Static | ZeroBOX

PE Compile Time

2012-02-25 04:19:54

PE Imphash

be41bf7b8cc010b614bd36bbca606973

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00006dae 0x00006e00 6.50852956314
.rdata 0x00008000 0x00002a62 0x00002c00 4.39053502099
.data 0x0000b000 0x00067ebc 0x00000200 1.43086025975
.ndata 0x00073000 0x00081000 0x00000000 0.0
.rsrc 0x000f4000 0x00003e78 0x00004000 7.37103625506
.reloc 0x000f8000 0x00000f32 0x00001000 7.90994157736

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000f67d0 0x00001128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x000f67d0 0x00001128 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x000f7b18 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x000f7b18 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x000f7b18 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x000f7b78 0x00000022 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000f7ba0 0x000002d6 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with very long lines, with no line terminators

Imports

Library KERNEL32.dll:
0x408060 SetFileTime
0x408064 CompareFileTime
0x408068 SearchPathW
0x40806c GetShortPathNameW
0x408070 GetFullPathNameW
0x408074 MoveFileW
0x40807c GetFileAttributesW
0x408080 GetLastError
0x408084 CreateDirectoryW
0x408088 SetFileAttributesW
0x40808c Sleep
0x408090 GetTickCount
0x408094 GetFileSize
0x408098 GetModuleFileNameW
0x40809c GetCurrentProcess
0x4080a0 CopyFileW
0x4080a4 ExitProcess
0x4080ac GetTempPathW
0x4080b0 GetCommandLineW
0x4080b4 SetErrorMode
0x4080b8 lstrcpynA
0x4080bc CloseHandle
0x4080c0 lstrcpynW
0x4080c4 GetDiskFreeSpaceW
0x4080c8 GlobalUnlock
0x4080cc GlobalLock
0x4080d0 CreateThread
0x4080d4 LoadLibraryW
0x4080d8 CreateProcessW
0x4080dc lstrcmpiA
0x4080e0 CreateFileW
0x4080e4 GetTempFileNameW
0x4080e8 lstrcatW
0x4080ec GetProcAddress
0x4080f0 LoadLibraryA
0x4080f4 GetModuleHandleA
0x4080f8 OpenProcess
0x4080fc lstrcpyW
0x408100 GetVersionExW
0x408104 GetSystemDirectoryW
0x408108 GetVersion
0x40810c lstrcpyA
0x408110 RemoveDirectoryW
0x408114 lstrcmpA
0x408118 lstrcmpiW
0x40811c lstrcmpW
0x408124 GlobalAlloc
0x408128 WaitForSingleObject
0x40812c GetExitCodeProcess
0x408130 GlobalFree
0x408134 GetModuleHandleW
0x408138 LoadLibraryExW
0x40813c FreeLibrary
0x408148 WideCharToMultiByte
0x40814c lstrlenA
0x408150 MulDiv
0x408154 WriteFile
0x408158 ReadFile
0x40815c MultiByteToWideChar
0x408160 SetFilePointer
0x408164 FindClose
0x408168 FindNextFileW
0x40816c FindFirstFileW
0x408170 DeleteFileW
0x408174 lstrlenW
Library USER32.dll:
0x408198 GetAsyncKeyState
0x40819c IsDlgButtonChecked
0x4081a0 ScreenToClient
0x4081a4 GetMessagePos
0x4081a8 CallWindowProcW
0x4081ac IsWindowVisible
0x4081b0 LoadBitmapW
0x4081b4 CloseClipboard
0x4081b8 SetClipboardData
0x4081bc EmptyClipboard
0x4081c0 OpenClipboard
0x4081c4 TrackPopupMenu
0x4081c8 GetWindowRect
0x4081cc AppendMenuW
0x4081d0 CreatePopupMenu
0x4081d4 GetSystemMetrics
0x4081d8 EndDialog
0x4081dc EnableMenuItem
0x4081e0 GetSystemMenu
0x4081e4 SetClassLongW
0x4081e8 IsWindowEnabled
0x4081ec SetWindowPos
0x4081f0 DialogBoxParamW
0x4081f4 CheckDlgButton
0x4081f8 CreateWindowExW
0x408200 RegisterClassW
0x408204 SetDlgItemTextW
0x408208 GetDlgItemTextW
0x40820c MessageBoxIndirectW
0x408210 CharNextA
0x408214 CharUpperW
0x408218 CharPrevW
0x40821c wvsprintfW
0x408220 DispatchMessageW
0x408224 PeekMessageW
0x408228 wsprintfA
0x40822c DestroyWindow
0x408230 CreateDialogParamW
0x408234 SetTimer
0x408238 SetWindowTextW
0x40823c PostQuitMessage
0x408240 SetForegroundWindow
0x408244 ShowWindow
0x408248 wsprintfW
0x40824c SendMessageTimeoutW
0x408250 LoadCursorW
0x408254 SetCursor
0x408258 GetWindowLongW
0x40825c GetSysColor
0x408260 CharNextW
0x408264 GetClassInfoW
0x408268 ExitWindowsEx
0x40826c IsWindow
0x408270 GetDlgItem
0x408274 SetWindowLongW
0x408278 LoadImageW
0x40827c GetDC
0x408280 EnableWindow
0x408284 InvalidateRect
0x408288 SendMessageW
0x40828c DefWindowProcW
0x408290 BeginPaint
0x408294 GetClientRect
0x408298 FillRect
0x40829c DrawTextW
0x4082a0 EndPaint
0x4082a4 FindWindowExW
Library GDI32.dll:
0x40803c SetBkColor
0x408040 GetDeviceCaps
0x408044 DeleteObject
0x408048 CreateBrushIndirect
0x40804c CreateFontIndirectW
0x408050 SetBkMode
0x408054 SetTextColor
0x408058 SelectObject
Library SHELL32.dll:
0x40817c SHBrowseForFolderW
0x408184 SHGetFileInfoW
0x408188 ShellExecuteW
0x40818c SHFileOperationW
Library ADVAPI32.dll:
0x408000 RegEnumKeyW
0x408004 RegOpenKeyExW
0x408008 RegCloseKey
0x40800c RegDeleteKeyW
0x408010 RegDeleteValueW
0x408014 RegCreateKeyExW
0x408018 RegSetValueExW
0x40801c RegQueryValueExW
0x408020 RegEnumValueW
Library COMCTL32.dll:
0x408028 ImageList_AddMasked
0x40802c ImageList_Destroy
0x408030 None
0x408034 ImageList_Create
Library ole32.dll:
0x4082bc CoTaskMemFree
0x4082c0 OleInitialize
0x4082c4 OleUninitialize
0x4082c8 CoCreateInstance
Library VERSION.dll:
0x4082b0 GetFileVersionInfoW
0x4082b4 VerQueryValueW

!This program cannot be run in DOS mode.
`.rdata
@.data
.ndata
@.reloc
PWSVh@
v#VhL2@
Instu`
softuW
NulluN
SUVWj 3
D$8PUhd
u}9-$.G
[j0Xjxf
D$$+D$
D$4+D$,P
PPPPPP
\u!f9O
v%Phd
QSUVWh
Ed+EL;E
u$9Mls
)Mh)Mlf
u$9Mls
)Mh)Mlf
u$9Mls
)Mh)Mlf
Ed+EL;E
]4;Mhr
E89E0}s
u$9Uls
-)Uh)Ul3
Ed+EL;E
)Mh)Mlf
u$9Mls
)Mh)Mlf
SHGetFolderPathW
SHFOLDER
SHAutoComplete
SHLWAPI
GetUserDefaultUILanguage
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyExW
ADVAPI32
MoveFileExW
GetDiskFreeSpaceExW
KERNEL32
[Rename]
Module32NextW
Module32FirstW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
Kernel32.DLL
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
PSAPI.DLL
MulDiv
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
SetErrorMode
lstrcpynA
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryW
CreateProcessW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcatW
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
lstrcpyW
GetVersionExW
GetSystemDirectoryW
GetVersion
lstrcpyA
RemoveDirectoryW
lstrcmpA
KERNEL32.dll
EndPaint
DrawTextW
FillRect
GetClientRect
BeginPaint
DefWindowProcW
SendMessageW
InvalidateRect
EnableWindow
LoadImageW
SetWindowLongW
GetDlgItem
IsWindow
FindWindowExW
SendMessageTimeoutW
wsprintfW
ShowWindow
SetForegroundWindow
PostQuitMessage
SetWindowTextW
SetTimer
CreateDialogParamW
DestroyWindow
ExitWindowsEx
CharNextW
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
GetClassInfoW
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
wvsprintfW
DispatchMessageW
PeekMessageW
wsprintfA
USER32.dll
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectW
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetBkColor
GDI32.dll
SHFileOperationW
ShellExecuteW
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegEnumValueW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
ADVAPI32.dll
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
COMCTL32.dll
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemFree
ole32.dll
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VERSION.dll
IDATx^
o.nnnW
446JSs
%A_~)n_~%{
,a_:;;
|K2^zY
d2wdy`
nCr>J@#
f[;i"L
Y}wxddOv~
l_u[`XpwLV
PNCUJt
=Z'm(y
+&oc1,
_nX|{PXHoJ^
y$hiiy
%34TrhS
FIZcwB6b
2-=@)<
;;%1!Al0~5
r.<,!"B
[=-rcS
_J9]FZ
RQU&5Y
:XYIP@
D3Xgcp>
F'h%xU=;:
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.5-Unicode</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
0.0;0I0]0j0
111;1D1Z1a1y1
4#464G4g4~4
5+5;5I5W5i5x5
6>6J6[6z6
797C7I7Y7|7
8,888J8e8y8
979D9L9w9
9::T:e:
;!;2;A;T;
;+<P<w<
?-?I?\?o?w?
020T0y0
1#101>1J1P1U1[1f1l1
2'2B2d2v2
4/4o4t4y4
4a5r5z5
7.7q7v7
8!808D8X8
9+9L9Z9
:-;[;c;l;
?1?<?X?t?
1 1$1(1,1014181<1@1D1H1L1P1T1X1\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<2@2D2H2l2
3"3*303I3O3r3x3
4/454=4C4H4^4f4l4
7F7M7q7x7
7Z8f8l8y8
99-9}9
:4:::Q:e:
;%;-;;;E;J;W;\;o;};
<B<R<k<
=!=2=8=c=i=p=
>=>W>a>u>z>
? ?,?2?8?>?n?
0-060?0Q0Z0`0
2!2-2L2
2!333I3
4E4R4Y4f4x4~4
6#6?6J6U6e6u6|6
7(858W8s8
9'9/959<9l9r9
:*:0:=:D:J:{:
=0>8>H>
?'?3?V?y?
<0J0Q0Y0_0z0
1:1I1Q1V1j1r1x1
2"2(2.2<2D2J2o2
3/373>3g3x3
44)4=4_4j4p4
5%595@5[5n5|5
66'6-686^6d6l6
7,7>7S7Y7o7v7|7
8 8&8,8?8I8T8Z8_8
949M9_9f9n9s9
: :>:E:P:
;$;3;];b;
<J<[<f<s<
=6>I>V>x>
>!?H?V?`?
0!0'030
1 1'1/171>1S1x1
22q2z2
3"3)3?3K3r3
3,4G4e4k4
5 5R5_5m5
7*757@7G7Y7j7
9'9Z9m9v9
;);?;D;I;O;Y;
;$<9<M<T<^<
=$=.=B=
>$>5>Y>p>
1%2B2L2
="=&=*=.=2=6=:=>=B=F=J=N=R=V=Z=^=b=f=j=
0 0$0(0`0d0h0l0p0t0x0|0
NullsoftInst,d
vz&y<p?
y'HrH+
XKCtS`0^K
U7'1j0
.!pnK]A
E>baC^
JkJnW!
B/2Meg
C\ gye
D{z:Op
`ign2+
Q_^Px$L
Xv$728
"E 9,|D{\<
t$7xh6rG
@[1P0W
@LlQjq
U4O\3M
^Y;17h0\:]u6
%db1MF&
g4>Y]{
klbP@.
jVBegA3
PFoJq+
J@+HQE
I~[BJh
&Sz;@#
"<.e9,
9/qYA1s
TgWv^:
oLh?Ie
eC{h/+
>-%|oP~?
GChhqG
G"U*F=_
I Gm^$
{Qoz-<
x"4H,bw
.8|_!{
j 8`"'
2f& p{
DLLFc$'`|
f<2`-$
D'W 6zp
o=.z+-
UA310y
0Ma[gr
@D'WU(
V^;}B
]+4Y5}
-[eIL/ ,
b1mcj&
4+.7d!y
hj8>p}
8>?1|3
n#d6fZ
`4s&a[
ckgc@m
hl*%9g
l,1*?\
7o$C'p
a7jiYJ1%B)
9~gZQa
FTBx3w
U\t&X!l
T /B"$
S^A`Bg
PF"?rDl
T`t%Bw&
%Jh8f_
is}{m`
eJLYjp1
0#mz,R
z!=!VI
?Q2L-S
(p8I2CbW
b,V_'Y
!Nzsk1
Nv~lWz
X~KtW#
Z,MR~I
mh0NFJP
mG)>$b
};{E#uG
HKh`G3m
%k-5\u
`>0FaY?
zfYZ/V?
t?O67y%
_(o8.&X
lM8XU"
Ii|`Y x
_R_!-8F*IL
PPY4LCoi
%)UCmX
6GWyMM
`..SX`
\id8aP
sDo*7m
D!_^&N
2{@)|H@Ol
'X{Gv;s
Lm1 dm
)K*Pak
n3/fPZ2
,3w~DN
^v=6y:M]
Qq(?FS
}pyvOc$`
:_][4g
@+"g5A
*^Cuk<
3638=F
G`h-w
6.3&e]
]0QGGy
".+6zd
47o),]
v<{$[fa
C<w5HrH
(d5cR
L6=gTd
0eI4,?0%
xBG@;ui
s7R-Ko{|
1Fq<-fL
.g@s,s
\rZ6Mi
u3_&8
Q5$xy}p+
KW~jAI?
E}$1s9
+5.un?
omL`n>
M;~BaY
nE~ A=q
-&Et}O
D([.x
gk1\!u9V
eoa(NH[
:^6]bl
!6'.M7^
jvjw{e
v#hd`x
Iq!vv6@
o0@(*,
Td2:h
YPId=T
Ix)u(yta
e,]e?
&S}p,M
pW!"DY
9P(LPHC
0wR[I@L
$id,[WK
w1=RLyP
Or_FBU
FNH%A;
X*LOoXg
54|KI"
U9/(Ii%
Jgnv$pD--i
uhGx5S
>?Hw|Y
z/'>:g
rxdanI
ys$%)0>
o*mvq6
Fq7c-7P
3j,`e
|kW)OF
<+pm>3
(eNMdN
vk:>(%]
Wv*$HD8
3T2ff>
MVtdQ@
Jw9;0?G
6C:=xm
dcH?dJ
)]_fA7
'wcR.0
ZrSPf\R1
(hRNsI
L3uKpT
- lG1
=;;LEu
Zz }@~"gm&
frcf(<@
v_Lg|I
/=fHj1KE
Xq]\Nw
;t9W_/
"ic&4!
q'v<~p
W5Ejdn
J;BEbv"
al@@up
uQ??9Z"
Kd$YV{
syt1*p
|C(Pmt%
A}.y[b
zyo<4h
[b5W?7J
cY1R.;6>
*EDWrEV=0b
yuIFr_
#nuP)P
{$f;c
iM-rI\
/~Im`b>k
j]_-y|5
{;L_>4u
eQKHx!
%j>iqy
h F#fWe
X#:^0|"
+#v@St
+AM8wil
Q7w8Ir
,mo#vGP
0^c&7;yNf
,p1_d?
$2u,O0a/
$_F]$h
._T4w#Of
hDL4}P
fjCQ\]%
y0FusfC]
].0#a3
<6$r"T
.UZlJ^
V;w<Ex!Vn
TT.+(o
D3\i&{
cm*6`o
_bLN[|
30F3rm
o'5*(y
T|Kv0
8e$y0^
r,<ak/
b[~UztX
T`HdC\
}^}'"Jz
mVtDSE
}-Bj7M
XeLw?A
B6|hSUP]
}-0?*edu
7IIH$-v
?=g[$k
02TbFu
oEu1GvT
`]K="C
AyVT<^
TclkUiuR
=[/BEzGG^a
#9:-<IY8J
S1B5a<
RgzEJk
SrmblO
+@H|z,^mDFV
[~^m-rM
%j{+6c#M
xsG)I
@\C]kQ
?1u>*/
!(>d(-.
1-AB*C+I
9N0H$z
CL3#VR
-GVpS
,EIz<l*
J=M1Yq`M
{Zdb@X
=7l2gh
)QZHw
)[xi\2
1Y2aTU
7'ulIv;
YEuq2p
9.%2a
Z4?/|H
?KDU'1
`:sMqf
'omBHIl
P,fC^.
!5CE_,CC
0gt(A6
!` g<(
/#K=jBKN
+9l<_^
1+0CJog
wA(QJZ>
)f7=^u
~J #(>
Ye:0Sf
lwk}i
}${[S[
Jl~XIP
Nqb|.>
f Pe~a
T#V5z|
?d8H+^d
;#%ckh
EW&mnc
X~jM@Er|
Tds"DU A
s`n+t*
KTNQf
xT@e`'
>sdxO!
p*vc}jyP$J
7Rl_I
<I8o)g
OlOos!
(x4#50\
y~x7I-
R>j]Rg*
JDIow03X
gf|ozGgds'A
kg4Ke~
zk!09~"
wYg]]#
t~Zw@F
FJYN]a
gd0m[
2"(qiQ
(gm^Wy?d
e"n:O6
C4-E:z
j9H$8-
~v{"hn
R>Q o%
m{}9sQO
8-OoI[6\
.DaW5/
xwj}!^
9)?q2_
XBY|m'~
"hh1eC_
3FER11w
gLSWP'9
`Xub?<
Z^1,UE
Gt-]hV
/B_f3%
'Lq,;p
Z|/ \uo
Dng_w._
szKOhlB
QsBJpZ
`NAtNW
J{sf!g
`6m'zS
x<u~b]
U6Y]Hj
#94P.C
`B~.f3p
+jD!6N
L#3qc/
\6UM<
sB9!5H
qWiY_"
ibsnR"
3"bJ7:
:LPeU 9
I.BU^~
.h}:EYN
v&%%|s
IKc+G.4LU
sMdhF(
!&= mc
s;.+O6
e9CX*6
+fVb^
Jv)BcCRFVG
PwAUW<
zwiWM
5cK7DZ
k{p=,e]
!_LOg?!wm
f{GEKH
"jZ;`lZ
)i7W{
"N:LAv
W15Q73
a?_G}T
"hdvv7
jx@}Pq
{/[QS.
`3Mi7?Ds
Ha{4=j
1tSOci
2Y$b6#N
N},@Yj
eU8iJ
{AykcX
sw^y61d
< !qcb
@`$#:=t
%e{J,M
Jw~FYFEE
|c}Y(Z6
dl<@nH
anv&03GH
:O\p@
ojScJx
j)@%1#
UkvT?*
8ur:%*
TQ0jm@
j};|l7
(mf<$t
txu{bj'6
N&co.Q[
==~t@U
?/!'!a
V8!-sN
y,W4f\Q
`Nqn@j
nd6-qe
4~42^c)
te/7,^
pZq4&]#r
_4PPR1JF-5
Mn(^ek
HcP_VC4
3!}/I9
d%|3n<
VqT:;'
xZ2*E(
Y5_'QXl
{oL/uz
K/Q;5g
8S,X##s<
`B9] >%"8
j$GZ".
'aEc0G
@VbC(t
:AX*:0
p#o j$M
ROS/@g
7{9HKY
YE_*ey
^!KY=n^
GXZkWM
I}KMw9
Usolk[\6s
PKd7<(jm
ds.)"I
iB /T=
}4}B_'
Le2(09
\@T/aH
Ej;LmW
d=%?@~
8oiWsX`
&K';1>T=
^w}7#A4
isJn!1
6WF-|Du
{]1baQ&
-DV!Hg
O@ `%J
GcrIHl
D>S(]1
P6qaXM
CV;h-sv
`}"@AF
C=n"~$g
|sZL9Dx8W"
q&(D-\
Q/.HE
7Q_=35
aI_@l
vB3qeY
Bo:Gd{KU
_(H"[F
aZcVK$c
~`'0%M
,tS5*;
ud/nW)9
1ceYQM?
OE,Og3
h.MwXI
*RT,IU
0)y`&!
Q:4?_1
"&ktM:ji
. 95x?
\[wGQY
9|#9[>$x}A
x0*"`L
2ZYr<q
Kz&.#F
z9uON(?
pe;,f3
S6 3&3X
Q{@Oc4
"C!8"4
ivAe>v
Gbd"w|`
0:g:JT
hNCCf[
i$3Fj
**OO1^wyN
0.GMuA
lC>q%4
JkAMDR
,IVj]~eX
HLMI&0'(
*_n?q)
|q<pez6
6Rfol:
w}Tm>fB
]!pk Y
-uFq'@U
f;HEJE
>JVqB_V(
)#1fg'1X
BD}#c+
!,@Ki +
M!*Wiv_
GOW)3|
F|$^!8nk
$)S.Fg
|JRCb^
e,IHK*O1
Hf>$XZ
&oFqLpFd
M;+2Kk:
|_*-L&
T&\($LW
.>f%ptA
3HDD_S
\ 4BN7!hV
qECLH{
"8i*D>+
9PO|U;
5AtDrR
AVUHf
Z:2Nnu
-Xk6Hy
+m|$:-#
Ry.V;s
%)t9G7
J,}=|_
MGI:qi
3IcN_?#
HK_dD00
ksYaNE
[ZybISs
Iq$oMsbd
3P`]R.S
.=7AN+
U<U&Hz5wJe
^o_,*H
*G=yVG)
,[25!8
BK%)oFN
<J{kD*w*
4z*mfs}(
L"HNpv
_QFjHT*K
vGEMR"
LBHcF0m
BF^*vY
Wc=?o6
m.VOi#X
-_HvT0Q
>){G!w
}p&`#cU
l/7:ts
uGT[uh
fK1m82
h!v#S{
c.ra-:=A
(u=po*
}^6EuH
oX_eA
v~eLRf
3]O 4k4
}K/.yg
y,FGUG
1Z1r8i
xYu1GptF
Hx;;)fa6
mb1l(N
}`;>G,Z
*OX'\
.C^{4@
3|1e^I
za>(;61Oy9\g
6P]hTYA
cor#s!u
Q!Or.'
?a$x8%
&2wn^ez
*lue"+
1 %"C_uA
$t?%9p
u!DS/X
EQ7!TY
'b<f{s
evKE]=
E]MVlwU
3So*{{
uYRU,7-m
u(HYTL5c#+
VG7boT[
a4iG~v8gPk
2M<ZG"z
>jE jLd|>
'T0<l3
NuWcKP
,J.|%LYb
0S5myp
UB>RcE
d_+A2mn
$%O>%s
E#AilX<6
N7A/wZ
+{w>,L
[Xw?rd
{y]4Q=B
/@'80kX|J
3})?M}F
SzuI^]
AN=EN5
#`1B-f
|bMS_T
bu].YS^
'bKUAm+EK|
;da3|GL
S~&)R'
)q_zXz
C8C`u,
Dsxwbj_^
#ts>vnSaVqW
}BY)Vv
-@@F(9
KyYhBli
=cL#IR
b,\Gsa
&Yt`Gz
nr{~cw
@-aua4
za{Y'{^I
CBL/'<
fPxet
vil470
W'|+i
fRx{}o
}p~_LD
9DVV6k
4N')ZL
eX~G+L
x+O?EC
?dWuxxvIU
|NzN*=
03D^Cx
K?z aPi^'
&%A6pA{P
w)g*q0E
!lg6=>
~15wvM
-ltU=@#+
)zne}<
sly#>!
g0y]u|]I1
o0iX.?%
>=51q>
qRp(vP&
yLFO#F+
5*:P|c4
|^0@!&7P
IvU[R/L
fJCIo#
jLZPc]
_cn`-
^]U\qI
2z-6Ja:
j1$.6o
>$m&;
k@QcJ0.
1~2& x
p:M{q^{[H
0/+T%G
iR]1p-?XI
y7`{Vc
;xR*$Zx
K/J!VcmG
n+=(!mv
>#_R%h
3tu?Xr
~d; x`
%bvC7dk#
*#l`6p6
z-8wbT
xfNcuX
pb: x6.
Y"_B*_
UIt~nY
,atLpvRY!w
.%bU<H
e(Ayr~z
Lt9Kt^M
wQR)54X
4X1-i#
Y7mRD.
vB,Ke_B
g?pQ3`
jqXofO
g'DCV<
eH\;n8
25]=kH'
>YtLm,(
OeGr:3
;CyF.l
:hyKD.
YI0F)
0%Av~xL
y\jn37GO2
8&`vao/
RWNtXcu
~f_L:@
,f"9=
XWv1[\`
m]g_2K
*<SiWQN
_;XSY7^
TP5Z)(e
0B]xg$[_&
wu<YV'
eF:vEA
,iw@DG5'^
$Ogte>
i]zwX
rrJv}{
\w1f{*
{^u%Bu
% g1U-
Sp,0^#
KiuBjN
RjPBJwNs
f7$95,
2U87:Y
Fe'WpF
M@j,u8
2Tk0D
8Su/4x
JMWmr~
<OPhz[
K::I'M
gs8q^D
wd,{f
ARx`xLl
o>R2])"
S>EX-W
:vW,<b
Lwu*6>
?cP:hI
E%.3gE
dov+,}
jkUim=i8
Ptc7\s
i/5`U~
$GjX/#f
nr7n\,
j.v~7+Z
@]aCtj7[$
wK1:O@
lNybP\
Z)JA}`7
{]XCsR
d7>Pm'
r0!Q`{
?,6O5{6
*1hE"x
j:Ewt
M,T=e)
Vtz*txx
`{7uY|,
%m2#<i,
ijR2Ng=
2sX4:AN
siD$GA
U7-OsW
x'^HVQ
'3hKm5
)aUyp*T
?j!BR?
vdG\x
{)OFEp
#Gky<?MSrO
^>q<D1
mHC@wE_X
4~%t6#
u>29/9E
d#5/5Ml
G> i)
"T0+^#
Au{r,n
[/6}QD
8zPjCA.I
4O\cSp
Djt^;J
kYof}Sl
#z&.1LR
+xj[]'
/wTt3s
Ev}1~W
3.%kg5
C![^a;](
NLxa%9
_L}-}<
q8Wk=w
"OqrqG
a3P!uG
\t.=iY>
3d}Zn7J^8
9'N|ri
Jt:]x0
?I>9yp
eBJBh`x
Wefb5<
e:ja_k
l)J%dn
lW{D`8
/d,8D}
|=WkN2
$Xfe>'
Tez*9d\
-TiEyF
BPJh\c
;^SZa>) bb
A%ai*z
t`zRxJ_
7ZjpH,
6&\-I+
PVugiv<
9n.NOT*
Lnd8-d
2h4/ji
fB,O1&
xrvd^(}^
~qr0]p
_m)H}m
*c, 'pQ`
Iv1R;[uy:
Kf|/&3
K?.5w
@r@6{X
nO78\E_~$
3t{j[WI
>#Z6Ux
!s1Gi{
%,=zW_
FM&I4B
VGUu|N
cp>K:
C;5m ~
yVK0[:
-G49S;
vfT|rxTO
)+!JuSa{
"[CkB*/
2!"7x(
;LmJjg
~oOTraY(-
E|$>#nH~:
EW{')s
p-GvB@0U
'|%OY>
5_;|g~P
MjBign
`]2Abz
8/if-9
wzA^NP=Yb1F1
e3[C0m
9sryV5
6y8lGyR
O0kp _
eB\n~6}
[.heGM~C|
tav;:E
H.tO~
K*t:3?|\
tB$H+?
V~(H}>
-\',kX
\%^uAPd#
</"XXf
/NH~ Wk
kHno8Q
HQv\Mw
,oB~Go$
Rp#lJ+
%J~0i[
=Zt1BI
%^]z'9
ssLF#V
JCB9c-
6VhZMq
`v<;G
'o7j19
altiNM
$>n_4TV
Pz"n;.
Gs-*}f
vlnaC|
^G[;^T
UC>#&n
b;V9( K
,32VeA:zN
B#<L>&
kLx{PF
N<<`q}
L,*?2?
tD<daSe
A# r]o
P7X(=g=fY
v}'C=0S
V;(/|#n
n6Y(E<6w
q'exuK
bET%3hS!
Zlg(Wm7YX
tvr;),N
UP(G@/=
T=A&R|"
h+TS8;
&[2ADD
G3zh}fw
h1NR3<
;2.[qoy6M
z~)cZL
D2Rqh;
>-/c@8>
rpnB7Q]
WxU9&
VPs[H-xR
pf3zyM2Vv
q'\^)S@
z?V*%>Q
="@c6H
MZ4@kM
:rfqm}
/Pd_wV
Zup_M5
gGMLMn
lLL*5woh1
o><=WC3~
,n=:Jn
Eo[RE>knp
&qY|
=0]yp13
q5=jRX6
%(<Mt5
3i/J;N
NOf/#u
Q~2]!F
yn`[J2
:fe3`*r
X',5!E;
|f}*8x
}<:>&&&Z
FGdW[U
Zr?%TE
^zw1D'
MM`j=|4_
v)Y2v*<
`nxayE
Kk`4z_K
F!I%+-
uzer'(
QnPsuUQ
MU!LL
4[:U,sO}^
He=mp5
RD9T7
///%m5
CpdN'{
mkz[/8
6TDpk-
S[Eh74
GT6<*<r
igZov$v\
ouFWRZm,
<]:W58
cG2)Uzb
Bt4O|q-
vg*suAE
;o,X"S0
+<fPJJ
%BvU%E"=
wg.>H@#
Z XEQ
nQ~Z[A
nf.!L,:
Aq9}VQt]QQ
U`PFu|
^(+q|g
*Lpb6Q`=
]y-A'_
!hs&`J
j|P)xC
Hs(}dU
:7%uiQ
E^f6p/VoO4
{%IFqADpN
'3j}jo<
~GXJN
F2gQr$
>=GrYo
"JW=2c
sW2&<*:q\
2tP@#l
*/4(m'
`<Ed bc
a>ulPC
B(GyV]
Nem)3e
ab'}d@
Fgr"CC
k3ytnP
fWB)-Q
c7u?'-
a4~Vxj
|k~](hS
O=Fz{3`
k!\H:T
%adr`
fwm]>6
~E)q&BNF
*V!Re4
jcZS)H
rNcwIm
#a?"E*Q~<
XH,v;e
zPwE}m8
7LuQd:
=1uvHLbT8
5wB_Ti}k
Ey,_9j
IB8qbS>
(g|&zI
_D?SC?]
VBkPa^K
BLxh^J
PCJ)sQ
JXJ?AT
[L71=3b
On0GOe
`^$_lL
;WI[&<a{>Osh_F
n')2./
Bo~g?q
ct>X.q`I
93SHU`
2E6+V[x
GaJ].{-
.; m.
5E$H?`
kK5G^@
Cd>J%W
1C0hAn+.
QTnLKFe
?`\no71
lt@YEr
]jHyEz
$J,|2_
] IJYwm#
~(;FH*
}jVeKy
Hgr8`jL#
bT\BEu
$?:s_T.
mY*Z`-
DoZV`?
"|2" }F
"+7T]@o
WkAC09P
jwUi0/"=U^Z
R^IL6>
_!6e"/
2(!M|[
&Jv-Wk
<cpNPgS
_RAv9S0
5=ztXu!
wG[9n&
y7x4r
!tu%i"w
XhSycB
{tnPF|f
7gSWf!$
t+:ju4
CsLz2w
/venyx0
cg^Fig
*8[*#m
_GE-b7
i[\Y6c
MV%%4j"
Z&:qaT
Jj+kHy:
oBX46
x?:7`ez
k[<OU3
,wwFjMRcq
>KQu"Kz,
apP?KZ8
}5`>G$
~/AAD|
L0utaGs
,+Jlkl
fKi !8
;ueeDK
qR'~v
p{gWFwg
+cc\1Q
4)qmJ|
0=V{Td
}9?*<4q
Q=_iz.
_WG@x?
s,;F.@i
5ug~UC
HA%du*
7;Ejx/K
a'8tVz
[v:a*k
pI@sB&X
;wlL"n
&#+%P{al
k#6N~F
Pw2+H7}
tyly!g}
nXt$V
bw-N&CV
v%,[<7
Yy1T.E
_<J,%Wtm
>2p2QH
)d=z=X
0Zt[->
jl,ki}
$%{njk
2uR{.55
jw-D^J
'1Ql7:
W#K},N
Bv?eA.
!;ThU&
a$Eu$P=
]3D_yW^
1TVO`p
f1bU[Q{
IIeGV/9
Ka>q#Q
I;5Kl:
W>iMI`}
"(+Lp1O)j
}I8(f
q6Nj N0p
9n[/ISs
uHo3e\
UBa}{L8Q
LLw7Y,
OK6:^T
jv%@*c
9p*Om?
'|{pw%
V9$2#=WV
w@Ioi1
gRR+Dk
&d0KNu
da1]g&
X-CbjC
Kc='OH
$u#{e&
|NlnVd
V_z_s+
B[EL@#U
s@r>^$
htK*6Pc
a5C$am
?6OQwN
te/QX|
2F7u]C
wVCUv
l"IgI
A9DpIM$1
;d"bXL
[fqTL@[
5{j5nX
mDm3DrO5
BT}@-2
WqIURX
{qU.I'
'=uk$G
yN0H^y9
{_p;b[
^vQQ_Iaum
))z5/L
/O|=|y
+!i,+4
RjE!/,
w[gs{W
ZY0u~A}%
Zz@em:
?u:h$O
dl;E{O
6i2$6u
)C`K!L
%}S.fyk
8",/Udg
nqoR(N
/C'uU|r<
*)8*|3
h/c`2{
J"rpBBS
edY`XY,
hSEtGR
,)~v`Y
LT\CzM
|$\]z
~anNN9v
I^]4r2
:9%dE)
JnQ;*)
:7ksIty
0;19`.
wI/pg
?rw?oJ
`+]BLI
VVaF@Ab
ll{*Td4
Zn"1yG
ljnmGo
UZ()$"
Bt.3iy
A"uI*f
klD|-$<
`sNZly
7@jWE
)\ZNk..X
/v0M9*
zTB\w6*
Q=&]uT>
,h8)PH
DjEy*3L
=\gYo@q
PCY0i3N
'":].b'
5,0xWm=q
;WV0&c"
[MH!g0iP
Gr@0-#
eOsIi2
sq2mn<
$hdDmd
4 UQZ#
yTIvk*
])9=^
Yr?!&=
z>b7CL
a_vYFPx
gT9!9D
$whUmE
3ORvTF
mpXF`I
J'K&aC
8fG9yy
#~,$W[\
t5XurX6
\e5'*~
\*ed$3}
GOyL9ExH
N;$bOS1
,LS{7Eqseh
&]na_g
@ $E%\
5'))A9M
H7g_J
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
240424202026Z
250419202026Z0r1
Washington1
Redmond1
Microsoft Corporation1
Skype Software Sarl0
3w>N0E
Microsoft Corporation1
230254+5022070
Chttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20110
110708205909Z
260708210909Z0~1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
Ihttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^
Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
3http://www.microsoft.com/pkiops/docs/primarycps.htm0@
*?*kXIc
QEX82q'
WqVNHE
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 2011
http://www.microsoft.com0
KTaNQqy
20240702154457.599Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:86DF-4BBC-93351%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
231012190709Z
250110190709Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:86DF-4BBC-93351%0#
Microsoft Time-Stamp Service0
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
"ua4M`b
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:86DF-4BBC-93351%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20240702230336Z
20240703230336Z0t0:
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
H7g_J
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
240424202026Z
250419202026Z0r1
Washington1
Redmond1
Microsoft Corporation1
Skype Software Sarl0
3w>N0E
Microsoft Corporation1
230254+5022070
Chttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20110
110708205909Z
260708210909Z0~1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
Ihttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^
Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
3http://www.microsoft.com/pkiops/docs/primarycps.htm0@
*?*kXIc
QEX82q'
WqVNHE
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 2011
http://www.microsoft.com0
KTaNQqy
20240702154457.599Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:86DF-4BBC-93351%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
231012190709Z
250110190709Z0
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:86DF-4BBC-93351%0#
Microsoft Time-Stamp Service0
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
"ua4M`b
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1-0+
$Microsoft Ireland Operations Limited1&0$
Thales TSS ESN:86DF-4BBC-93351%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20240702230336Z
20240703230336Z0t0:
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0x%08x"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not initialize OLE
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")
Exec: success ("%s")
Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")
ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
HideWindow
Pop: stack empty
Exch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: error, user cancel
File: skipped: "%s" (overwriteflag=%d)
File: error, user abort
File: error, user retry
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes failed.
SetFileAttributes: "%s":%08X
BringToFront
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
... %d%%
Installer integrity check has failed. Common causes include
incomplete download and damaged media. Contact the
installer's author to obtain a new copy.
More information at:
http://nsis.sf.net/NSIS_Error
Error launching installer
SeShutdownPrivilege
~nsu.tmp
NSIS Error
Error writing temporary file. Make sure your temp folder is valid.
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
RichEdit
RichEdit20A
RichEd32
RichEd20
.DEFAULT\Control Panel\International
Control Panel\Desktop\ResourceLocale
Software\Microsoft\Windows\CurrentVersion
\Microsoft\Internet Explorer\Quick Launch
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
%02x%c
Unknown
RMDir: RemoveDirectory failed("%s")
RMDir: RemoveDirectory on Reboot("%s")
RMDir: RemoveDirectory("%s")
RMDir: RemoveDirectory invalid input("%s")
Delete: DeleteFile failed("%s")
Delete: DeleteFile on Reboot("%s")
Delete: DeleteFile("%s")
%s: failed opening file "%s"
GetTTFNameString
Version
MS Shell Dlg
MS Shell Dlg
msctls_progress32
SysListView32
MS Shell Dlg
Legal_policy_statement
Microsof
Legal_policy_statement
Microsof
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Agent.Y!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Clean
Cylance Clean
Zillya Clean
Sangfor Backdoor.Win32.Agent.Vpdq
K7AntiVirus Clean
Alibaba Clean
K7GW Clean
Cybereason Clean
huorong Trojan/Runner.az
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic Clean
ESET-NOD32 NSIS/Runner.T
APEX Clean
Avast Win32:Malware-gen
Cynet Malicious (score: 99)
Kaspersky HEUR:Backdoor.Win32.Agent.gen
BitDefender Trojan.GenericKD.73721802
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.73721802
Tencent Clean
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Backdoor.BDS/Agent.cxwkx
DrWeb Clean
VIPRE Trojan.GenericKD.73721802
TrendMicro Clean
McAfeeD ti!151247E9379A
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.1b0fe9739ef19752
Emsisoft Trojan.GenericKD.73721802 (B)
Ikarus Clean
Jiangmin Clean
Webroot W32.Malware.Gen
Varist Clean
Avira BDS/Agent.cxwkx
Antiy-AVL Clean
Kingsoft Win32.Hack.Agent.gen
Gridinsoft Spy.Win32.Vidar.tr
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.Win32.Agent.gen
GData Trojan.GenericKD.73721802
Google Clean
AhnLab-V3 Clean
Acronis Clean
BitDefenderTheta Clean
MAX malware (ai score=81)
VBA32 Clean
Malwarebytes Malware.AI.2749111198
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Trojan.Autorun/NSIS!1.FF89 (CLASSIC)
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet Clean
AVG Win32:Malware-gen
DeepInstinct MALICIOUS
CrowdStrike win/grayware_confidence_60% (W)
alibabacloud Clean
No IRMA results available.