Static | ZeroBOX

PE Compile Time

2018-06-13 04:27:54

PDB Path

c:\Projects\VS2005\ProduKey\x64\Release\ProduKey.pdb

PE Imphash

bb66491ce26787f56037d6cf12eeb987

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00013ea0 0x00014000 6.16644353748
.rdata 0x00015000 0x0000409a 0x00004200 5.2766091053
.data 0x0001a000 0x000012b8 0x00000400 0.897604626823
.pdata 0x0001c000 0x00000c24 0x00000e00 4.5194923166
.rsrc 0x0001d000 0x00003b04 0x00003c00 4.13905270973

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x0001d718 0x00000134 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_BITMAP 0x0001dd0c 0x000000d8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_BITMAP 0x0001dd0c 0x000000d8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_BITMAP 0x0001dd0c 0x000000d8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0001e1f4 0x00000128 LANG_HEBREW SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0001e1f4 0x00000128 LANG_HEBREW SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_ICON 0x0001e1f4 0x00000128 LANG_HEBREW SUBLANG_DEFAULT GLS_BINARY_LSB_FIRST
RT_MENU 0x0001eb74 0x0000020c LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MENU 0x0001eb74 0x0000020c LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0001fb78 0x000000fa LANG_HEBREW SUBLANG_DEFAULT data
RT_DIALOG 0x0001fb78 0x000000fa LANG_HEBREW SUBLANG_DEFAULT data
RT_DIALOG 0x0001fb78 0x000000fa LANG_HEBREW SUBLANG_DEFAULT data
RT_DIALOG 0x0001fb78 0x000000fa LANG_HEBREW SUBLANG_DEFAULT data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x000203bc 0x00000062 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ACCELERATOR 0x00020420 0x00000070 LANG_HEBREW SUBLANG_DEFAULT data
RT_GROUP_CURSOR 0x00020490 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US Lotus unknown worksheet or configuration, revision 0x1
RT_GROUP_ICON 0x000204c8 0x00000014 LANG_HEBREW SUBLANG_DEFAULT data
RT_GROUP_ICON 0x000204c8 0x00000014 LANG_HEBREW SUBLANG_DEFAULT data
RT_VERSION 0x000204dc 0x000002a4 LANG_HEBREW SUBLANG_DEFAULT data
RT_MANIFEST 0x00020780 0x00000382 LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with very long lines, with CRLF line terminators

Imports

Library MPR.dll:
0x140015288 WNetOpenEnumA
0x140015290 WNetCloseEnum
0x140015298 WNetEnumResourceA
Library msvcrt.dll:
0x1400155c8 _exit
0x1400155d0 _cexit
0x1400155d8 exit
0x1400155e0 _acmdln
0x1400155e8 _purecall
0x1400155f0 qsort
0x1400155f8 _strlwr
0x140015600 _itoa
0x140015608 _c_exit
0x140015610 strtoul
0x140015618 strchr
0x140015620 _memicmp
0x140015628 strcmp
0x140015630 malloc
0x140015638 ??2@YAPEAX_K@Z
0x140015640 ??3@YAXPEAX@Z
0x140015648 _strnicmp
0x140015650 _XcptFilter
0x140015658 __C_specific_handler
0x140015660 __dllonexit
0x140015668 _onexit
0x140015670 free
0x140015678 _mbsicmp
0x140015680 strrchr
0x140015688 _strcmpi
0x140015690 _stricmp
0x140015698 memcpy
0x1400156a0 strlen
0x1400156a8 atof
0x1400156b0 memcmp
0x1400156b8 atoi
0x1400156c0 memset
0x1400156c8 strcpy
0x1400156d0 strncat
0x1400156d8 sprintf
0x1400156e0 strcat
0x1400156e8 __getmainargs
0x1400156f0 _initterm
0x1400156f8 __setusermatherr
0x140015700 _commode
0x140015708 _fmode
0x140015710 __set_app_type
Library COMCTL32.dll:
0x140015058 ImageList_Create
0x140015060 CreateToolbarEx
0x140015068 None
0x140015070 ImageList_AddMasked
0x140015078 ImageList_SetImageCount
0x140015080 None
0x140015088 ImageList_ReplaceIcon
Library WS2_32.dll:
0x140015550 gethostbyname
0x140015558 WSACleanup
0x140015560 WSAStartup
0x140015568 WSAAsyncSelect
0x140015570 gethostbyaddr
0x140015578 closesocket
0x140015580 WSASetLastError
0x140015588 htons
0x140015590 WSAGetLastError
0x140015598 connect
Library KERNEL32.dll:
0x1400150e0 OpenProcess
0x1400150e8 ResumeThread
0x1400150f0 CreateThread
0x1400150f8 ExitProcess
0x140015100 GetCurrentProcessId
0x140015108 ReadProcessMemory
0x140015110 SetErrorMode
0x140015118 DeleteFileA
0x140015120 GetStdHandle
0x140015128 GetPrivateProfileIntA
0x140015130 GetStartupInfoA
0x140015138 GetModuleFileNameA
0x140015140 FindNextFileA
0x140015148 GetLastError
0x140015150 EnumResourceNamesA
0x140015160 MultiByteToWideChar
0x140015168 WriteFile
0x140015170 GetDateFormatA
0x140015178 GetWindowsDirectoryA
0x140015180 FindClose
0x140015188 GetSystemDirectoryA
0x140015190 GetTempFileNameA
0x140015198 ReadFile
0x1400151a0 FormatMessageA
0x1400151a8 LoadLibraryExA
0x1400151b0 GetDriveTypeA
0x1400151b8 WideCharToMultiByte
0x1400151c0 GetPrivateProfileStringA
0x1400151c8 Sleep
0x1400151d0 GetCurrentProcess
0x1400151d8 CompareFileTime
0x1400151e0 GetLogicalDrives
0x1400151e8 GetComputerNameA
0x1400151f0 FileTimeToLocalFileTime
0x1400151f8 FileTimeToSystemTime
0x140015200 GetProcAddress
0x140015208 LoadLibraryA
0x140015210 FreeLibrary
0x140015218 GetModuleHandleA
0x140015220 GlobalAlloc
0x140015228 GetVersionExA
0x140015230 GlobalUnlock
0x140015238 GlobalLock
0x140015240 CloseHandle
0x140015248 CreateFileA
0x140015250 GetFileSize
0x140015258 GetTempPathA
0x140015260 GetTimeFormatA
0x140015268 FindFirstFileA
0x140015270 LocalFree
0x140015278 GetFileAttributesA
Library USER32.dll:
0x1400152d8 RegisterWindowMessageA
0x1400152e0 GetMessageA
0x1400152e8 DispatchMessageA
0x1400152f0 GetWindowTextA
0x1400152f8 GetMenuItemInfoA
0x140015300 EndDeferWindowPos
0x140015308 DestroyWindow
0x140015310 CreateDialogParamA
0x140015318 DestroyMenu
0x140015320 GetDlgCtrlID
0x140015328 DialogBoxParamA
0x140015330 LoadStringA
0x140015338 GetFocus
0x140015340 KillTimer
0x140015348 TrackPopupMenu
0x140015350 BeginDeferWindowPos
0x140015358 PostQuitMessage
0x140015360 EnumChildWindows
0x140015368 SetTimer
0x140015370 IsDialogMessageA
0x140015378 DeferWindowPos
0x140015380 LoadCursorA
0x140015388 ShowWindow
0x140015390 SetCursor
0x140015398 ChildWindowFromPoint
0x1400153a0 ReleaseDC
0x1400153a8 GetDC
0x1400153b0 GetSysColorBrush
0x1400153b8 SetDlgItemTextA
0x1400153c0 GetDlgItemTextA
0x1400153c8 SetWindowTextA
0x1400153d0 SendDlgItemMessageA
0x1400153d8 GetDlgItemInt
0x1400153e0 EndDialog
0x1400153e8 GetDlgItem
0x1400153f0 CreateWindowExA
0x1400153f8 SetDlgItemInt
0x140015400 SendMessageA
0x140015408 RegisterClassA
0x140015410 UpdateWindow
0x140015418 GetSystemMetrics
0x140015420 GetWindowRect
0x140015428 PostMessageA
0x140015430 SetMenu
0x140015438 LoadAcceleratorsA
0x140015440 SetWindowPos
0x140015448 DefWindowProcA
0x140015450 TranslateAcceleratorA
0x140015458 MessageBoxA
0x140015460 GetWindowPlacement
0x140015468 LoadImageA
0x140015470 LoadIconA
0x140015478 GetWindowLongA
0x140015480 SetWindowLongA
0x140015488 InvalidateRect
0x140015490 SetFocus
0x140015498 EmptyClipboard
0x1400154a0 GetClassNameA
0x1400154a8 MoveWindow
0x1400154b0 EnableMenuItem
0x1400154b8 CloseClipboard
0x1400154c0 GetSubMenu
0x1400154c8 CheckMenuItem
0x1400154d0 GetMenuItemCount
0x1400154d8 GetClientRect
0x1400154e0 CheckMenuRadioItem
0x1400154e8 GetMenuStringA
0x1400154f0 GetCursorPos
0x1400154f8 SetClipboardData
0x140015500 ModifyMenuA
0x140015508 EnableWindow
0x140015510 GetSysColor
0x140015518 MapWindowPoints
0x140015520 GetMenu
0x140015528 GetParent
0x140015530 OpenClipboard
0x140015538 LoadMenuA
0x140015540 TranslateMessage
Library GDI32.dll:
0x140015098 GetTextExtentPoint32A
0x1400150a0 SetBkColor
0x1400150a8 GetStockObject
0x1400150b0 SetBkMode
0x1400150b8 DeleteObject
0x1400150c0 SetTextColor
0x1400150c8 GetDeviceCaps
0x1400150d0 CreateFontIndirectA
Library comdlg32.dll:
0x1400155a8 GetOpenFileNameA
0x1400155b0 FindTextA
0x1400155b8 GetSaveFileNameA
Library ADVAPI32.dll:
0x140015000 RegQueryInfoKeyA
0x140015008 RegConnectRegistryA
0x140015010 RegLoadKeyA
0x140015018 RegUnLoadKeyA
0x140015020 RegQueryValueExA
0x140015028 RegEnumValueA
0x140015030 RegOpenKeyExA
0x140015038 RegEnumKeyExA
0x140015040 RegDeleteKeyA
0x140015048 RegCloseKey
Library SHELL32.dll:
0x1400152a8 ShellExecuteA
0x1400152b0 SHGetMalloc
0x1400152b8 SHGetPathFromIDListA
0x1400152c0 SHBrowseForFolderA
0x1400152c8 ShellExecuteExA
Library ole32.dll:
0x140015720 CoInitialize
0x140015728 CoUninitialize

!This program cannot be run in DOS mode.
#RichF
`.rdata
@.data
.pdata
@.rsrc
WATAUH
0A]A\_
u#9\$P
x ATAUAVH
A^A]A\
x ATAUAWH
A_A]A\
VWATAUAVH
A^A]A\_^
H!\$ 3
VWATAUAWH
A_A]A\_^
WATAVH
D$8H!\$0H!\$(H!\$ 3
p WATAUAVAWH
A_A^A]A\_
D$8H!\$0H!\$(H!\$ 3
UVWATAUAVAWH
D9!t]A
D9!t]A
A_A^A]A\_^]
UVWATAUH
A]A\_^]
UVWATAUH
D9l$DH
A]A\_^]
@SUVWATH
A\_^][
UVWATAUAVAWH
PA_A^A]A\_^]
WATAUH
WATAWH
VWATAUAVH
A^A]A\_^
WATAUAVAWH
A_A^A]A\_
|$ ATH
WATAUH
A]A\_
x ATAUAVH
+L$DD+L$@
A^A]A\
WATAUH
0A]A\_
WATAUH
x ATAUAVH
0A^A]A\
UVWATAUAVAWH
u@< tkE
PA_A^A]A\_^]
L$DD+D$H
~ 9yP~
x ATAUAWH
A_A]A\
l$ VWATAUAVH
A^A]A\_^
t$ WATAUH
9Ypt 9YP~
UVWATAUH
@A]A\_^]
9{@~b3
x ATAUAVH
9u@~WL
A^A]A\
WATAUH
@A]A\_
{ ATAUAVH
A^A]A\
WATAUAVAWH
A_A^A]A\_
WATAUH
WATAUH
L!d$0D!d$(E
x ATAUAVH
t(L!l$0D!l$(E3
@A^A]A\
UVWATAUAVAWH
A_A^A]A\_^]
t$ WATAUH
WATAUAVAWH
A_A^A]A\_
WATAUH
0A]A\_
WATAUH
D+d$TH
l$\+t$@+l$T+\$D
VWATAUAVH
A^A]A\_^
p WATAUAVAWH
A_A^A]A\_
t$ WATAUH
x ATAUAWH
A_A]A\
WATAUAVAWH
A;KH}#I
A_A^A]A\_
x ATAUAVH
A^A]A\
@SUVWATAUAVAW
D$TD+d$H+|$l+D$LD
D+l$hD
D+\$|E3
+T$dA+
A_A^A]A\_^][
VWATAUAV
A^A]A\_^
x ATAUAVH
A^A]A\
8"u.fff
MS Sans Serif
ProduKey
%d.%d.%d.%d
BCDFGHJKMPQRTVWXY2346789
ShowGridLines
SaveFilterIndex
ShowKeys
RegistrySource
SoftwareKeyFile
Domain
RemoteComputer
RemoteFile
WinDir
AddExportHeaderLine
ShowTimeInGMT
MarkOddEvenRows
192.168.0.1
FromIPAddress
192.168.0.254
ToIPAddress
UsePing
PingTimeout
IPResolve
OfficeProductNameMode
StartRemoteRegistry
ExtractWindowsEdition
UseDefaultProductKey
AutoSizeColumnsOnLoad
BBBBB-BBBBB-BBBBB-BBBBB-BBBBB
%s (%s)
SQLPath
productid
DigitalProductID
DigitalProductId4
ProductID
%s\Registration
%s\ProductID
%s\Tools\Setup
%s\Setup
Microsoft\Microsoft SQL Server
PIDKEY
XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
InstallDir
Microsoft\VisualStudio
ProductName
ConvertToEdition
ProductNameNonQualified
Microsoft\Windows\CurrentVersion\Uninstall\%s
DisplayName
%s\Common\InstallRoot
Microsoft\Office
Wow6432Node
SerialNumber
ProductCode
Location
Autodesk
0000000001
5038647192
1456053789
2604371895
4753896210
8145962073
0319728564
7901235846
1426053789
3267408951
0000-0000-0000-0000-0000-0000
Serial
Registration
Installer
Microsoft\Windows NT\CurrentVersion
CSDVersion
PathName
CurrentBuildNumber
prodspec.ini
Product
Product Specification
Microsoft\Windows NT\CurrentVersion\DefaultProductKey
Microsoft\Windows\CurrentVersion
Microsoft\Internet Explorer\Registration
Microsoft\Exchange\Setup
Software
SeRestorePrivilege
$$PRODUCKEY_TEMP_HIVE$$
system32\config\software
system32\config
<meta http-equiv='content-type' content='text/html;charset=%s'>
<table dir="rtl"><tr><td>
<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>
</table>
comctl32.dll
InitCommonControlsEx
Error: Cannot load the common control classes.
Windows
kernel32.dll
EnumSystemFirmwareTables
GetSystemFirmwareTable
netmsg.dll
Unknown Error
%2.2X
IsWow64Process
kernel32
Error %d: %s
Iphlpapi.dll
icmp.dll
IcmpCreateFile
IcmpCloseHandle
IcmpSendEcho
caption
menu_%d
dialog_%d
strings
general
sysdatetimepick32
charset
TranslatorName
TranslatorURL
_lng.ini
%-18s: %s
%%-%d.%ds
<td bgcolor=#%s nowrap>%s
<td bgcolor=#%s>%s
&nbsp;
<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
bgcolor="%s"
<table border="1" cellpadding="5">
nowrap
<font color="%s">%s</font>
</table><p>
<item>
<%s>%s</%s>
</item>
<?xml version="1.0" encoding="ISO-8859-1" ?>
%s - %s
%s: %s
/nosort
SysListView32
/noloadsettings
/nosavereg
report.html
commdlg_FindReplace
*.htm;*.html
*.json
General
WinPos
Columns
Software\NirSoft\ProduKey
http://www.nirsoft.net/utils/product_cd_key_viewer.html
/stext
/shtml
/sverhtml
/scomma
/stabular
/sjson
/ExtractEdition
/WindowsKeys
/OfficeKeys
/IEKeys
/SQLKeys
/ExchangeKeys
/NoErrorMessage
/remote
/iprange
/remotefile
/regfile
/windir
/external
/remoteall
/remotealldomain
/savelangfile
/deleteregkey
{Unknown}
Exception %8.8X at address %16.16I64X in module %s
Registers:
EAX=%16.16I64X EBX=%16.16I64X ECX=%16.16I64X EDX=%16.16I64X
ESI=%16.16I64X EDI=%16.16I64X EBP=%16.16I64X ESP=%16.16I64X
EIP=%16.16I64X
Stack Data: %s
Code Data: %s
user32.dll
advapi32.dll
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
netapi32.dll
NetApiBufferFree
NetServerEnum
CreateToolhelp32Snapshot
Module32First
Module32Next
Process32First
Process32Next
psapi.dll
GetModuleBaseNameA
EnumProcessModules
GetModuleFileNameExA
EnumProcesses
GetModuleInformation
\systemroot
STATIC
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
CloseServiceHandle
QueryServiceConfigA
QueryServiceConfig2A
ControlService
EnumServicesStatusA
StartServiceA
QueryServiceStatus
ServicesActive
RemoteRegistry
shell32.dll
SHGetSpecialFolderPathA
http\shell\open\command
shlwapi.dll
SHAutoComplete
GetComboBoxInfo
%2.2X%2.2X%2.2X
&quot;
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html><head>%s<title>%s</title></head>
<body>
%s <h3>%s</h3>
</body></html>
size="%d"
color="#%s"
</font>
<font color="%s">
<table border="1" cellpadding="5"><tr%s>
width="%s"
<th%s>%s%s%s
</table>
c:\Projects\VS2005\ProduKey\x64\Release\ProduKey.pdb
WNetEnumResourceA
WNetCloseEnum
WNetOpenEnumA
MPR.dll
strcat
sprintf
strncat
strcpy
memset
memcmp
strlen
memcpy
_stricmp
_strcmpi
strrchr
_mbsicmp
_strnicmp
??3@YAXPEAX@Z
??2@YAPEAX_K@Z
malloc
strcmp
_memicmp
strchr
strtoul
_strlwr
_purecall
msvcrt.dll
__dllonexit
_onexit
__C_specific_handler
_XcptFilter
_c_exit
_cexit
_acmdln
__getmainargs
_initterm
__setusermatherr
_commode
_fmode
__set_app_type
ImageList_ReplaceIcon
ImageList_SetImageCount
ImageList_AddMasked
ImageList_Create
CreateToolbarEx
COMCTL32.dll
WS2_32.dll
GetDriveTypeA
WideCharToMultiByte
GetPrivateProfileStringA
GetCurrentProcess
CompareFileTime
GetLogicalDrives
GetComputerNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleHandleA
GlobalAlloc
GetVersionExA
GlobalUnlock
GlobalLock
CloseHandle
CreateFileA
GetFileSize
GetTempPathA
GetTimeFormatA
FindFirstFileA
LocalFree
GetFileAttributesA
GetLastError
GetModuleFileNameA
FindNextFileA
LoadLibraryExA
FormatMessageA
ReadFile
GetTempFileNameA
GetSystemDirectoryA
FindClose
GetWindowsDirectoryA
GetDateFormatA
WriteFile
MultiByteToWideChar
WritePrivateProfileStringA
EnumResourceNamesA
GetPrivateProfileIntA
GetStdHandle
DeleteFileA
SetErrorMode
ReadProcessMemory
GetCurrentProcessId
ExitProcess
CreateThread
ResumeThread
OpenProcess
GetStartupInfoA
KERNEL32.dll
LoadCursorA
ShowWindow
SetCursor
ChildWindowFromPoint
ReleaseDC
GetSysColorBrush
SetDlgItemTextA
GetDlgItemTextA
SetWindowTextA
SendDlgItemMessageA
GetDlgItemInt
EndDialog
GetDlgItem
CreateWindowExA
SetDlgItemInt
SendMessageA
RegisterClassA
UpdateWindow
GetSystemMetrics
GetWindowRect
PostMessageA
SetMenu
LoadAcceleratorsA
SetWindowPos
DefWindowProcA
TranslateAcceleratorA
MessageBoxA
GetWindowPlacement
LoadImageA
LoadIconA
GetWindowLongA
SetWindowLongA
InvalidateRect
SetFocus
EmptyClipboard
GetClassNameA
MoveWindow
EnableMenuItem
CloseClipboard
GetSubMenu
CheckMenuItem
GetMenuItemCount
GetClientRect
CheckMenuRadioItem
GetMenuStringA
GetCursorPos
SetClipboardData
EnableWindow
GetSysColor
MapWindowPoints
GetMenu
GetParent
OpenClipboard
LoadMenuA
ModifyMenuA
LoadStringA
DialogBoxParamA
GetDlgCtrlID
DestroyMenu
CreateDialogParamA
DestroyWindow
EnumChildWindows
GetMenuItemInfoA
GetWindowTextA
DispatchMessageA
GetMessageA
RegisterWindowMessageA
EndDeferWindowPos
GetFocus
KillTimer
TrackPopupMenu
BeginDeferWindowPos
PostQuitMessage
TranslateMessage
DeferWindowPos
IsDialogMessageA
SetTimer
USER32.dll
CreateFontIndirectA
GetDeviceCaps
SetTextColor
DeleteObject
SetBkMode
GetStockObject
SetBkColor
GetTextExtentPoint32A
GDI32.dll
GetSaveFileNameA
GetOpenFileNameA
FindTextA
comdlg32.dll
RegEnumValueA
RegConnectRegistryA
RegLoadKeyA
RegUnLoadKeyA
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
ADVAPI32.dll
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHELL32.dll
CoUninitialize
CoInitialize
ole32.dll
wwwwwp
wwwwwwwwwwwwwwwwwwww~gww
wwwwwwwwwwwwwwN
wwwwww~fww
wwwwpw~fhw
wwwwww
wwwwww
wwwwww
wwwwwwp
DDDGGG
wwwwwwww
DDDDDD
wwwwwwwwwwwp
wwwwwwwwwwwwwwwwwwwwwwww
wwwwwwwwwww(
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0" xmlns:asmv3="urn:schemas-microsoft-com:asm.v3"><dependency><dependentAssembly><assemblyIdentity type="Win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="amd64" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">
<application>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS>
</application>
</compatibility></assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
AddTrust AB1&0$
AddTrust External TTP Network1"0
AddTrust External CA Root0
050607080910Z
200530104838Z0
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object0
3http://crl.usertrust.com/AddTrustExternalCARoot.crl05
http://ocsp.usertrust.com0
9f*<Z,m
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object0
151231000000Z
190709184036Z0
Greater Manchester1
Salford1
COMODO CA Limited1*0(
!COMODO SHA-1 Time Stamping Signer0
1http://crl.usertrust.com/UTN-USERFirst-Object.crl05
http://ocsp.usertrust.com0
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object0
110824000000Z
200530104838Z0{1
Greater Manchester1
Salford1
COMODO CA Limited1!0
COMODO Code Signing CA 20
1http://crl.usertrust.com/UTN-USERFirst-Object.crl0t
1http://crt.usertrust.com/UTNAddTrustObject_CA.crt0%
http://ocsp.usertrust.com0
Greater Manchester1
Salford1
COMODO CA Limited1!0
COMODO Code Signing CA 20
140912000000Z
190912235959Z0
525831
Gush Dan1
Ramat Gan1
5 Hashoshanim st.1
Nir Sofer1
Nir Sofer0
z<%()S
https://secure.comodo.net/CPS0A
0http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
0http://crt.comodoca.com/COMODOCodeSigningCA2.crt0$
http://ocsp.comodoca.com0
support@nirsoft.net0
Greater Manchester1
Salford1
COMODO CA Limited1!0
COMODO Code Signing CA 2
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object
180612193019Z0#
Greater Manchester1
Salford1
COMODO CA Limited1#0!
COMODO RSA Code Signing CA0
160330000000Z
190630235959Z0
525831
Gush Dan1
Ramat Gan1
5 Hashoshanim st.1
Nir Sofer1
Nir Sofer0
https://secure.comodo.net/CPS0C
2http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
2http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$
http://ocsp.comodoca.com0
support@nirsoft.net0
?}Y8{O
)}"<Np
Greater Manchester1
Salford1
COMODO CA Limited1+0)
"COMODO RSA Certification Authority0
130509000000Z
280508235959Z0}1
Greater Manchester1
Salford1
COMODO CA Limited1#0!
COMODO RSA Code Signing CA0
;http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
/http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
http://ocsp.comodoca.com0
SN20s
Greater Manchester1
Salford1
COMODO CA Limited1#0!
COMODO RSA Code Signing CA
20180612193022Z
Greater Manchester1
Salford1
COMODO CA Limited1,0*
#COMODO SHA-256 Time Stamping Signer
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object0
151231000000Z
190709184036Z0
Greater Manchester1
Salford1
COMODO CA Limited1,0*
#COMODO SHA-256 Time Stamping Signer0
fO\r6{
'1Oqtn
lZGfD{
1http://crl.usertrust.com/UTN-USERFirst-Object.crl05
http://ocsp.usertrust.com0
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object
180612193022Z0+
Select S&ource
&Save Selected Items
Ctrl+S
Save All Items
Shift+Ctrl+S
&Properties
Alt+Enter
Ctrl+F
&Copy Selected Items
Ctrl+C
Copy Product &ID
Ctrl+I
Copy Product &Key
Ctrl+K
Select &All
Ctrl+A
Deselect All
Ctrl+D
Show &Grid Lines
Mark &Odd/Even Rows
Show Time In &GMT
&HTML Report - All Items
HTML R&eport - Selected Items
&Auto Size Columns
Ctrl+Plus
Auto Size Columns+Headers
Shift+Plus
&Refresh
&Options
Office Product Name Extraction Mode
Prefer the product name from Uninstall Registry key
Prefer the product name from Office Registry key
Extract Windows E&dition
Show &Windows Keys
Show &Office Keys
Show &Internet Explorer Keys
Show &SQL Server Keys
Show &Exchange Server Keys
Show Visual Studio Keys
Show Adobe Product Keys
Show Autodesk Product Keys
Load Default Product Key
Add Header Line To CSV/Tab-Delimited File
Auto Size Columns On Load
&About
&Go To ProduKey Web Page
&Run As Administrator
Ctrl+F11
Popup1
&Save Selected Items
Ctrl+S
&Copy Selected Items
Ctrl+C
Copy Product ID
Ctrl+I
Copy Product Key
Ctrl+K
HTML Report - All Items
HTML Report - Selected Items
&Auto Size Columns
Ctrl+Plus
&Properties
Alt+Enter
&Refresh
Properties
MS Sans Serif
Exception !
MS Sans Serif
Copy Exception
Continue
Terminate Application
The following application error has occurred:
If this problem persists, copy the above exception information to the clipboard, and send it to the author of this software.
Select Source
MS Shell Dlg
Load the product keys from your local computer
Load the product keys of external Windows installations from all disks currently plugged to your computer
Load the product keys from external Windows directory:
Browse...
Load the product keys from external Software Registry hive:
Browse...
Load the product keys from remote computer:
Load the product keys from remote computers specified in the following text file:
Browse...
Load the product keys from all computers in the specified domain:
Load the product keys from all computers in your local network
Load the product keys from all computers in the specified IP addresses range:
Show the computer name for every IP address
Temporarily start the remote registry service on the remote computer
Ping Options
Check every remote machine with ping before trying to connect.
Ping Timeout: (in milliseconds)
Cancel
MS Sans Serif
Translation:
%d item(s)
, %d Selected
Created by using
Select a filename to save
Product Key List
Connecting %s...
Enumerating all domainsEnumerating all computers on %s!Select external Windows directory%Select software Registry file to load
Loading... %dSelect computers list text file
Product key was not found
Text File
Tab delimited text file
Tabular Text File
HTML File - Horizontal
HTML File - Vertical
XML File
Comm-delimited text file
JSON File
Software Registry File
Computers List Text File
Product Name
Product ID
Product Key
Computer Name
Installation Folder
Service Pack
Modified Time
Build Number
Windows
Windows (BIOS OEM Key)
Internet Explorer
Office
Office 2000
Office XP
Office 2003
Office 2007
Office 2010
Office 2013
Office 2016
SQL Server
Exchange Server
Visual Studio
!Select external Windows directory
VS_VERSION_INFO
StringFileInfo
040904b0
CompanyName
NirSoft
FileDescription
Shows Windows/Office product keys stored in the Registry
FileVersion
LegalCopyright
Copyright
2005 - 2018 Nir Sofer
ProductName
ProduKey
ProductVersion
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Clean
CrowdStrike win/grayware_confidence_100% (W)
Alibaba Clean
K7GW Clean
K7AntiVirus Clean
huorong Clean
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec Clean
tehtris Clean
ESET-NOD32 a variant of Win64/PSWTool.ProductKey.A potentially unsafe
APEX Clean
Avast Clean
Cynet Clean
Kaspersky Clean
BitDefender Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Clean
Sophos Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro HackTool.Win64.PassView.A
McAfeeD ti!92392BD287C7
Trapmine Clean
CTX Clean
Emsisoft Clean
Ikarus Clean
FireEye Clean
Jiangmin Clean
Webroot Clean
Varist Clean
Avira Clean
Fortinet Clean
Antiy-AVL HackTool/Win32.ProductKey
Kingsoft Clean
Gridinsoft PUP.Win64.Presenoker.vb
Xcitium ApplicUnwnt@#2nlap14tg2gay
Arcabit Application.Nirsoft
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft HackTool:Win32/ProductKey
Google Clean
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
TACHYON Clean
VBA32 Clean
Malwarebytes HackTool.Agent.Nirsoft
Panda Clean
Zoner Clean
TrendMicro-HouseCall HackTool.Win64.PassView.A
Rising PUA.Presenoker!8.F608 (CLOUD)
Yandex Clean
SentinelOne Clean
MaxSecure Clean
GData Win64.Application.Agent.4WZIH9
AVG Clean
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.