Static | ZeroBOX

PE Compile Time

2016-04-04 05:18:44

PE Imphash

4ea4df5d94204fc550be1874e1b77ea7

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000062a8 0x00006400 6.44913434983
.rdata 0x00008000 0x000013a4 0x00001400 5.16300165576
.data 0x0000a000 0x0039eb78 0x00000600 3.97447214431
.ndata 0x003a9000 0x00040000 0x00000000 0.0
.rsrc 0x003e9000 0x00014ea0 0x00015000 5.77928403083

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x003fd110 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x003fd110 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x003fd110 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x003fd110 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_DIALOG 0x003fd810 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x003fd810 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x003fd810 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x003fd810 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x003fd870 0x0000003e LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x003fd8b0 0x000001c8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x003fda78 0x00000425 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x408074 GetFileAttributesW
0x408078 GetFullPathNameW
0x40807c Sleep
0x408080 GetTickCount
0x408084 CreateFileW
0x408088 GetFileSize
0x40808c MoveFileW
0x408090 SetFileAttributesW
0x408094 GetModuleFileNameW
0x408098 CopyFileW
0x40809c ExitProcess
0x4080a8 GetTempPathW
0x4080ac GetCommandLineW
0x4080b0 GetVersion
0x4080b4 SetErrorMode
0x4080b8 WaitForSingleObject
0x4080bc GetCurrentProcess
0x4080c0 CompareFileTime
0x4080c4 GlobalUnlock
0x4080c8 GlobalLock
0x4080cc CreateThread
0x4080d0 GetLastError
0x4080d4 CreateDirectoryW
0x4080d8 CreateProcessW
0x4080dc RemoveDirectoryW
0x4080e0 lstrcmpiA
0x4080e4 GetTempFileNameW
0x4080e8 WriteFile
0x4080ec lstrcpyA
0x4080f0 lstrcpyW
0x4080f4 MoveFileExW
0x4080f8 lstrcatW
0x4080fc GetSystemDirectoryW
0x408100 GetProcAddress
0x408104 GetModuleHandleA
0x408108 GlobalFree
0x40810c GlobalAlloc
0x408110 GetShortPathNameW
0x408114 SearchPathW
0x408118 lstrcmpiW
0x40811c SetFileTime
0x408120 CloseHandle
0x408128 lstrcmpW
0x40812c GetDiskFreeSpaceW
0x408130 lstrlenW
0x408134 lstrcpynW
0x408138 GetExitCodeProcess
0x40813c FindFirstFileW
0x408140 FindNextFileW
0x408144 DeleteFileW
0x408148 SetFilePointer
0x40814c ReadFile
0x408150 FindClose
0x408154 MulDiv
0x408158 MultiByteToWideChar
0x40815c lstrlenA
0x408160 WideCharToMultiByte
0x40816c FreeLibrary
0x408170 LoadLibraryExW
0x408174 GetModuleHandleW
Library USER32.dll:
0x408198 GetSystemMenu
0x40819c SetClassLongW
0x4081a0 IsWindowEnabled
0x4081a4 EnableMenuItem
0x4081a8 SetWindowPos
0x4081ac GetSysColor
0x4081b0 GetWindowLongW
0x4081b4 SetCursor
0x4081b8 LoadCursorW
0x4081bc CheckDlgButton
0x4081c0 GetMessagePos
0x4081c4 LoadBitmapW
0x4081c8 CallWindowProcW
0x4081cc IsWindowVisible
0x4081d0 CloseClipboard
0x4081d4 SetClipboardData
0x4081d8 EmptyClipboard
0x4081dc OpenClipboard
0x4081e0 wsprintfW
0x4081e4 ScreenToClient
0x4081e8 GetWindowRect
0x4081ec GetSystemMetrics
0x4081f0 SetDlgItemTextW
0x4081f4 GetDlgItemTextW
0x4081f8 MessageBoxIndirectW
0x4081fc CharPrevW
0x408200 CharNextA
0x408204 wsprintfA
0x408208 DispatchMessageW
0x40820c PeekMessageW
0x408210 GetDC
0x408214 ReleaseDC
0x408218 EnableWindow
0x40821c InvalidateRect
0x408220 SendMessageW
0x408224 DefWindowProcW
0x408228 BeginPaint
0x40822c GetClientRect
0x408230 FillRect
0x408234 EndDialog
0x408238 RegisterClassW
0x408240 CreateWindowExW
0x408244 GetClassInfoW
0x408248 DialogBoxParamW
0x40824c CharNextW
0x408250 ExitWindowsEx
0x408254 DestroyWindow
0x408258 LoadImageW
0x40825c SetTimer
0x408260 SetWindowTextW
0x408264 PostQuitMessage
0x408268 ShowWindow
0x40826c GetDlgItem
0x408270 IsWindow
0x408274 SetWindowLongW
0x408278 FindWindowExW
0x40827c TrackPopupMenu
0x408280 AppendMenuW
0x408284 CreatePopupMenu
0x408288 DrawTextW
0x40828c EndPaint
0x408290 CreateDialogParamW
0x408294 SendMessageTimeoutW
0x408298 SetForegroundWindow
Library GDI32.dll:
0x40804c SelectObject
0x408050 SetBkMode
0x408054 CreateFontIndirectW
0x408058 SetTextColor
0x40805c DeleteObject
0x408060 GetDeviceCaps
0x408064 CreateBrushIndirect
0x408068 SetBkColor
Library SHELL32.dll:
0x408184 SHBrowseForFolderW
0x408188 SHGetFileInfoW
0x40818c ShellExecuteW
0x408190 SHFileOperationW
Library ADVAPI32.dll:
0x408000 RegDeleteKeyW
0x408004 SetFileSecurityW
0x408008 OpenProcessToken
0x408014 RegOpenKeyExW
0x408018 RegEnumValueW
0x40801c RegDeleteValueW
0x408020 RegCloseKey
0x408024 RegCreateKeyExW
0x408028 RegSetValueExW
0x40802c RegQueryValueExW
0x408030 RegEnumKeyW
Library COMCTL32.dll:
0x408038 ImageList_AddMasked
0x40803c None
0x408040 ImageList_Destroy
0x408044 ImageList_Create
Library ole32.dll:
0x4082a0 OleUninitialize
0x4082a4 OleInitialize
0x4082a8 CoTaskMemFree
0x4082ac CoCreateInstance

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
SQSSSPW
Instu_
softuV
NulluM
Y;5 wy
SVWj _3
Aj"A[f
D$$SPS
Vj%SSS
f9=hz
D$$+D$
D$,+D$$P
\u f9O
90u'AAf
A@;E |
UXTHEME
USERENV
SETUPAPI
APPHELP
PROPSYS
DWMAPI
CRYPTBASE
OLEACC
CLBCATQ
RichEd32
RichEd20
MulDiv
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
ReadFile
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
SetFileAttributesW
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
GetVersion
SetErrorMode
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
GetLastError
CreateDirectoryW
CreateProcessW
RemoveDirectoryW
lstrcmpiA
GetTempFileNameW
WriteFile
lstrcpyA
lstrcpyW
MoveFileExW
lstrcatW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleA
KERNEL32.dll
EndPaint
DrawTextW
FillRect
GetClientRect
BeginPaint
DefWindowProcW
SendMessageW
InvalidateRect
EnableWindow
ReleaseDC
LoadImageW
SetWindowLongW
GetDlgItem
IsWindow
FindWindowExW
SendMessageTimeoutW
wsprintfW
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextW
SetTimer
CreateDialogParamW
DestroyWindow
ExitWindowsEx
CharNextW
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHELL32.dll
RegEnumValueW
RegEnumKeyW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
SetFileSecurityW
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VERSION
SHGetFolderPathW
SHFOLDER
SHAutoComplete
SHLWAPI
SHELL32
InitiateShutdownW
RegDeleteKeyExW
ADVAPI32
GetUserDefaultUILanguage
GetDiskFreeSpaceExW
SetDefaultDllDirectories
KERNEL32
[Rename]
%ls=%ls
0++8866
{{{h333
sssy333
\v
uuuW333
mmmy222
!t'%%i-++a6
4ZNLLU
wvv}333
~~n]]]
//K
.))3(((
333;(((
UUU"$$$:
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0rc1</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></ap
NullsoftInst
UP"T'z
;=__O=
v3Sl{g{
@!$T6
Rli@2[
.m1_~>
}2%5FU-
qu~M51
J$43r1
HW LH
n,!gs#
n je"S{
0v>T!n
$I*uCr
w-1bbm
\xE(gP
%ji=Tji1
z~nK**
,vVi5cW
85XsGSn
DlBPs"h
[97Yhh
ys1t!L/I
F8yEjx
1r]AI[`
( g~_1
ux;N"EkO
<]-/}w
kg=~wD
A~i.f9
k>u=Zm
{[G#'0
YO%F)&
1g`v5}
\2uof)
/}K*Kaj
hZ@V8_
e[ ,D.1
\m|/A0
r8oZ+4
|[-#U}
cCk4( Z
.R7~V6
5MS$:p
rrrz!9
Mt-CZ&C
z@UL77
P)b#&Fh\6
H|XTNq
Xz,<6
,E"?Rqe
a_3NB{
X%q@A&
hhbc7X
q-$#]`
)&pc\,
a'4>zt;
j 68P6
XLS70[5
af660V/n|g
k~x]`P$
TTHMsV
4'3`Cll
V0PX)H
zMj?s?
kULc>?LM
W661^KP
*CLM"F
z;n/M
rxtX\L
1qtf0s.s
t`/:wo1
X?f4D/
vWR7LQfJ
2OtyvW
Wwyrsf
L0lllU
HW-)2w
ZliFN&4
3^jCL`
!ZJ !ThH
C0P(bJ
l`@# C
Sk("wt
&f[[cL
"wvoM)
29t`v0v
z+ys4P:
j8JgNjlz
]!s"\)
k)^5T5
MlK<B^
n "=2;
|m<Ag
lD{t"|_
bZM42`u z
XWs[JW
4QaB!E
=<)\JA&
knT}d5
$Uls_D#
8 &!#A
U !}q&@
G(f#Q9&
vFel>!
qqICA}d
,lh'AH4!
8L5m'= 7
\QFD"b
tbQKWP
R6F4\
[|n"w--
V1BZ"#x
f.p6kZg
@JGC-.T
+D}S3K!6
Jd"[BM
d8y{B
AmX-sBP
{c-_Ke
ivq&3r]25
G!^`<b
df.l[
u3|<OU
sVxko3
XEFNt_
hb4%mT
l:9.b0
d+tKKl3
[V1sDa
Wg#ty&
b5btN
Fo:+9,
m g$0E
]77[EB
m0S ///
'!cRwt
1kRLx,
CY:j(^T
FS+OJ
RACBld
'O x%v
vZg-^xd, Dt
v/udY:
pt+=uc
n9MnF_
O~xioG
6n|Ke
|^93Xi
<5LfAEEA
YnXJ,~
8bag^D
z<fUSq
h$`@)oq
@8#T#
!J]goE
WvFdC`g
nvIx-@sph9
]&F`y;
F=PtO"
yyN?G'
Z'9f_+
+tp-Lo
io8_>\
Zv0Jbk%n
09]r5Q
ji1(Z
.^5aQT}@
380b=D
2H"6;/
gq<W\ +s
{uqC47
o_ AJX
jW\\Ac
%y7yII
!!$6c
MZ\n.s
B/dA3D
l#>)bi
X)(hhL
KI8M'5'(g
Rx9M5'~@/
/o@`M_);
k/A=&!
q}UW!F-NC
FxvOdb
1:XQ]1?S
H kF2A
i VHN
ij:8[
i?"9DaO
iu+$/
A G pH#
R$1X/s
qD!\R{m
7~.Fq]
"M#(.E
T40l#3
X60Srr
CY]Lu>CG
oN&i7G
{?/m'ayQ
`bh8`x
&o'`G9
rOv:ip
Z+gnRG1Qyu
o| D%S
^Zb6(%
%|1wrk
-znNITK
F dwX(
9%`m.h
u$ly}6
Vv[~-/
p)X=rKK
I)R^P]
l^$K`#s
KT}eBF
vU0aI7
_gSuK5F
7(AB/(
x!+Li~
.am[{L
I#uau
~3UvP)
BFA0V\=
EbzZYJ
1V_RJ:
n"E$4H
dDc8 }
Qg9[+Z
m7H_kB
5L<=d[
p\YmE$O
nc9`;j
x{VKJ*
[),^+tC.7
ocd7Oy
Vr]f"3
m%`zb#
iOc-Z`
3W\+dh
EF{-fX
Vy[o<B
yeThSE
,CWst\
S5Y+8`
isy7G_
tT'3]~m
O<+Udq"
f/^mSJNKW
i{smj4F
Q(aP`B
.7[6m(w
QZfIvz
.64k@#
P?IV&y6
-r?5>R
v:0*rZ
3U5Y>!~q
MT]q$c
<&\vf
6lB Dy
eL&#i@
mZ0" D*
bp%x7{
leQf5/
"[PpTY
h+8w^/KAy
DH8PyY
`f'shh
9?^nqC
=)s9R?B
/`]"d@
=--)AE
d=pU$wG
cd3\V$}
jkT2dxI
8*>vVB[
*`J?<9l
s\ )R3
KxJ`(*7
"&,{n<
B|[[J+
:dLn[Xf
:Th"bv
"jf5w1=
:GGDuI7sJ
"+uTG]
oLSO@k{|
F&[-N[)
VS#1olM
m$Ueo+-a]
g)Q==2
Q87M"
;m,TS5Q
yDD7[
s'MWbc
EExo{nv1
ktu'L+h
u_Y{=//
API61!
jeAV8B
5yiI"SA
?w^@<C
k[hYN9-
TZB(;T
gkm5|"b
~^Py?W
NS_,qO
FyqnpGq
"QCn=,
C0vgFcM>
rG]l)n-
r|:EZc
/HLR(M7
Wm]QF4
RIYUd9[]JL
'tDi14
.#F=AL
4cNL`#
3@[5:Hj
*a:h@0
D9o76
)S&(!N
zgL(s(WL
8YJ+MG
_HbK,r@
GsLrVx
0$)"d*)hX
R ]0O-
]~EDN2n
,![[PZ
ZZZ>UE
@F\ZpW
N0D*cbJ
;sp$$ xv=4
uz>6:n
2RK19,2
J@V!oh
ApN&P!oq"
< +$fu'nB
@cAK<B^
g]DT,v:
CPqL;f
]z0zJV4
R[N&&c
BGy z'
}<a]\cV
UtGb>X
'<}GBM
~ 8K%D
hyqv3T3"
k4RRnT
|&6D5[
c!-}<\
>-1OW&
@""my,
_vsUX`
(8Pmy8V/
TBVC,p
8hP0P8j
1VH59Mk.?
cXs#Wg
9c[XF
ibf0ZB
ATRi&I
Z~-7{t
QRS28U
a%).+*m
MGSD
\s@q`d
H:++WH
?g"*Ub
0R1(R
A0 ]+I
u-k[i
7=M|;q
o6WnK1
"R" M3
!(E%Z2#
c[<V'!
hn$#/1
H323SG
:L*4\Lf
Y&40s
}+lZW{~V
B6)dTTq
!X&Ci=Y
V\IZ-r
N#(phX
'rAa*y(*P
E7O Fr
aVt_moMZ
-GPdb[
]*/Qqr,
rrn;?@v
ic78J_
P`( M`
c'\Dbg
D!<u7YNW
{|hyF$
@0(|GrX
|+_&_O
-aM2,_
wQV!4U
muQq[E
SsDTJK
6`k,^un}
?06'~F
"vh;~m
l{g!K_A
$Bi6@B
e-B;A9@
dJ{XwQ:
!X*$lX
+ D9j6
k]UKc
u|zVs(
QVQbb8I
DV,h6\
iz WQ}
3MTS#m
<Un:l_
d-lK?x
@&<vt+j
?!@t4
HD$^kD
s7\&WL
uf9~A3aaT
n8R{U&{
qlMYjLB
*w}%Ho!iC
` =O/Q
G5mkl1
TQtup8
2077\5
[jhX#$
mA`W"I
RqT^JM
5l;/bd
=0/<}U
.T%E8P
lCbCbm
*d/@x]
#(6V[K
7qJ=Zr
&u[{p^
M3Ako'
)Zt.Q0s>
4|YJ&X
+Z+ees
MFOwsX
HsG$~c
QQe?]\%
*x*%b&
LNAx=T
9Cw"s#
a5GdPv
(HBoT
e+HQ~%"
6L8p&B
hUn'SS+
hc4v:k-
fDab`B$
dIPfv_
`tAb"%
2;*gMu
f)5&e}W
LLm3vR
#4`d2[
gw7CK#
oV~}^~
|?qXz0a
WML>z'
-SzANe
S*h~yE
nZR;!p
V3dd7X
j%Yra+
K8:Emj
znmhr'
63`.Q6N
swS!TbAQ
S%|Y@-9
A&^WTj/
E5*EV
BVp@7DDN8
VS`+ZqU
J0UWZL
U!pnNi
+-I._!
7+oOOw]o
xI2XCa#
bsq=#G
nl{{Ss
dS]c`#
%?-=P6'j
ZjGoe'
aUdC=]"x
!aU>3[
HCX*Vm
"N05oa
jAj_g>
q?D"nR
ECGFq4v]m3ml
}gc'lN
m4k:+#T(
cw"59d6P
y*qxr;
l"SMWs
'u*3&4
>k*ruvm>Mx
i`0pvK
fX?T0(
#AJl6L%X
;L%-5]?a!^
HoO(#'
>&?6N#
<Vbz{v
}U;[\%B
}BD 1j
!yR9=n
HJ2sMRX
EpiD7Y
}kN*Zm
M$B#@+
[g]1|r
#aLHP"
gKB_DI
7XK&{6
3yaPkQ
Z-/;(~
?Cae+Y
eOu42M
0ik5ut\oc^%
1rWm)}k
asT,8q9
lsyfiB
orb93U
m1&En8
}mX=yU
SxN,k{E
)K5TKia
&F* @/
o@3X@U
(WV`?%t
nI$FW
a>}W^^W
$4eO*i
]?W!A$ 9
J@lt.F"
b]h>D!
BULvF(
~s|e9E
Oqs|D0F
Oq0S.'
k{|0+!
8~5T.
>F&#C
f%!{1w"
L/F`ME
'0|Z$Y
B lCmI\
n&wsj4
)^Jk9jR
cv;!)w~
o8mKC@7
%zNGhB
cp>+7
!#"heL
*59pzb
$F*1N(
5Xmp@H
\YPBRU UI
OrOY!\
+|5~~z
QQ!#;*x
M)$hzdz
0e.K 5b
={%xY})[
V=yyQb\
%K<s>
9H39m^
c3#JI}[
qM`>h[;B[gw
|{XcD<
qXr|Ra<
wH=[)8|
@Ba&d6
Rr\I=l
<B'wWF
M{z25V'
BkMLMZ
B=Nl~M^
Uokn>e
\.WMBGP|,D
x^l:b,
lWc4Y
RaAg,hb
[w=gS?c
Tq#;V|
&lcGwo
[NN59iO
E=XnJXa
(b9 E}Y
SnTU_DC2
8!0\1)
gx{?UC
>"0~)A(
'Ey%m]
".>@2j
ZbPL|R
NwvQ{t
:m}"-W;
3b9JU1
20Y_Bk\
k7x?l@T
V\_^Ydj
*T:]NU
{H?,tO+
1OUJyo
XSDX23
s1n<a1
Ub2\BG
D2REQ_|
;"!v8<
GX;o )
;1!"sQ
i"/x8(
Z K{UUw
D~M=fUv
q|vIXJoM#YJW
?RE\>c
a:c>zD
v6#,|
W 3G08
NA'<?s
%AFm"t)
~Q*c&;a
@jsT{?
"?fh2Q
L9&SaX
LEt//u
,Bd-Y,T
n#r19pZ
T.UE.Gu
h'O;NW
<M~ \,D~
Aq2;%m
vtnMG@
~VtOT~<
P^SGyi
Pe>w4O
G7-=K\
c;*&J0
Usp6gN
OL4iZtq
f>*C#+
ITsM5
oljO8CH
jjdg.X<
4&)k&8
j9:XNjo
RichEdit
RichEdit20W
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
verifying installer: %d%%
unpacking data: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error writing temporary file. Make sure your temp folder is valid.
Error launching installer
SeShutdownPrivilege
NSIS Error
%u.%u%s%s
*?|<>/":
%s%S.dll
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
MS Shell Dlg
VS_VERSION_INFO
StringFileInfo
040904e4
FileVersion
1.3.0.0
InternalName
Laedervest.exe
OriginalFilename
Laedervest.exe
ProductVersion
1.3.0.0
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Makoob.4!c
Elastic malicious (high confidence)
DrWeb Clean
MicroWorld-eScan Trojan.GenericKD.68273941
ClamAV Clean
FireEye Generic.mg.690674952ef72ecf
CAT-QuickHeal Clean
McAfee RDN/Generic.dx
Malwarebytes Trojan.GuLoader
VIPRE Gen:Variant.Nemesis.25552
Sangfor Trojan.NSIS.Injector.Vk2z
K7AntiVirus Clean
BitDefender Trojan.Generic.34037584
K7GW Clean
CrowdStrike Clean
BitDefenderTheta Clean
VirIT Clean
Cyren W32/Downloader.GZST-6416
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 NSIS/Injector.ASH
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 99)
Kaspersky HEUR:Trojan.NSIS.Makoob.gen
Alibaba Trojan:Application/Makoob.b78fb9c4
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/Injector.bdpls
Baidu Clean
Zillya Clean
TrendMicro Trojan.Win32.GULOADER.YXDGUZ
McAfee-GW-Edition BehavesLike.Win32.Dropper.gc
Trapmine Clean
CMC Clean
Emsisoft Trojan.Generic.34037584 (B)
Ikarus Trojan.NSIS.Agent
GData Trojan.Generic.34037584
Jiangmin Adware.Agent.awzz
Webroot Clean
Avira TR/Injector.bdpls
MAX malware (ai score=86)
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Generic.D411C715
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.NSIS.Makoob.gen
Microsoft Trojan:Win32/GuLoader.ALY!MTB
Google Detected
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
ALYac Gen:Variant.Nemesis.25552
TACHYON Clean
DeepInstinct MALICIOUS
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.GULOADER.YXDGUZ
Tencent Nsis.Trojan.Makoob.Fflw
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
Fortinet NSIS/Injector.E3FB!tr
AVG NSIS:TrojanX-gen [Trj]
Cybereason Clean
Avast NSIS:TrojanX-gen [Trj]
No IRMA results available.