Static | ZeroBOX

PE Compile Time

2023-07-02 11:09:46

PE Imphash

671f2a1f8aee14d336bab98fea93d734

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000065ec 0x00006600 6.47830419767
.rdata 0x00008000 0x00001340 0x00001400 5.23767397604
.data 0x0000a000 0x00025138 0x00000600 4.16270622918
.ndata 0x00030000 0x0001b000 0x00000000 0.0
.rsrc 0x0004b000 0x00030028 0x00030200 4.8944224328

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x0007a398 0x00000368 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_DIALOG 0x0007a9e8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0007a9e8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0007a9e8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0007a9e8 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0007aa48 0x000000a0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0007aae8 0x00000200 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0007ace8 0x0000033e LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library ADVAPI32.dll:
0x408000 RegEnumValueA
0x408004 RegEnumKeyA
0x408008 RegQueryValueExA
0x40800c RegSetValueExA
0x408010 RegCloseKey
0x408014 RegDeleteValueA
0x408018 RegDeleteKeyA
0x408024 OpenProcessToken
0x408028 RegOpenKeyExA
0x40802c RegCreateKeyExA
Library SHELL32.dll:
0x40816c SHBrowseForFolderA
0x408170 SHGetFileInfoA
0x408174 SHFileOperationA
0x408178 ShellExecuteExA
Library ole32.dll:
0x40827c OleUninitialize
0x408280 OleInitialize
0x408284 IIDFromString
0x408288 CoCreateInstance
0x40828c CoTaskMemFree
Library COMCTL32.dll:
0x408034 ImageList_Destroy
0x408038 None
0x40803c ImageList_AddMasked
0x408040 ImageList_Create
Library USER32.dll:
0x408180 SetDlgItemTextA
0x408184 GetSystemMetrics
0x408188 CreatePopupMenu
0x40818c AppendMenuA
0x408190 OpenClipboard
0x408194 EmptyClipboard
0x408198 SetClipboardData
0x40819c CloseClipboard
0x4081a0 IsWindowVisible
0x4081a4 CallWindowProcA
0x4081a8 GetMessagePos
0x4081ac CheckDlgButton
0x4081b0 LoadCursorA
0x4081b4 SetCursor
0x4081b8 GetSysColor
0x4081bc SetWindowPos
0x4081c0 GetWindowLongA
0x4081c4 IsWindowEnabled
0x4081c8 SetClassLongA
0x4081cc GetSystemMenu
0x4081d0 EnableMenuItem
0x4081d4 GetWindowRect
0x4081d8 ScreenToClient
0x4081dc EndDialog
0x4081e0 RegisterClassA
0x4081e8 CreateWindowExA
0x4081ec GetDlgItemTextA
0x4081f0 DialogBoxParamA
0x4081f4 CharNextA
0x4081f8 ExitWindowsEx
0x4081fc DestroyWindow
0x408200 CreateDialogParamA
0x408204 SetTimer
0x408208 SetWindowTextA
0x40820c PostQuitMessage
0x408210 SetForegroundWindow
0x408214 ShowWindow
0x408218 wsprintfA
0x40821c SendMessageTimeoutA
0x408220 FindWindowExA
0x408224 IsWindow
0x408228 GetDlgItem
0x40822c SetWindowLongA
0x408230 LoadImageA
0x408234 GetDC
0x408238 ReleaseDC
0x40823c EnableWindow
0x408240 InvalidateRect
0x408244 SendMessageA
0x408248 DefWindowProcA
0x40824c BeginPaint
0x408250 GetClientRect
0x408254 FillRect
0x408258 DrawTextA
0x40825c EndPaint
0x408260 MessageBoxIndirectA
0x408264 CharPrevA
0x408268 PeekMessageA
0x40826c GetClassInfoA
0x408270 DispatchMessageA
0x408274 TrackPopupMenu
Library GDI32.dll:
0x408048 GetDeviceCaps
0x40804c SetBkColor
0x408050 SelectObject
0x408054 DeleteObject
0x408058 CreateBrushIndirect
0x40805c CreateFontIndirectA
0x408060 SetBkMode
0x408064 SetTextColor
Library KERNEL32.dll:
0x40806c CreateFileA
0x408070 GetTempFileNameA
0x408074 ReadFile
0x408078 RemoveDirectoryA
0x40807c CreateProcessA
0x408080 CreateDirectoryA
0x408084 GetLastError
0x408088 CreateThread
0x40808c GlobalLock
0x408090 GlobalUnlock
0x408094 GetDiskFreeSpaceA
0x408098 lstrcpynA
0x40809c SetErrorMode
0x4080a0 GetVersionExA
0x4080a4 lstrlenA
0x4080a8 GetCommandLineA
0x4080ac GetTempPathA
0x4080b4 WriteFile
0x4080b8 ExitProcess
0x4080bc CopyFileA
0x4080c0 GetCurrentProcess
0x4080c4 GetModuleFileNameA
0x4080c8 GetFileSize
0x4080cc GetTickCount
0x4080d0 Sleep
0x4080d4 SetFileAttributesA
0x4080d8 GetFileAttributesA
0x4080e0 MoveFileA
0x4080e4 GetFullPathNameA
0x4080e8 GetShortPathNameA
0x4080ec SearchPathA
0x4080f0 CompareFileTime
0x4080f4 SetFileTime
0x4080f8 CloseHandle
0x4080fc lstrcmpiA
0x408100 lstrcmpA
0x408108 GlobalFree
0x40810c GlobalAlloc
0x408110 GetModuleHandleA
0x408114 LoadLibraryExA
0x408118 FreeLibrary
0x40811c MultiByteToWideChar
0x408128 SetFilePointer
0x40812c FindClose
0x408130 FindNextFileA
0x408134 FindFirstFileA
0x408138 DeleteFileA
0x40813c MulDiv
0x408140 lstrcpyA
0x408144 MoveFileExA
0x408148 lstrcatA
0x40814c WideCharToMultiByte
0x408150 GetSystemDirectoryA
0x408154 GetProcAddress
0x408158 GetExitCodeProcess
0x40815c WaitForSingleObject

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
s495L
v#Vh*.@
Instu`
softuW
NulluN
Vj%WWW
D$$+D$
D$,+D$$P
SSSSjn
<v"Ph
HtVHtHH
UXTHEME
USERENV
SETUPAPI
APPHELP
PROPSYS
DWMAPI
CRYPTBASE
OLEACC
CLBCATQ
NTMARTA
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
RegCreateKeyExA
ADVAPI32.dll
SHFileOperationA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
SHELL32.dll
CoTaskMemFree
CoCreateInstance
OleUninitialize
OleInitialize
IIDFromString
ole32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
EndPaint
DrawTextA
FillRect
GetClientRect
BeginPaint
DefWindowProcA
SendMessageA
InvalidateRect
EnableWindow
ReleaseDC
LoadImageA
SetWindowLongA
GetDlgItem
IsWindow
FindWindowExA
SendMessageTimeoutA
wsprintfA
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextA
SetTimer
CreateDialogParamA
DestroyWindow
ExitWindowsEx
CharNextA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
GetWindowLongA
SetWindowPos
GetSysColor
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
LoadLibraryExA
GetModuleHandleA
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
SetFileAttributesA
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
lstrlenA
GetVersionExA
SetErrorMode
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
GetLastError
CreateDirectoryA
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
ReadFile
WriteFile
lstrcpyA
MoveFileExA
lstrcatA
WideCharToMultiByte
GetSystemDirectoryA
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
KERNEL32.dll
verifying installer: %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
... %d%%
SeShutdownPrivilege
~nsu%X.tmp
NSIS Error
Error writing temporary file. Make sure your temp folder is valid.
%u.%u%s%s
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VERSION
SHGetFolderPathA
SHFOLDER
SHAutoComplete
SHLWAPI
SHGetKnownFolderPath
SHELL32
InitiateShutdownA
RegDeleteKeyExA
ADVAPI32
GetUserDefaultUILanguage
GetDiskFreeSpaceExA
SetDefaultDllDirectories
KERNEL32
[Rename]
*?|<>/":
%s%s.dll
k'"!zE=<
'''&&&&
&&&8&''=&&'<&&&;'''8&'&5'''4&&&0%%%.''','''*(''''''%(((#
!'''''&
&& ##$)!!"2 >
I !Y"""e$%%k%&&j%%%h$$$d##$` ""
""Y!"#W!##T"##S"$$Q#$$N#$$L$$%J$%%G$%%E$%%D&&&A&&&?
&&<&&&9&&&6&''3&''1'''.''',
$("I4%=
&&&%%%+
$$A341`CB?}]WT
.,,z*()s&%%m$%%i%%%f$$$b#$$_#$$["##V
!%PB/$h
&&&#&&&1"""9XSP~
'''# !$lda
^U4XfH)
ka=(gO1
|f>,yc@WfL/
b^]Cmih|
%&&&&&'''
$$%!""#/""">###L%&&S%%%R%%%N$$$I#$$F"##C$%%?$%%=$%%:%%&7%%%4%%%1%&&
&&,''')'''%&
&#&'' &&&
%%%!""#-)*)E775dRLK
1--|0--x.,+s*))k'&&d$%%^%%%Y$$$U#$$Q!#$J+'%N
(0/.D{wn
k\8QtS,
nY;,hM/7eE%<bA
{w}jh~kg~kg
lh~lh~mh~vh~qg~lg~kh~kh
nm~mu}tl
miyggma\wgb
njygdiY^tca
okyheiZeudc
okziek^X{ea
rkzjfkkYwia
jAkhIvib
;ug:vhb
kze@wgb
8s^=xhd
lVm^Syif
pmoa^yjg
rnpb_zlh
wToeR{mi
AwdB{li
yna^wif~ljzli
%%%$%&&1%%&6&&&3&&&.&''*&&&'&&&#&&& &&'
)A;97gSMM
410}.,+r-++m+*)f(''^%%%V%%%P$%%K#$%D0)%J
-,,8xtl
td>"~]0
mV89lS4UiI&bhG
&&&"%&&)'''&'''"(((
$$$*..-NC??wUNM
/--s,**k+*)e('(\%%%T%%%M$%%G"$%@[8 i
***8@<<gD>=
622w30/n.,,a+))X)((O&&&F%%%>$%%6B/#H
o?J{_3w
!966Q622d1/.V,+*I)((=$$$3
#""*/-,K(&&?"!!2
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.09</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>
NullsoftInst
|GxfoU
L#oKA%
l%WeLSEs
@ S:l.
A@RZEb
@_PUU=
z1)>=K
0Ihhh
T`,Snn
*.b\CY +
Z+.KD
f\(d~|
F+]Ss0
f@^^8<
3-itvh
F@Cj {
t2V?4Rf
MiMDC
:SM$)U
:8.__;
u;|a1V
Lrq3JT
yVh%rQ
Gg)V$f
Jc:W l
3I|lhJ
{+p"c|<
hGKo1R
kMCV<+
rY#_B
k+W:u'
bM4X~V
rnK:6[x
#Uo<qC
$q~VH!
iZq4;
E>2Mrt
>f.u+;
s@v)?$
fer@Mt
2z;~4qo
DbZT|2
S+@VpL
gR%7~5
AOJ'7~
Mn"hV^
wP ]_"<>$x
XEYnn3
GTx[K.q
'>g)ek
.tn;cP
eRxk6%d
zS6?VJ_
&$NMM
$L)ia=}
x`h_v(Wu
} bO9-
$`3f_r
2)IR#q
]ze <{
;3y0Wd
<lidIw
?*0}EC
[,gxV!
Eklu6g
Q#n\:U|5
K]N>~y
Ll94ga#
<94N,p
4nx4":)
_pMt3N\n
/mQP3vK
!u,i"s?7
u_KZ-T
"OS_(9
vmWU:9
?^iaWWb
fN*Pi^2
$DM{tv
mn}fkz
s`YJ4z
{Tim5&
0CJ534t
O:%F6|C
9N4(mg
[iL<XCwE
f4_Dd|W
1bJ{U
d^_%Ic
]>#J83N
I!b9t\
#dCMO%j
C04>gk%
pYEztN
q=*D6t
KOGfbvw'
'8 *oM
m/=G>$
Q.},r}l
2~q3'1
k|z$Pej
CY;d"Vk
sVk#K9L
dTS+{5
]!#fDf3
.^~|@>
$s2]<s
1>x>5xsy
\#.mPk
(x=+FW
%j2H"XOr
PxF?vuDb
<o)*?
Y+*OBr
t%F%e1
(f7z`:
O~N=o
G6P2!4
H8Wu<7
'qFad
$hS&t"7
+k^@B:
GCH1hP
')l@!f
W9OA_d
#?TlV8}
^'Y'q8
))7S!:v
QsfpN)v
_)~Y!H
Hw(.jQ
qWnj5xc
#BqKfV}^R
Onh# P
3h!RNx
T-<FaW
-L2W e
EA4::6
~l3Ea4
I@F`=u]
|WNuzSz
SY/Xg0
n=F{&0
K!@D(N,t
V75[f`
JMgTA$d+
yA{5U-
ot&J(f
WfxXNf,
yQe=8V
J.<([em}
rt[`]cA
uO`]%gg
,H-'z1d
j.x6m{
2.gJ^X
NA=&A
M:(,56
G,&:7b\^
FH&7D1
k>_lU}
h8{>+2O
Xn'8N7
L9p*=|i
>g*MXRs"
[Ec?2M
DhG9s:
.]f0MG
%u$R6>j
1Yy[k3
6n7'L&w
Yr,3xO
&?QB2<
~6)iqy
4H#) %
:e^fI$
O_"oI]
Y5CPJB
[c{}1(
UioQ^e
:lD"7HMY
s?GW9H
7>l+im/
~;I?RZ
fnHi@=
Brr8+!u2z
LGe=Ko
zxE&A#UQ
+I +&_
|uf `h
Ej'~1[|
S7f@=q
ugPQH6
n!B@%{$b
ekIF:Wa6~
gs~ch`2<j
`tt-rP
M'x4^Y
T&K<g[!QE
w[Y5+B
I+e+O _
FC9PH*
;)_CR(
-b-Q^gp
Tr_OYrNz
x|@b.a
TK#s"x
?[Mk&;@
!t^MnxC
F,_21V`
UtH'.{
`Pwzv#
j-BTcf$
#Y08mV
HrflK&|
~+f~ysT
nbj4Zl
c3Niy`
'4W!q{
,&D|ot
7lS$IG
wP7.a$3
0jJkHh
9$k}{
(%Sic
8>s<_B
Q(`;dg
$@*d|A
~(Qnfc
OyW*U\
GV\K~S
THq!q7
8^?X_kz
&?T-+.;
B{U0Y~
AC?<}N
z6l>M?
6!6bJz
exY|P,
[{Y4:g
37H8i/I&
|!spYn
<r+"LQ!1
dH@*Sb
1vk_=gFQ
(Y+\,
F\/[1|C
s*|BGY
PX|cwe
^et`9<
01fM<R
X}dMz}
Qsagqin
_0b<J2a
K~)J}:
BTPmR
!:vn4k
>_vopf
";ehYh
[fMe|-u
's3RZH8
E*$L\2
>c2J2>7
_Y,t)s
/0z<6P
KKY(c}3{F
tUr%w_*A
5'5j3v
_aXD}*
Ko,bfl
+\Qk`yms
o|Nt^B
Zd07'0
_U1}d3
o`x2Wh*EX=h7
Y/Pft?+
}&<5bP
=_?b$t
_F}>O
=V1|z/
&hIY0{
Pr--)5
G![8(L
MS10'$--y
,=%S6E
C,^/2v
v:O3,g~
}!W>NK
?sG~~S{m
=%;Qur
L0"p+V
^~9<"&0t
#5JF1?
"&qm03
|T7g5+
zPF0p5
{~+][f
zF%;}=o
h|Vi6Vy?[d
sf}[pd
T:r?aZ
1TD ..
NE?0pL
@4aFTw6
zrqiFE
Q1^|}v
%_)N;
1f;P]B
U].S{v.8x
5~7c]:
{Ze3j_C!42
R;NQcG
'\\CV
V=|=ab
84]_Q=~
ly{,A1
8mRpox
VKy>WU
Flu"{D
sZ{^`,C
>nl^M<R{
?S.d(
q<Lv$;
3.(g;c
)+dbve
3=i<A,d
5^M5{
_JjDrA
lEeF-M
{'Q~^
1Rw/S5h
n7*wsX
Y'P/:6A.
KJXX2(
>'2Z!j
Cebw{_
%~xO!p
w~?&BH
#E3*eQf
Z4:BB+
9VVrHQ
b]j(,JT:Pt{
Ci(#rV1
iS;{'l
KV0DrS
fvUlfn
y+&d0&
b3cykT
>FK+ a
(8"&4i
6?88-[
>#2s|`
=j&=4K
rp[FS`z
'1b<k`
qY|<Nv
_lEs.#V
DRxCqR
L)6T``
R&N;!P
&08Ma"
$)CP.1
bO'-Fu
Hw}]z`~| ,/Kd
';f|qL
_!\A@?j
.)Bw2l4r`
BPLC{oO
\ozBM%
-{UTN`
'37m4y
z)RTJ:
y(jyW+
FVsFZ=t
Bt!Dm
xf_.qx
>gMGT/J
M{sT1&
+t7Au9
=6M|sv
Y7X8f1
xOh^w.z
@@7C$R
H(,grd
`'1r$
x?Z~w@
V5TFG|
=p.*l5:
H4GNKs
)1$7N5X
HOh|:!
c3)V&u
.nxu9l
jii07>
t*U"_jR
);Qz|E
HI}tH7
^,G^X
~y(Y{e1m
chY0K/!
`ILtr^|
;e{!8:.
)`0'sF
ZIV^f$
%Bs-NF
Ba/mhN
Y[l,vR
\H\P"X
8[PKtG{
u]I*!g
5KUXq*
f#wYh_
UzNF\a`
s)Z,w.
Bhj{Y{
.c!mUd=
De:aN.
+&gNb%
N/22]LoR
N3O=;OM
3@au`"
kY9cHD
2E{9{wNg
%hE)g{
34^Pb2
hsj#o9)4k
ZZZ$q-Q
m\*t0m
=a<Vt6
Z!bvt/.3
]9?._Xhv
J<_`0C
Jv[C)l3
0[4#v;B
#_?7 $
l1B:U`5M
uShcGK<
}K2I#s
^FT]?.
r|k^AJ8j:@
U$d@~^
vGiO5N
N-}CU,
^=A4mq9
d0OK&r
!sc Ob
>pta<~
M.6~@_?
w{Jo3z
]nR,mw
ugRQXG
g[\`,/
QKRQ}H
Q^Lgn|
y RGe?
^NgN9b%
pn#R9Y
u@?tF(
>2eo#_
l.I3a4
2q%zj1
J*Wj#$
W1uo`g
""+U9#
rN8[oW
}@$+ve<FY
t+YID#
Wte<3UQ
c0r"aq
Nc{ZWE$k
Y|FOS(
S4m24r
ByibiLx
fA(q+E
ro$nTu
Bx6D<z
qkxnIO
zqqVF,
d6w-ZvUk
h-L4j;
{07+c4R
pzu.&8
:$6O"L~
{?|P(.
+~~D"f
/ft_@}
Jke`ol+
=1Zgse
JV|EI_K
q(BG+J
B_byNY1
i>G59b
mjjj V
X*@HD?
QA>|
VI-kA}
|~kU-[
s*qX`}kCl!Z
dLv0Lz
ir>70?#
dNm{sH
R|"LNB
47"^nTyR
)\?`Aqr2
sx `
5~O5nn
'x)lPb
.Ob5kC
t-k{NtY
7\o&Z.
\uvb=
d;baY6
ce>BU$G
]<',W{
!N@AXI
P._5Vs
[~4O}G
?Hb]vHb;n
x{'^Y\Z
-{fZ}P7/Q<
dnmqgS
"a,Xgk
+8`"e}
@fLMte
x`7fUHv
k}q7'l
E2S'<?
xlYcj&
rP7qbR3
xu?\n5
AcR)?[
<t'j6]|
<KsgJ?
l]EBq<
PMnboH
M87|#[N
#Xi!\l
*`U)rVLQ
Qkbm9~
njG1tY
e@fjJ|
_]`Q5K
gc<('7
ND5w=N+
g9i9v%^Dl(
$9A9Bi!
K~y)zQw
"Uf0yj
I^P^nt{N8
p1Bw1P5*d
w<CsVw8>
B%7@4*
{Dr<RZ
at%Flv
(XPMsb[W-
{~?C\bnZg
7QF,xT
IuFrIs
Ho*2z:
mv39*L
$}=JUr
PKiYe6
nnNpp
tS: ."
lMwM?_<a
_P2B<b
fR[n2N
m3vt0L
mz[IBL
]DN'+0
1=aER|5
}n]&Hk
X&C0t];
Qh|aB`
g2_dCC
`p]f>`9
$=1&jq
]fJVm<U,B}A
5x_p-t<
%[\/ik
+IeOTe
l9mXR]
)|I-T'5
.D2K"s
eogX{x
[~APNe
j40DHM
M"J?"#
~LeU=[
]X9=4+
rppEaQ
XnFLyt
>n;~P#
:N`dBR
E0_e&5!
u^>|Tdd
|TI]SP
0UkL_X1
1KshFX
}nX*\/
`9tPJ"
/my|X
?{wq|Vg
^i.d_,
fKH"4@
@I49bd
MOYNjA
BPUy]>
vPdctR
x[r[j
h/ymU"
m{M=&5@
sNLX~,)j
s[)x]B
):@jfo
?%7>IVL
]QKZHZ:
KuV]hd
g%*X~1n,
7J~}!7#
mY(n8<c8|bt
MG#|Ter{}deAK
L$Z SBJI
l[$y/oi
7_p\H/
:E(r%@Y
JV>NIFQ
s'@9@-
S:}ao;
hm$dUkc
XvXv[^
^g_f_e
#+3;CScs
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
MS Shell Dlg
VS_VERSION_INFO
StringFileInfo
040904b0
CompanyName
afsmeltningernes spalteplads poliske
OriginalFilename
surfrappe redigeringsprograms.exe
ProductName
afslibning cafevrten
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Makoob.4!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Generic.hc
ALYac Gen:Variant.Nemesis.32042
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Makoob.V617
K7AntiVirus Trojan ( 005b80091 )
Alibaba Trojan:Win32/Makoob.66c42d8e
K7GW Trojan ( 005b80091 )
Cybereason malicious.c0e486
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 multiple detections
APEX Malicious
Avast Win32:Evo-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Makoob.gen
BitDefender Trojan.Generic.36581224
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.Generic.36581224
Tencent Win32.Trojan.Makoob.Zimw
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Heuristic.HEUR/AGEN.1373277
DrWeb Clean
VIPRE Trojan.GenericKD.73598442
TrendMicro Trojan.Win32.GULOADER.YXEGSZ
McAfeeD ti!D9012CD07349
Trapmine Clean
FireEye Trojan.Generic.36581224
Emsisoft Trojan.GenericKD.73598442 (B)
SentinelOne Clean
GData Trojan.Generic.36581224
Jiangmin Clean
Webroot W32.Malware.Gen
Varist W32/Agent.JDG.gen!Eldorado
Avira HEUR/AGEN.1373277
Antiy-AVL Trojan/Win32.Makoob.gen
Kingsoft Win32.Trojan.Makoob.gen
Gridinsoft Trojan.Win32.Downloader.sa
Xcitium Malware@#2m8rl4zevg3cd
Arcabit Trojan.Nemesis.D7D2A
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Makoob.gen
Microsoft Trojan:Win32/GuLoader.KFDL
Google Detected
AhnLab-V3 Downloader/Win.GuLoader.C5651621
Acronis Clean
McAfee Artemis!6298475C0E48
MAX malware (ai score=81)
VBA32 Clean
Malwarebytes Trojan.Injector.NSIS
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.GULOADER.YXEGSZ
Rising Trojan.Agent/PS!8.1331B (TOPIS:E0:veGkLztBtrN)
Yandex Clean
Ikarus Trojan.NSIS.Injector
MaxSecure Clean
Fortinet NSIS/Injector.P582!tr
BitDefenderTheta Clean
AVG Win32:Evo-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Trojan:Win/Makoob.gyf
No IRMA results available.