AAQ:GR
~+NUBd
bNK!i/
"VaGqk}
tC_.K1
"<~OAM
gK@tYK
4<}e4N
%hv8iT
/{m=G$
,'RNT4%#z
(gC1h#
Uh\kxL
)k-G{6
LJ0/K5
9&U%<@Z
d94Pv>
-f^R2 U
5o-h:j
1P?&L$
vUwCp#
r/@Okv#
3`}x|2
%e0l{gF#s
du7{J=
J#j&YI
:3#P"1
Fssoy#
d$-l:e"CL
s|K*U8
7eiYQ*
E*/);R
mJ@Rs02
J~WP/:
s.6/:m
9q?0X
~^nz7C$
NhvuDR
hBGonW8
CzY)Vjx|
7!q&0n
W4k#)H
eUI"Uk
c<^B~&
3f$9F/9
:s(Qi-
D3[DmX
9.KH5
hB I<tH
\^6r~{|
lpo"-3
CA2.Xl
cpBU5d
urT&I
~_Wx]h
omRCKy
{6'*8X
T%#!U%
JQSFg^iR
"y^?7
:: a"*
Er6XwZ
`k+W,kk
]w]f!Bg
FA^U6x
j*!C8x
LVBvz_
vZWW293
--h9Qk
w^BLqh
QQW(km
gy%$G7
aDq/Z4
NNsP,
il}o0f
QJ7z(T
kU;Sx{U
8oMh6J-
2g*U*#
Z!nmVW&
.OU]v_
7VgPW4h
XELo$n!
zHUZB1
>/h)zo
|SZ)25
4by9KEt
')T1G~
&,WX2d
1FRTA+1
^hGR.j
8/e1_J<
fj)c|-3
}:K~9v)
71MD.rl
8xeKP&
)TakxUc/
af3Dx(
;A~}W`&
jZk}eQ
BGn^b/
3JV'Aw
4e>DLH
TE(\!+N
hfL2:X
1V!HUu
Ohat&K
wQfXzx
DR_w(&b
7=W; Z
G!qX1q
DfdEQ_
@k2\zU
tNV>N>*
^~1%zN
Nj+^5)
K|cmS,
a>lS3t
z%"5)Fn
{\;#w\c
BVl?&n8:
kT`q]*y
(2dk8a~
%C/4Z
}_'i-
2|1@qU
\(Sd!m
`A>Tj=
lac+VR
)nAo-W_
OMC*}+<
)uIuQ6J
*tc_L%
HV%i9G
.*B54:/
JN^Jca
h(6JG(
p+m&,WCW
e4z}X)
5d&|+A}
cT&.:H
@Iel)O7
NwCfnEc:
huKu ,
)mQ?RlW
y= 1eAt
VgI f+
-6][K$
4P#^LW*O
}7EX,
WgEkW?
TRD<q-H{
iT1&s{
=%+[fU
qix-j0
(4L*X5
KF1V[7
#%0Wn~a+
P2DK_g
C|*<0P
?#|z<Du?
q=WgN&K
{WWH7
&:c,}9
e++IK~
@@j[}?.p
d}$zt.
nQI,?;a
%;t~;C
"n<%`Y
ot:qHT
wK%NW#x
*bhH>*_A
&KI)]T
:2F!t|Q
LzzN'y
/@WuQK
~/{<Q,
EM^KY9
GI@qU\
FiO0Sn
sV^X7Q]
)*LnJ5
r_EOVU(
TExErP
,V+KK\
yA2H=i
h EZp=
n=0UCo
_T^,'1
4?)+-C~JU
{egM`^JB
fKywj*BC
Di:Sn]
\th=$m
U$yK&x^
*$RWfQV
^6xu'~
s]'8(E;
t-,hXU
EW=5ZSP+
ZO9E$
zUK:Zs
:TJy9?
B ox4|,X
}g-|xN=`Y*
yTd$uUz
.z@Y&6
SA<|5F
11}|0!
pO\rd
DrUVV/
P9riILOid
&yYPP;(\
F"ay$cnt
)I;5>`&A
~YXt)cI
NN-s%vc
- }l)'
AzA X7
!.Afs>q
@12ake
tlH?c.
VTKqGC
4ooO_f
]7k_^8#-
_v j\j
Bdr[.!
1YURI>?
Ghxxb8
*L>TH.
52)QpE
P;h6Xm
.3T09kc
G@>j7g
G}ZsG~
KR;uEIW@85Z
/|<:+D*\<
{QG5*O{
`ACeWO
"=B_R<U
&[N.Cxi
;d#"`s
Im'!F]
DL@.nma
@ATZ"sH
XFFViD
aY1)bp
f4h&BfZ
Mw9KX.
GE|zzE54
G_cY\.
7d[lWT
'|q@0[
G:WA6C{E
y(HPtN
&|yWSz
a.1uCI\
k6T15m
5Tw9"FVE7G
y_X0n,
(Io;aYv
A)E7AF
[ <M9R}
Q(*!o
/=Q-"C
m|4>I$
'Db 1]
F>-Pf
:>Z97@
IrX$95#
.L|rFBL
W6=#Ffw
:=6-'>N
*wc~:q
Q\2I"('sS
h-jqQ|
\\+#Hh
,i!2Ku
*ou0{4
r^hZ3f
U"s5Pl
X>nPva
ZTJe?L
J*Xgys
*L<PUj9GA
b1Mv<Uk
=SHEkI
BrH}%0P
K*{s<g^
%xXkBS
,/ft-u
w6M,7C
!|pf.W
o0=J65
i0|UkW
Po}Z#;
K}Z,UL5\
\I] e?)
C),<?O
\E<>1:
yB!Q#0
|,Ph;C BY
TZH&&b
Bo0rw_
{]&nKY
- SsC]
Q~ $^_
vYaeK>
&lk0Y0
'i,t~z
:c$Ja!
BQ]W,n
N&T7]N[P
&/@z`.
>/qGI!J
1QV_H*7
__T$hj
H5RV?iH/
w1rQO6x
?MMAf~
g{bg4
"wd#{5
yyGNxvm:
h/yw(dv
^)_M/X
XcXU_3
,4gTjH
/2~ +R
rwG/&C`@M[
_?fv3!
bXi:z9<
A'nzYPW
`+2\:z
K/`Pt^
[\J'l*
|z"9Z|HW
qRtm|
[+*UZ#
"M2|Jx
>\JORe
ma&k_@
` So{u
8SWp6>l
~rhUwW)
L@3/ue
Jlgn"(
M:317>
)Ddqyyq
9VN}Pf
sBGn@0
[K-F<(
Z&cb '[
33Y8~ixl
CSe'>e
x`lhNV
,S4o/4%X7A
di(A=~
u]w\o
8~b&AS
D#Pi"R9^U
&'hexZ
u`1LB#
Gfj"M
F5,1@>H
mcRJn&
QL3:jI
N|,9nf
E>TvQ^+
B[#>n)
P{IPH6
@l(OEY`
`'a*c}
:23.(6+'
\>1c`d
mb=zQ=
*)j:9
;JWR+g
$=A9=
I5^)6VE
#@gY$U
dw\_)%Q
rZP9C6L
YB:puf
OaJckc4
~@F}=V
9oCVs4
/T;)%D
kLWF'u
e*)t]$
`)9<%Z
9COU%y
kyD!Hpf
1]4dK@
6jgK]6B
q86/sV
>s;k]<
Upsxq+!
~@#\xn
uol([>
ECdNYr*/4E2
2\N!TD|
XW@>Ph
`rCT'vM
_2J3/Yi
!b*+P<
"p)bTH
ugcYVx:E
mx#z[!
qz4]+=
)io@L~V#E.
DVsK|,3
1SP/gb%
>HnA E
#5*|i!D
w<}9BD
QrOlO~
Y}<!;X
&jh:wmc]
D#3a.7
xO4v?k
0gLeO3J
'M8~3b
E,l&edJ8
? 3-u;6N
q"k>Be
A&tdbJl
vRmE0=
VtN+cg
,8jt2?
@`o:.7
|X"_bZ
HHctUI
H;3\WZO
NvFKqN
h:F=YB'J1u
aLzJrK.
{PPdE\
h1@Zov
_="x;q
;fIh*P
{Pnlop`
l,u?91
w}Nm)=
|j83,|
"/iw.S
>h`oT8
JNk3*h
"Q0q<Z:
1'[N;r
<,slA^%
*p}WU[
w`i6|
7pW&a20
"~k$nkg'
n1QXgH
8) IIj
p8#@2v
~8NH#D
NRL:/+
,aeP{u
8-u!7^BC
p#a KTyy
Vjh7gc
G[k*>Z
ACJRso
Ql&WUzV
k.Ts;h$
Ni{m"(
,^F?!f
ELkL|xv_
.{0|>!n
'a*Xm&'
RSB<?vi
Z?tn7OXM
<(Iv1'
gY],Jd/
Sq5^t6i
2m-eFLp
$]GH{w
%0o$Ro^
*!E}Xste
*Z|O}#
ww87/l
6xz+%S
t*y;CEO
bx$sF0
sYoimU,
}eyAjn
ZmU<4ot
E6@8X(
'"JR4;$X
y{zbq>
|CmN+l
be D-o
5&S%{b{
Vz?}8w&:
. 4)/j
L;\-Ei
-5'tu`
e.u'j{D
n% P[/
"N<2F;
8mTX$o
fy6?2H
/K7+S/
haizO8U
QQK[3j
,qpEO
3Q7VT6r
A8@KfZ6
{b9v F
_foR 7
~$z\"s
]san.y
8CAs($ <
kTK>M(
p}|)rPV7@
F}s19W
Y~NN"o`
I]an&l
BFsd <
i\P(tW
AxzyW,
&p?wX<s/
f% &vS4
telqg|m
.!6exb
Ly/tN
E$@MP
$5'(Ou
}$QF7j
/#0D,p
tG>|4W
DaZ{7b
x0I%_'
LppqZ'
|ou8!A-
<Jo~,U
b;,_bVN&6F
.d4l}#
-5^qbW9
$SihQt*fV
lrGt,8
f`{BnI
-%Xt!Hj,
h_Vw1
Oe'oKH
?V>EGAzF
|w+[kl
xQvsz-->:
%<O5ge
z(&T*1
>]~U$bfX
xKVZ~!x
K?uK4(@
s&k_+/(
JszIK@%u
z/zYsH
$c^3-[
x##FN7F
;x~J2>
t{w5oN
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20100
230216201109Z
240131201109Z0t1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Corporation0
I0G1-0+
$Microsoft Ireland Operations Limited1
230865+5002330
Ehttp://crl.microsoft.com/pki/crl/products/MicCodSigPCA_2010-07-06.crl0Z
>http://www.microsoft.com/pki/certs/MicCodSigPCA_2010-07-06.crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
100706204017Z
250706205017Z0~1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20100
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
1http://www.microsoft.com/PKI/docs/CPS/default.htm0@
#Vx"&6
7Z>@B1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 2010
http://office.microsoft.com 0
20230408081528.346Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:7BF1-E3EA-B8081%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
221104190137Z
240202190137Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:7BF1-E3EA-B8081%0#
Microsoft Time-Stamp Service0
c We)r(
q<`6$D
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
('~Ab|
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1&0$
Thales TSS ESN:7BF1-E3EA-B8081%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20230408094908Z
20230409094908Z0t0:
y"B}WvP "
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
230216201005Z
240131201005Z0t1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Corporation0
I0G1-0+
$Microsoft Ireland Operations Limited1
230217+5001370
Chttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20110
110708205909Z
260708210909Z0~1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
Ihttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^
Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
3http://www.microsoft.com/pkiops/docs/primarycps.htm0@
*?*kXIc
QEX82q'
WqVNHE
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 2011
http://office.microsoft.com 0
20230408081530.653Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:3BD4-4B80-69C31%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
220920202209Z
231214202209Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:3BD4-4B80-69C31%0#
Microsoft Time-Stamp Service0
2*b;2
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
E$\g8^/]
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:3BD4-4B80-69C31%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20230408095144Z
20230409095144Z0t0:
V[7]"=
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
fnI<(j2
,NBp=p
#+3;CScs
mscoree.dll
KERNEL32.DLL
(null)
B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
((((( H
h(((( H
H
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
PerfecryCrypt_Build
FileVersion
1.0.0.0
InternalName
PerfecryCrypt_Build.exe
LegalCopyright
Copyright
2023
LegalTrademarks
OriginalFilename
PerfecryCrypt_Build.exe
ProductName
PerfecryCrypt_Build
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Legal_Policy_Statement
(Microsoft PowerPoin
Legal_policy_statement
(Microsoft PowerPoin
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
ClamAV Clean
FireEye Clean
CAT-QuickHeal Clean
McAfee Artemis!33647CA452CA
Cylance Clean
VIPRE Clean
Sangfor Trojan.Win32.Agent.Vzx9
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Cyren W32/MSIL_Agent.CJU.gen!Eldorado
Symantec Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky UDS:Trojan-PSW.Win32.Stealerc
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Rising Clean
Sophos Mal/Generic-S
F-Secure Heuristic.HEUR/AGEN.1327060
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
Trapmine suspicious.low.ml.score
CMC Clean
Emsisoft Clean
SentinelOne Static AI - Suspicious PE
GData Clean
Jiangmin Clean
Webroot Clean
Avira HEUR/AGEN.1327060
MAX Clean
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:Trojan-PSW.Win32.Stealerc
Microsoft Trojan:Win32/Leonem
Google Detected
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
ALYac Clean
TACHYON Clean
DeepInstinct MALICIOUS
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Clean
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
BitDefenderTheta Gen:NN.ZexaF.36318.Gq2@aW9HzKb
AVG FileRepMalware [Pws]
Avast FileRepMalware [Pws]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.