Static | ZeroBOX

PE Compile Time

2020-12-02 03:00:55

PDB Path

D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

PE Imphash

fcf1390e9ce472c7270447fc5c61a0c1

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000310ea 0x00031200 6.70807539634
.rdata 0x00033000 0x0000a612 0x0000a800 5.22174270925
.data 0x0003e000 0x00023728 0x00001000 3.70881866699
.didat 0x00062000 0x00000188 0x00000200 3.2982538068
.rsrc 0x00063000 0x0000e714 0x0000e800 4.24251079311
.reloc 0x00072000 0x00002268 0x00002400 6.55486201017

Resources

Name Offset Size Language Sub-language File type
PNG 0x0006418c 0x000015a9 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced
PNG 0x0006418c 0x000015a9 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced
RT_ICON 0x0006bc98 0x00004228 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_ICON 0x0006bc98 0x00004228 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_ICON 0x0006bc98 0x00004228 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_ICON 0x0006bc98 0x00004228 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_ICON 0x0006bc98 0x00004228 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_ICON 0x0006bc98 0x00004228 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_ICON 0x0006bc98 0x00004228 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_DIALOG 0x000705c8 0x000001e6 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_DIALOG 0x000705c8 0x000001e6 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_DIALOG 0x000705c8 0x000001e6 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_DIALOG 0x000705c8 0x000001e6 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_DIALOG 0x000705c8 0x000001e6 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_DIALOG 0x000705c8 0x000001e6 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_STRING 0x00070ee0 0x00000078 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED data
RT_GROUP_ICON 0x00070f58 0x00000068 LANG_NEUTRAL SUBLANG_DEFAULT data
RT_MANIFEST 0x00070fc0 0x00000753 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED XML 1.0 document, ASCII text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x433000 GetLastError
0x433004 SetLastError
0x433008 FormatMessageW
0x43300c GetCurrentProcess
0x433010 DeviceIoControl
0x433014 SetFileTime
0x433018 CloseHandle
0x43301c CreateDirectoryW
0x433020 RemoveDirectoryW
0x433024 CreateFileW
0x433028 DeleteFileW
0x43302c CreateHardLinkW
0x433030 GetShortPathNameW
0x433034 GetLongPathNameW
0x433038 MoveFileW
0x43303c GetFileType
0x433040 GetStdHandle
0x433044 WriteFile
0x433048 ReadFile
0x43304c FlushFileBuffers
0x433050 SetEndOfFile
0x433054 SetFilePointer
0x433058 SetFileAttributesW
0x43305c GetFileAttributesW
0x433060 FindClose
0x433064 FindFirstFileW
0x433068 FindNextFileW
0x43306c GetVersionExW
0x433074 GetFullPathNameW
0x433078 FoldStringW
0x43307c GetModuleFileNameW
0x433080 GetModuleHandleW
0x433084 FindResourceW
0x433088 FreeLibrary
0x43308c GetProcAddress
0x433090 GetCurrentProcessId
0x433094 ExitProcess
0x43309c Sleep
0x4330a0 LoadLibraryW
0x4330a4 GetSystemDirectoryW
0x4330a8 CompareStringW
0x4330ac AllocConsole
0x4330b0 FreeConsole
0x4330b4 AttachConsole
0x4330b8 WriteConsoleW
0x4330c0 CreateThread
0x4330c4 SetThreadPriority
0x4330d8 SetEvent
0x4330dc ResetEvent
0x4330e0 ReleaseSemaphore
0x4330e4 WaitForSingleObject
0x4330e8 CreateEventW
0x4330ec CreateSemaphoreW
0x4330f0 GetSystemTime
0x43310c GetCPInfo
0x433110 IsDBCSLeadByte
0x433114 MultiByteToWideChar
0x433118 WideCharToMultiByte
0x43311c GlobalAlloc
0x433120 LockResource
0x433124 GlobalLock
0x433128 GlobalUnlock
0x43312c GlobalFree
0x433130 LoadResource
0x433134 SizeofResource
0x43313c GetExitCodeProcess
0x433140 GetLocalTime
0x433144 GetTickCount
0x433148 MapViewOfFile
0x43314c UnmapViewOfFile
0x433150 CreateFileMappingW
0x433154 OpenFileMappingW
0x433158 GetCommandLineW
0x433164 GetTempPathW
0x433168 MoveFileExW
0x43316c GetLocaleInfoW
0x433170 GetTimeFormatW
0x433174 GetDateFormatW
0x433178 GetNumberFormatW
0x43317c SetFilePointerEx
0x433180 GetConsoleMode
0x433184 GetConsoleCP
0x433188 HeapSize
0x43318c SetStdHandle
0x433190 GetProcessHeap
0x433194 RaiseException
0x433198 GetSystemInfo
0x43319c VirtualProtect
0x4331a0 VirtualQuery
0x4331a4 LoadLibraryExA
0x4331ac IsDebuggerPresent
0x4331b8 GetStartupInfoW
0x4331c0 GetCurrentThreadId
0x4331c8 InitializeSListHead
0x4331cc TerminateProcess
0x4331d0 RtlUnwind
0x4331d4 EncodePointer
0x4331dc TlsAlloc
0x4331e0 TlsGetValue
0x4331e4 TlsSetValue
0x4331e8 TlsFree
0x4331ec LoadLibraryExW
0x4331f4 GetModuleHandleExW
0x4331f8 GetModuleFileNameA
0x4331fc GetACP
0x433200 HeapFree
0x433204 HeapAlloc
0x433208 HeapReAlloc
0x43320c GetStringTypeW
0x433210 LCMapStringW
0x433214 FindFirstFileExA
0x433218 FindNextFileA
0x43321c IsValidCodePage
0x433220 GetOEMCP
0x433224 GetCommandLineA
0x433230 DecodePointer
Library gdiplus.dll:
0x433238 GdiplusShutdown
0x43323c GdiplusStartup
0x43324c GdipDisposeImage
0x433250 GdipCloneImage
0x433254 GdipFree
0x433258 GdipAlloc

!This program cannot be run in DOS mode.
`.rdata
@.data
.didat
@.reloc
f90tCSj\Zj_[f9
t,PhT6C
v'Ph\6C
~(h06C
C$PPu^h
t(Ph@6C
E`_^[d
\$ +|$ !t$
T$$9t$
t,j.Xj\f
_^][YY
u'SSSS
UVWj@_;
ulWj@X;
l$$VW3
uUf9.u
u&hh7C
QQSUVW
f9t^j.
_^][YY
t:j_[f9^
u*8W_t
C$Pu8h
jPXf9E
_^][YY
9\$$vN
tOhT8C
j\Zf9TF
f9u)f9_
j.[]f9
WVj\^f97uMf9w
v9Uj.]
t=j ]f;
1j\Yf9
_^][YY
f9.t[S
uDj0]j.Z;
|$,;|$8
L$,;L$8
_^][YY
W9u tp
9~,v'S
YY;~,r
jPhX9C
SVWj\XP
YY9^,v
Aj Xf9
D$`jPP
L$4+L$,
t$8A+t$0
t$DVSj
jd^+L$4
|$,Pjd
D$H3E$3u
3T$\3t$`3\$d3D$h
D$$3L$,
|$Xj8[
?vUUj@^+
vzj@[+
t9Uj@]+
\$|AUV3
PSSSSSSh
SUVWh`;C
tdht;C
D$( <C
D$,8<C
D$0P<C
D$4l<C
D$8|<C
D$X4=C
D$\D=C
D$``=C
D$dx=C
rfh8<C
u'h(BC
L$$+D$
9t$ vL
_^][YY
QQSUVW
_^][YY
D$$SUV
!N|+F|#
s2;V|t-
to9.uk
t$09KP
D$(PtW
t$0;sP
L$09KPvG
s?;N|t:
T$$;l$
;L$ |3;
s2;N|t-
F|9\$$sP
t`f9+tN
D$(PjE
tMSh,TC
VWh,TC
tJ9o uE9o
V,]^[Y
ZuDf9V
,__f9~
v&j Yf;
tSf;L$
D$,+D$$PV
tJ9s uE9s
VQhLTC
][_^YY
D$,UPj
@PWhlTC
N Wh|TC
D$`XWWf
$SUVWj
t;VWj\_
EZ;l$(
UUh|PC
t$,SVW
f98t=V
D$$PUh
D$$PUV
.u'f9O
PShtRC
Yj\Yf9
YYj"[f9
tfj"]f9+u
f9(tSVWS
Uj"]f;
Cf9,Ft
tGWSSVU
D$|Ph4PC
D$0hHPC
QQSVWd
URPQQh@0B
;t$,v-
UQPXY]Y[
Tt1jhZ;
^$+^8+
t0jXXf
~$+~8+
F2jgYf;
u0jAXf;
u0jAXf;
Wj0XPV
PPPPPWS
PP9E u:PPVWP
TVhXsC
WWWPWS
u-PWWS
SSVWh
f9:t!V
QQSWj0j@
PPPPPPPP
*messages***
CryptProtectMemory
CryptUnprotectMemory
xlistpos
SetDllDirectoryW
SetDefaultDllDirectories
Unknown exception
bad allocation
s:IDS_BROWSETITLE
s:IDS_CMDEXTRACTING
s:IDS_SKIPPING
s:IDS_UNEXPEOF
s:IDS_FILEHEADERBROKEN
s:IDS_HEADERBROKEN
s:IDS_MAINHEADERBROKEN
s:IDS_CMTHEADERBROKEN
s:IDS_CMTBROKEN
s:IDS_OUTOFMEMORYERROR
s:IDS_UNKNOWNMETHOD
s:IDS_CANNOTOPEN
s:IDS_CANNOTCREATE
s:IDS_CANNOTMKDIR
s:IDS_ENCRCRCFAILED
s:IDS_EXTRCRCFAILED
s:IDS_PACKEDDATACRCFAILED
s:IDS_WRITEERROR
s:IDS_READERROR
s:IDS_CLOSEERROR
s:IDS_CANNOTFINDVOL
s:IDS_BADARCHIVE
s:IDS_EXTRACTING
s:IDS_ASKNEXTVOLTITLE
s:IDS_ARCHEADERBROKEN
s:IDS_DONE
s:IDS_ERROR
s:IDS_ERRORS
s:IDS_BYTES
s:IDS_MODIFIEDON
s:IDS_BADFOLDER
s:IDS_CREATEERRORS
s:IDS_CRCERRORS
s:IDS_ALLFILES
s:IDS_TITLE1
s:IDS_TITLE1A
s:IDS_TITLE2
s:IDS_TITLE3
s:IDS_TITLE4
s:IDS_TITLE5
s:IDS_TITLE6
s:IDS_ARCBROKEN
s:IDS_EXTRFILESTO
s:IDS_EXTRFILESTOTEMP
s:IDS_EXTRACTBUTTON
s:IDS_EXTRACTPROGRESS
s:IDS_MAXPATHLIMIT
s:IDS_UNKENCMETHOD
s:IDS_WRONGPASSWORD
s:IDS_WRONGFILEPASSWORD
s:IDS_COPYERROR
s:IDS_CANNOTCREATELNKS
s:IDS_CANNOTCREATELNKH
s:IDS_ERRLNKTARGET
s:IDS_NEEDADMIN
s:IDS_PAUSE
s:IDS_CONTINUE
s:IDS_SECWARNING
s:IDS_SECDELDLL
$STARTDLG:SIZE
$STARTDLG:CAPTION
$STARTDLG:IDC_DESTEDITTITLE
$STARTDLG:IDC_CHANGEDIR
$STARTDLG:IDC_PROGRESSBARTITLE
$STARTDLG:IDOK
$STARTDLG:IDCANCEL
$REPLACEFILEDLG:SIZE
$REPLACEFILEDLG:CAPTION
$REPLACEFILEDLG:IDC_OWRFILEEXISTS
$REPLACEFILEDLG:IDC_OWRASKREPLACE
$REPLACEFILEDLG:IDC_OWRQUESTION
$REPLACEFILEDLG:IDC_OWRYES
$REPLACEFILEDLG:IDC_OWRALL
$REPLACEFILEDLG:IDC_OWRRENAME
$REPLACEFILEDLG:IDC_OWRNO
$REPLACEFILEDLG:IDC_OWRNOALL
$REPLACEFILEDLG:IDC_OWRCANCEL
$RENAMEDLG:SIZE
$RENAMEDLG:CAPTION
$RENAMEDLG:IDOK
$RENAMEDLG:IDCANCEL
$RENAMEDLG:IDC_RENAMEFROM
$RENAMEDLG:IDC_RENAMETO
$GETPASSWORD1:SIZE
$GETPASSWORD1:CAPTION
$GETPASSWORD1:IDC_PASSWORDENTER
$GETPASSWORD1:IDOK
$GETPASSWORD1:IDCANCEL
$LICENSEDLG:SIZE
$LICENSEDLG:CAPTION
$LICENSEDLG:IDOK
$LICENSEDLG:IDCANCEL
$ASKNEXTVOL:SIZE
$ASKNEXTVOL:CAPTION
$ASKNEXTVOL:IDC_NEXTVOLINFO1
$ASKNEXTVOL:IDC_NEXTVOLFIND
$ASKNEXTVOL:IDC_NEXTVOLINFO2
$ASKNEXTVOL:IDOK
$ASKNEXTVOL:IDCANCEL
USER32.dll
GDI32.dll
COMDLG32.dll
ADVAPI32.dll
SHELL32.dll
ole32.dll
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SHLWAPI.dll
COMCTL32.dll
bad array new length
bad exception
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`h````
xpxxxx
(null)
CorExitProcess
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
GetCurrentPackageId
LCMapStringEx
LocaleNameToLCID
[aOni*{
~ $s%r
@b;zO]
v2!L.2
1#QNAN
1#SNAN
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
RSDS3/F
D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
.text$di
.text$mn
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.cfguard
.rdata
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.didat$2
.didat$3
.didat$4
.didat$6
.didat$7
.edata
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.didat$5
.rsrc$01
.rsrc$02
ShowWindow
GetDlgItem
EnableWindow
SetWindowTextW
GetParent
SetWindowPos
SetDlgItemTextW
GetSystemMetrics
GetClientRect
GetWindowRect
GetWindowLongW
SetWindowLongW
SetProcessDefaultLayout
GetWindow
LoadStringW
OemToCharBuffA
CharUpperW
DefWindowProcW
RegisterClassExW
CreateWindowExW
IsWindow
DestroyWindow
UpdateWindow
MapWindowPoints
CopyRect
LoadCursorW
SendMessageW
ReleaseDC
MessageBoxW
FindWindowExW
GetClassNameW
wvsprintfW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
PostMessageW
WaitForInputIdle
IsWindowVisible
DialogBoxParamW
EndDialog
GetDlgItemTextW
SendDlgItemMessageW
SetFocus
SetForegroundWindow
GetSysColor
LoadBitmapW
LoadIconW
DestroyIcon
IsDialogMessageW
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetDeviceCaps
SelectObject
StretchBlt
CreateDIBSection
GetObjectW
GetOpenFileNameW
GetSaveFileNameW
CommDlgExtendedError
OpenProcessToken
AdjustTokenPrivileges
SetFileSecurityW
LookupPrivilegeValueW
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHFileOperationW
ShellExecuteExW
SHGetFileInfoW
SHGetFolderLocation
SHChangeNotify
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromString
OleInitialize
OleUninitialize
SHAutoComplete
InitCommonControlsEx
sfxrar.exe
GetLastError
SetLastError
FormatMessageW
GetCurrentProcess
DeviceIoControl
SetFileTime
CloseHandle
CreateDirectoryW
RemoveDirectoryW
CreateFileW
DeleteFileW
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
MoveFileW
GetFileType
GetStdHandle
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
FindNextFileW
GetVersionExW
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
GetModuleFileNameW
GetModuleHandleW
FindResourceW
FreeLibrary
GetProcAddress
GetCurrentProcessId
ExitProcess
SetThreadExecutionState
LoadLibraryW
GetSystemDirectoryW
CompareStringW
AllocConsole
FreeConsole
AttachConsole
WriteConsoleW
GetProcessAffinityMask
CreateThread
SetThreadPriority
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventW
CreateSemaphoreW
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
LockResource
GlobalLock
GlobalUnlock
GlobalFree
LoadResource
SizeofResource
SetCurrentDirectoryW
GetExitCodeProcess
GetLocalTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetCommandLineW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetTempPathW
MoveFileExW
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
GetNumberFormatW
KERNEL32.dll
GdipAlloc
GdipFree
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdiplusShutdown
gdiplus.dll
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
QueryPerformanceFrequency
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
HeapReAlloc
GetStringTypeW
LCMapStringW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
DecodePointer
(08@P`p
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AW4RAR_EXIT@@
.?AVexception@std@@
.?AVbad_alloc@std@@
.?AVtype_info@@
.?AVbad_array_new_length@std@@
.?AVbad_exception@std@@
vuOuefweV$y
d{a?b\l
c_qQ_}
'_c?!k
-[jE>y,
xT28FX
401pQm
o1CpQm0
3z.g-]`
,\`2E&X
om\^\p
SYc61r
u_Agr,
6y3&T.
Gv&F~2
QM~2^~
)'/<4t
`/f&Tnx
~b0R_cOW
4Y_cOW
]_cOWPA
vpenc!h
N4Y_cOW
*NW[&{
tXTCgP
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
version="1.0.0.0"
processorArchitecture="*"
name="WinRAR SFX"
type="win32"/>
<description>WinRAR SFX module</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker"
uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
<dependency>
<dependentAssembly>
<assemblyIdentity
type="win32"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
processorArchitecture="*"
publicKeyToken="6595b64144ccf1df"
language="*"/>
</dependentAssembly>
</dependency>
<compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">
<application>
<!--The ID below indicates application support for Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<!--The ID below indicates application support for Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<!--The ID below indicates application support for Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<!--The ID below indicates application support for Windows 8.1 -->
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<!--The ID below indicates application support for Windows 10 -->
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
</application>
</compatibility>
<asmv3:application xmlns:asmv3="urn:schemas-microsoft-com:asm.v3">
<asmv3:windowsSettings xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">
<dpiAware>true</dpiAware>
</asmv3:windowsSettings>
</asmv3:application>
</assembly>
PPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
0!0+0A0V0a0q0{0
2%2-2P2
3!3A3Q3`3g3q3
:.:U:q:
;w;q<V=
0X0f0k0
0.1[1m1
4H4Y4i4
5*6B6G6
<-<B<L<[<i<
7B9s:i<
5!6_6q6
748`8x8
9(9H9x9
<Q=~=.>J>x>
0#050@1n1
5*6`6l6
=4=9=?=F=L=
~0,1j2
8P9m:v:
v2\4d4z4
8(8);O;
2$2;2I2q2
798W8^8
8 9C9U:\:c:
:A;O;{;
;'<H<T<x<
>+>1>B>H>U>
?$?+?2?9?@?G?N?p?w?~?
070>0E0L0S0Z0a0h0
1'1.151<1D1K1R1Y1E3L3X3n3
5!5.5C5J5X5f5
6&656E6Z6o6~6
6/8:8A8O8#929A9P9_9
<1<<<A<a<r<}<
K0b0r0
1"1)1L1U1`1m1u1
2 2(20282C2N2Y2d2o2z2
33*353@3K3V3a3l3w3
6%6K6R6]6c6k6
7&7+7g7
7V8b8j8o8
:!:(:U:i:
=3=I=X=f=t=p>w>
11#1'1+1m1
<3<R<
W4^4>5E5
8 9B9a9
9$:E:V:g:
:0;9;U;i;y;
=2>=>G>
$030F0
272\2|2
3-3k3}3
6,747J7S7
8"8+898O8X8p8
9A9J9c9x9
9 :):L:`:
<<<R<m<
=:=H=[=i=
> >*>0>B>H>U>[>f>
?$?:?U?
0 080X0c0|0
22C2P2]2
3(3>3P3h3
4T5d5i5~5
5 646G6d6q6y6
;:;L;d;
<"=6=I=N=b=g=s=|=
=$>V>y>
0%0/050R0X0d0m0y0
2)2[2k2v2
3)353F3L3_3i3
4$4=4c4s4
5$5-585L5R5X5r5
6,6F6M6X6h6s6x6}6
7'737<7B7J7U7a7k7r7x7~7
7'8;8I8U8[8w8
:0:N:^:z:
:*;L;i;o;
<O<q<#=+=7=A=M=s=
0-0A0}0
373B3i3t3
5+5L5h5t5z5
7P7d7x7
;%<3<B<i<n<x<
?#?V?k?|?
1"1'141C1\1a1f1k1p1u1|1
2 2=2H2s2|2
33)333>3d3j3o3u3{3
4;4A4`4l4
60686E6V6c6s6
7#7.747:7?7J7O7l7v7
8(8.8?8E8K8R8Z8`8h8
9%9/999C9M9W9a9k9u9
::):3:=:G:Q:[:e:o:y:
;';1;>;L;V;`;j;t;~;
<%<2<@<J<T<^<i<y<
=1=8=>=H=Q=
?+?2?8?C?b?w?
040F0`0u0
0C1O1U1j1
2"2(2.242:2@2F2
5!646G6S6c6t6
667C7j7r7
;?;D;Q;
>%>->t>
0<0d0j0
1C1K1\1b1
222;2F2M2m2s2y2
3(383A3
5"5&5*5.52565:5>5B5F5J5N5R5V5Z5^5b5f5j5n5r5v5
>G?O?a?
0#171S1]1g1u1
1-1M1[1b1h1
1(2D2S2_2m2
3A3M3R3W3~3
4"4.484J4O4l4
4U5o5x5
0f1j1n1r1v1z1~1
2r9-<I<M<Q<U<Y<]<a<e<i<m<q<u<
3&4V4~5
4'4W4f4|4
4`5g5y5
;.;\;|;
>#?g?y?
0$0a0p0u0
121G1S1[1s1
1-2T2n2
5F5L5y5
5_6e6{6i7s7
9Q9d9v:
<1=->A>
000090n0
141>116
8;9B9R9a9h9
<*<M<p<}<
<0=`={=
4#4*404K4R4f4n4
5(545B5d5v5
6"6-62676R6\6x6
737>7C7H7{7
8)8>8I8]8b8g8
=+>:>L>^>z>
?/?>?H?U?_?o?
0-2Z2{2
727A7e7
9G9T9a9n9
:);W;"<<<|<
=(=>=y=
=(>:>L>^>p>
?!?3?E?W?i?
0M3T3[3b3.4O4V4l4
>6>R>q>
:%;b;l;
011=1Q1]1i1
22/2;2J2N3
8,8=8E8U8f8
:U:a:m:y:
060L0b0j0
8;8O8U8
9b:~:&;
>+>K>h>}>
0*0?0T0i0
`2h2l2p2t2x2|2
5,8084888<8@8D8
h3l3p3t3x3|3
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
4h6l6p6t6
5D5H5P5X5d5h5l5p5t5x5|5
7 7$7(7,7074787<7@7D7H7L7P7T7X7\7`7d7h7l7p7t7x7|7
8 8$8(8,8084888<8@8D8H8L8P8T8X8\8`8d8h8l8p8t8x8|8
0 5$5(5,5054585<5@5D5H5L5P5T5X5\5`5d5h5l5p5t5x5|5
6 6$6(6,6064686<6@6D6H6L6P6T6X6\6`6d6h6l6p6t6x6|6
>$>,>4><>D>L>T>\>d>l>t>|>
?$?,?4?<?D?L?T?\?d?l?t?|?
0$0,040<0D0L0T0\0d0l0t0|0
1$1,141<1D1L1T1\1d1l1t1|1
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4\4d4l4t4|4
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5
:$:,:4:<:D:L:T:\:d:l:t:|: ;$;4;8;@;X;h;l;|;
<$<<<L<P<`<d<h<p<
<1H1l1
2 2@2L2l2x2
3(30383T3\3d3p3
4$4,484X4`4l4
5<5D5L5T5\5d5p5
6 6@6L6
7$787L7\7l7t7
8(848T8`8
9 9(9094989@9T9p9x9|9
: :(:T:X:`:h:p:t:|:
;8;X;x;
<8<X<x<
= =@=`=
0X1d1p1|1
2$202<2H2T2`2l2x2
3 3,383D3P3\3h3t3
4(444@4L4X4d4p4|4
5$505<5H5T5`5l5x5
6 6$6(6,6064686<6@6D6H6L6X7
8@=P=T=X=\=`=d=h=l=p=t=
> >8>`>
0 0$0(0,040<0@0D0L0P0T0X0\0`0d0h0l0t0x0|0
1 1$1(1,1014181<1@1D1H1L1P1T1X1\1`1d1h1p1t1x1|1
Setup=destroyDefender.exe
TempMode
Silent=1
Overwrite=1
1Remove_SecurityComp/DisableDevDriveProtection.reg
,Remove_SecurityComp/DisableLSAProtection.reg
&tC3?W
|TFM4pz
IRemove_SecurityComp/DisableMaintenanceTaskreportinginSecurityHealthUI.reg
7d43/W
BRemove_SecurityComp/DisableMicrosoftVulnerabileDriverBlocklist.reg
*Remove_SecurityComp/DisableSmartScreen.reg
UTL8+q
.Remove_SecurityComp/DisableSpyNetTelemetry.reg
&eD2?u^
0Remove_SecurityComp/DisableSystemMitigations.reg
6UC2?V
}<HMV~X
/Remove_SecurityComp/DisableTamperProtection.reg
"Remove_SecurityComp/DisableUAC.reg
6d33?U
"Remove_SecurityComp/DisableVBS.reg
0TS3/U
d51vWI
&Remove_SecurityComp/ExploitGuard_d.reg
&eC3?U
OS%GED
5Remove_SecurityComp/MitigationofFaultTorelantHeap.reg
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FTH]
"Enabled"=dword:00000000
6Remove_SecurityComp/RemovalofAnti-PhishingServices.reg
'eD2?W
;Remove_SecurityComp/Remove and Disable Microsoft Pluton.reg
4Remove_SecurityComp/RemoveSecurityandMaintenance.reg
:Remove_SecurityComp/RemoveWindowsDefenderFirewallRules.reg
6dS2?U
`5a"N0
PowerRun.exe
,V-~T!
x%zq~O
]!(B
$I0'$g
%*Ler9
xrzw2r
tyMkw'9
aJF`qX]
XWM='LB
iA^+2C
-Q|Z3X
XSb:I*A
Gd[A{s
ps'aF^B
;E[aC"
.9jEH)
f)#Cz*~
Onc/nY
A#~C{>
qfOf~Y
N5`~3
H~v{LU
'{Rx6nck
]VT0|i
JA[sF"
\Kb}[.
~rxE-@
%R%ZSyeD^q
-l+iEp<
Azo~*!#wP
XvA9FK
Qg#Ul,c
IQ-(Xl'H,ySl6Y
uFAbEmD
%_I<<*a_=
YE2R9}
aC=|*;
y1y./o
c0OiK3
||s|+k
Y96ZA}H
Cqx~S\
tBvo7'
DpDp'1
*M|z,c
s@~z4~
?qI/E"`
>,h5PEXw
,_o[J
3},PQ0O
0`nOW
Fp9Kwg
TpJI6E
DT2$XpP
"( (#5
oSwT@]Y
'^WUW^
a^jK9Y
^jK1*ue
/_`z"#
~7{c`
gc*,Qk;Y^
]E8hw=EQX
'LCW5T
)8_xx
22mDD`
Eez)A/WC!Z
]gs@qf
!k:pb2
8$?Yvf
q9iQju6B
fF{K6l
#x"Oy,
$gOdcQ
,8~(~?
9P[|qUq
_lCKN
m5j 1:
_lN&k^O
08bb+j %
Ij8NBq
[pebe)
eb^bE=
<_F_?
OcL?q"
VO2K0b8<|
>$Fi1r
P)Lj8'(wH
qP~/107
?53`|%Q
Ib~tFi]
??yym
(iMES!I2
zcd~N-
cm{H<Kb
9Ma-YES
%zAsz^l%
C.tGD4p
kHJ,z)
'eeG[
Z[EE,=n
u(oNW>
Qo%-|y
PtogM}
%yC0rI
X5pruA
i6RQW[
#.w2Wq
1'k_I4
{},r0S
rVj`j
iCsj6S
"R]BNO
#M5D@c
Q1m:fo
,/zlna
5Z,}]
B1]:=g
98/|ny
l.|\B`
b*hyV(}
x/r1\
K|iy)E
jX[RO%
*w(@ i
r+9*L<
TpX8>y
OF= V1
xvm;(j
W%wZ&
$ep<qZ
QY<px\
-+`ldx
bm\<s10HSH
mafI|w_
wM_>?2
v?(=:%
4p@>4Gm
^O;*fOJ
~\8zi
Z1e|*Y*
[R,'dv
z&~&=%iasPD
p,pu)&+fn`
%CvCZt
x<i0*A s
N<W];X
w<$HJW;
%h@;lq
YWHMQ4
KSO'IW&[
vF]tT+
MLq>r)
4F>LAUU3
\4#75%
L+wPsy@
G8d-]\
$4@?,@
m"2L>'
|as1=E
%-V1yt
Dr"}D)E
|g&@2y.
$1t+q(
~}']&0{
8<Y5-w
*VBa@%
9wZnV)
=**cW
R!z[dN
u^{3+
>MD7>_
%ta[(I
hBxpj
dPthRH/N
[@PXd3
%FM:)d;t(Xk
hGl&+r
mtN2/`N
z=>I`@=
r7wof@F
u0W!a"WD
!92SjV
Il;e&;
hS<cr~
}03}e_
}IffP1
(1'2u@
8|tNA
.a_cqw
tMEw>v\yM|4
37n=;Uk
!t`x|p;
\C7$k.B
>(fv^,(v
mk][Ab
(pWwH9
A,JU{4
wh=b`3,:
mA%lI
rO~(YG
3hQ{!+
({&KV4}
9S?;fS
!L-rRx
Q7j@*Q
FL|3?RJaxG
qL#.K*
Xj6GE4
q;^Rg[5EP
.4Fgog32
H(ml\{
+89U<[
u-$id*
:/'2Z
L)H~H-
}b.*Oa
#1+!,d
'' 9sd
1y~<d(1
PeN*mN
$sM~"-R
cePnMu
LX_:E6_
\%hgvy
{[<C`B
N0hWDz-
\]LCv5
/2<l`);
NK@IjM
K8L9;xrsw%/S
tAl_q5
fGw,}
%m92M
Z]<tGtS
q0TlPv
s()J.;
m[~+]5
@C=g2
[7&>.y
*s/'_d
k+fTxt
&]U8I=Q
D("p2fQ4
d(dXwr
Xiq6[t
#oK6vdM
R0[9 `
wuqW]j
_9z0r6
e!!qbW
p7>hqB#
s7`gn[Q
}1KXoE
2NHN>@
qT3L>Y
cH8;'h
x)7D-i
dM"xee
cc~#<GLD
UMD?[c
zP0+xk
KLm~(|O
5JGvDmH
jnD;~N
[]_fv6wWtb'o
38U^7N
Dc(#BG
2:}"0f
vTgJ;B
ESVJdWU
?TO.}>
`F--@N
'|9SS{
S.[zGe
)x[HZh\
_7H\jw
bX:IGRf
N((SN,
j,"2v(`d
ty{sac
>F*IKTER
3W`y"t
[ihs*l
b8kTp|>~-
;l+F:kR
3?QN;
GF_7$>3-
<.9?uI
4(A~t#-Q
RJ!)Mu "D
)'KGNb
S*L1c"
5f1t`
uC`k9(h
M&Jmn~f
hzsYjv
s2NY/F
#JXE u
;P129q:/*
327op?
}CKL{)(
]z`}H&
dt.ck+f
%s}qI5
h\n!8F
/4xa4F
4rqh*L
bsc]D@
#h" 0rRn
"-o&)(
V.g- s
\2"?\8V(
XB<Nm{u]
>\?(n
en=$;F
#hpjUP
m`LjYqBE
]gRtED
,UjC"_
xW/E$U
t]!KST
pmQ"9^
x.\^S}
z?--)8
sKuMlW
xZtbJ^
i!Uaqo8
')"8>%
gLx"R(
WD|H|$|
%L5]eh
=KibHc
OE'iL%^N
%Pw,Ei
}>1zOl
.(c*D0
s{w5MA
PB>1erB
GOr_TD
uq*u"T
lyoPwr
HGIW%
)*GJK*
cc`a,$
anFTH0H
3(%S0Z
O%4QU_
YAIh.i
qmk0%Z
vOd]mP
[7bku.K
)a`[lq
/30~\
c:&:CHN
;!5dt
1Xar9oo
KcL-Cd
fhk^M'
o*J'={
MBNJ_h!S>
fZXW@5
e"uuIp
)G7=tEbrIFB
u(8M)l!8
$-C~%Y^
fzy(_,
V7uTe&
N1IEyHX
tZE\O0
qa`2{?
{q4SVq8`
t)EZIG
UCj[WH
aw^Rt2
)3M8>iB$
yyBHG&
0p.V:}
)T+oC0
aJRyWZ
d(d^jHZo
m_Q6H*[
dwX0;_:
Sh7.&O
hW,,/}L
*s z>X
-eH~rY
;n=C-3
/aj+!n
QU}:R]p
!q/6a{tn
_v:~*u
=Pk3R
ZHkV8r
=V{L1i
nR]p]4
fXBLa|
/a$Fja7V
PnYE!J
eip#8
T=>2ni
vc!;RL
1=uWF~
*i`0</a
Y_}R5^j
68a<W0(,w
2Rul.\}
@7jFJ=5`]O
gJ>2s}
}V%F'%j
fs'so>h
XSz(p9uJK
1ZXKR0
S9WMg=
wL$<=9
uK^C^M
}(KTIlQ
^: m0+I
h{`\=!
u_:,fm
&l3q9s
zZ%B=}M,
Zv I3.
Bj.Ls4N
BuBd[qJk
mp=T)
A=NU]MM
KHq1LQ*
_@PyF3
Ppm<5a#
U/fYukZ
qY%OJ5V
\|,]~`t@
[iVwO1
iwx^.Omv
KKm7f|
?,8UEtT
46uoGIE
h<Zw>!
d\$H]Y
/-$ZZa#5
)aUhyh
7A_*w|
4_.^B7n
$6>X^r
dejwbHu
9:NmFNS
K(@"{k
z[4l]Z
;w]m0$
&Xgzey
^"@O]#
y#yby7
s_amPO
v&`nU;XtP6
P>7=C
<mh}Y\
BfW%aoC]
Y}}btu
"F/Gf@
\E&+iZP
Z;wi!&
K_n#ik
b3owHCq
uNpyYK/FE
~cW]q-
@kNxn:
~rfgn0q
lVXynPx
8626IZ
+c{^6
72_O1:
FYDaeh
yD4B/kL
LetDL{
}ws~I`
%=TPY%
"k]wk(
TT2$fpXg
yqcgmv
z]NB@D
|aBBu"
0 ^Vdh#V4
P|[H:o
R?]w8
]9]U*?
9:zyPn
n7mr=V
Gpa[{s
;Z1oZE
<-j/uH
NAJlWR
TN3=K@
.F9=u9,pO
Ek6X3oy
wg&Vzk
NUGFM3{
's}uZw
|aMzfS
52-PqBJ
vEz{Bv/)
YV(|#8
LH{D&j
\{uz0
L~t}Nv
HGfUWZ
hZf:i!
'.lcc$
CWE<[+
~PbK!z
$z;YJ?
CfC{]R
~ORl_bc-a
x}Qjjo
.R^I8o
^rwPkV
3DY~MF5
!Tc_(Dg
#t=i`X
Rly#w
7dbMn.
[Nt;)
B!pv7_
xSzRcd)G
ld|{e:5I6
oPk6ktO
uy8OhU
[Tbz66
[`vDD3#f
uuuuwuuuuw
vC5UiG
|iX.-}
.Ng!7>7$&
VFw~%u
Wc77 [
1R>2b7\
7fdDi@
mU5u8Bd
caWY[\
\W/_089
d^Q48n
2gVr#9
VMQ(I>M
c4Yg[I
!GK^cz
yqeWr@
ft%FrA
Sd?:U,
?)9U<Br
f/mnnT
~\F'#G,
h6TWU"31
p3hT~s
7EkIbP+
T#c)F}
JiPuiz
\XE"$+
lBf!7Z
QcFnEB
:TAmL
>USV:?
(t4!Ao
kp]%_'
_c|xq2
2cW=lc
7];M6'
)k4S5}
fU3!ry
ARs6f;{
>m#Pb*
$0p/jf
&6,;!@
^ &O|ya1C
SID.]aZ
6evDt^
Di=sEv
6dI8Z:\
TT2%e`Px
G0}'ks
XMyE2K
t95QM
,zkOd<
9ET:~X
.U<D Jh
OD"O)w
}H:SGZ
$."^G.(
l0^gr/
5s~=2_
cX5~C
x}]s_)
f6Cb<
./,itM
%@zT?O
RbRNNo
&'+*prcl>
y+9(qukw
!$6|'d
< M39$
,2kptQ
+R4vBI
Y&l2^,
9fWe*,Y&[
e#IYZy%)d
eJ:;nMK
+dv3<Ss._"
AO_)`q$5
&3`mbV
eDY8Ar
T'1J`+v
_oU ZE
DGuD52Uf`Tf|
ubo#@?
46249_:^.6a:
PFR7}W
o!sKXj
AMK7a6
+c{n$}
u* WFnU
oCF>Sblr
H@</ZZ>
u-|t.R
NPFGBBMS
~H`md$,
;*LCh
U^Uc>a
%Qx:*R.
Eau~:t\
_w#/66
H{f;dQ.
|Z-V#L
#kOujA
||d[f%
&>9:8^
%4lD@h
% *zh
vslQ*V
.uB{y[
@77*/SL
4|f7e[_
H]N&=;.
bwr07{
VP0#$d#
7o(( Yh
l&mOL'
mn!b5GX
;^NsOm
@0S#PE_5EJ
eM`9$Mm
!X+DU}
'2_AH#
/~AmJHneUp
#N`6y~
YJjpf;@$k
+?=^t
]IATu[
UP%R^#U
mI]%tD
S9E:^+
ij/JcF
cS`C-)fA
QA+1$2
(%LQ=3
vWt4~I)
K;u,cu
8;\cb9
6SCUNC
qUo(?3
cf]?V+
VR_n(bbPx<
.4|]5@
b'r]%[C\
s7J/#B$l%
]fgs-"
.a61t&N
'+,v1Y=
F9"8Q\
3Wn163
BK:/\E
T9e2$O
<nZcL8W
O%s\(O,
L c#FxDg
f]_CwiZ
w%|FqI3
rJ\=p\N
<-LY!*}
fVcb{!;ju
_it=6@
U eY15
8L>uA
3e^)7
.QqNRC
%fJ\=h
jb*cW
!&!GDE5`
mKTQ^`
88V%i=
k0NKrD
.9ls<@}[A
7)i9>*
bL>Luu
>)|78j6
m)Q}j_
$^viH0m
}[[)$q
}KE[hm
k_.g|z
cIWM.A
,:md{T
v`\b~R~
bZ]*\7G
_{|GB
{WfCLXvJ
,ZzG"J3
Z-^RY|
r&S@ZP]}
T?puXK
SW]3iz
hLlaRke
v."#jpO
j"4WRwD
rjvy<D4
\Fyd6=
.Xr`nA
^=3l&Xh-
}0y|/fy
nyQ"p2R
C-\A2Z
>dgD%z |
[0rx9^
IwE(z6
.4|}C6E
6]i{er
ep{G[G
7m~n>2m
VhMQcU?Z
xGB(BRy
zCCLq%
\;VT1uxF
]^?% h
k|mjx
90/kBR
%w7O(}
{f0f_n%
Wc)0E(
~DO9)z
tos;Lc
}"FU(#
]A`TAw
F]@]I?
.k_+kl
)kcl7
Wo7XTUcj(
|TYW\
2 u<DK
}5%>(/r
P~<S&F
I0}-d>
Hb&I_#&\
!5gn1
Y\5BFb10HY;)
EO53=n=
LFGB5YR
\{3$6c
6cpfv(K
S(G,*b
~5DjhT
|PZ^5[
-R8GO-
cjvz2"
Y[yphb
ige4 z
*B'[e{
0|w2+E
~i9Y*T
u4hOYT0
l]O!R1z
j~9HbM
rtwe-I
H:JP[
ymLIi+
H2D,Z%fs
5:W)lJ
"~;IsH
Ly\*9x3
5Z{Y@\nN
zq7[u
.&pF|.
W88?dt
OksvS&
8H=}s
,s)e^P`K
H7FjN%
(2}Gwp
5-0G( \o
jyuvwE
K":04/rm
|4zpK-
[yl8j\N
%2Awi1{
CRig"%
yVD{e2
MQ_G2A
T*5Lsp\
K)5BR2
R=:XC-
@"5XVK
@F5#c2
nS&sp
S4Lf*IE24'^
ydRo7v
pvwQNDc0]&n5
OCycd.B
Y:LYx?
Zh<@cT
l2[ <}
P<S**~b"
3d3eF@EeR
\\]\_DL
@!;oCrq
<gY-T)m
$f}UFo
N,E.QgX.
ig4Aj`
hr|{\#
8J)N(YU{ML
Q.%_*pla
^qoH,8
~?Tv?'
xO"u
|7K\Qu
qJ@=@
:$36jH
sG`/?$
!ffNS$0
S\38?r|
f?Z}7o
E7vu8
UG*L`^
zhJ}D8]
%*Gw\b
2>0J2*
RemoveSecHealthApp.ps1
'E#t(Q
$"XObI
M@k^Ey
.Remove_defender/DisableAntivirusProtection.reg
ARemove_defender/DisableDefenderandSecurityCenterNotifications.reg
6eC2?U
+Remove_defender/DisableDefenderPolicies.reg
0e334O6
=\HwtP
9g57L^
*Remove_defender/NomoreDelayandTimeouts.reg
5Remove_defender/RemovalofWindowsDefenderAntivirus.reg
'Remove_defender/RemoveDefenderTasks.reg
&d34?V
?yz_w?k
0Remove_defender/RemoverofDefenderContextMenu.reg
6eC3/U
(BUDIZQ
"Remove_defender/RemoveServices.reg
6UC3/V
Bo=&Pm
*Remove_defender/RemoveShellAssociation.reg
>!/"Gubq7@,
*Remove_defender/RemoveSignatureUpdates.reg
6eC#?U
Dn&2E7
r(w|-n
/rc@)a
(Remove_defender/RemoveStartupEntries.reg
X>jmg_Z
*Remove_defender/RemoveWindowsWebThreat.reg
6t4#?W
1Remove_defender/WindowsSettingsPageVisibility.reg
Remove_SecurityComp
Remove_defender
destroyDefender.exe
MuB6n[
mRj7ZA:
$[2O4&
cTh^Zb
Vw!|u^
2A@r!A
1QSGS`
bYrFEs
0ITLY_>^.
OI?IL8
'%3$jD
8)>K5/
u,Te/!,
-$C?Q)b
%1-71v
ok~#pD
PpSWIJ
%*+k+0
S*JT[w
LpKOu)]
pVgn']
MOGGN7 K2
Zy>Qyop
@xlUP*
&zj-0;6
"mkiqpb
63 YYS
_KWJP:
GBAgEq
>y6f,O
`0VI(_<
JycurD
~R|69a
4%R4e+xs
8wiB>
C\?+d4
DestroyDefender.bat
(85-Sr
ME%Rm8
}[[McVOZ7T
CA#;{_
/W\{Q*
PowerRun.exe
destroyDefender.exe
Maximum allowed array size (%u) is exceeded
SeSecurityPrivilege
SeRestorePrivilege
SeCreateSymbolicLinkPrivilege
rtmp%d
?*<>|"
*messages***
STRINGS
DIALOG
DIRECTION
s$%s:%s
CAPTION
Crypt32.dll
CryptProtectMemory failed
CryptUnprotectMemory failed
kernel32
version.dll
DXGIDebug.dll
sfc_os.dll
SSPICLI.DLL
rsaenh.dll
UXTheme.dll
dwmapi.dll
cryptbase.dll
lpk.dll
usp10.dll
clbcatq.dll
comres.dll
ws2_32.dll
ws2help.dll
psapi.dll
ieframe.dll
ntshrui.dll
atl.dll
setupapi.dll
apphelp.dll
userenv.dll
netapi32.dll
shdocvw.dll
crypt32.dll
msasn1.dll
cryptui.dll
wintrust.dll
shell32.dll
secur32.dll
cabinet.dll
oleaccrc.dll
ntmarta.dll
profapi.dll
WindowsCodecs.dll
srvcli.dll
cscapi.dll
slc.dll
imageres.dll
dnsapi.DLL
iphlpapi.DLL
WINNSI.DLL
netutils.dll
mpr.dll
devrtl.dll
propsys.dll
mlang.dll
samcli.dll
samlib.dll
wkscli.dll
dfscli.dll
browcli.dll
rasadhlp.dll
dhcpcsvc6.dll
dhcpcsvc.dll
XmlLite.dll
linkinfo.dll
cryptsp.dll
RpcRtRemote.dll
aclui.dll
dsrole.dll
peerdist.dll
uxtheme.dll
Please remove %s from %s folder. It is unsecure to run %s until it is done.
CreateThread failed
WaitForMultipleObjects error %d, GetLastError %d
Thread pool initialization failed.
%s: %s
ARarHtmlClassName
Shell.Explorer
about:blank
<html>
<head><meta http-equiv="content-type" content="text/html; charset=
utf-8"></head>
</html>
<style>
</style>
<style>body{font-family:"Arial";font-size:12;}</style>
&nbsp;
riched20.dll
RarSFX
STATIC
REPLACEFILEDLG
RENAMEDLG
%s %s %s
GETPASSWORD1
ASKNEXTVOL
winrarsfxmappingfile.tmp
sfxname
%4d-%02d-%02d-%02d-%02d-%02d-%03d
sfxstime
STARTDLG
sfxcmd
sfxpar
LICENSEDLG
__tmp_rar_sfx_access_check_%u
-el -s2 "-d%s" "-sp%s"
Delete
Silent
Overwrite
TempMode
License
Presetup
Shortcut
SavePath
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.KillAV.4!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Trojan.Ghanarava.1737813232623ac7
Skyhigh BehavesLike.Win32.Ransomware.bc
ALYac Trojan.Generic.37091201
Cylance Unsafe
Zillya Clean
CrowdStrike win/malicious_confidence_70% (W)
Alibaba Clean
K7GW Unwanted-Program ( 005a1c301 )
K7AntiVirus Unwanted-Program ( 005a1c301 )
huorong Clean
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 REG/KillAV.A potentially unsafe
APEX Malicious
Avast Win32:Malware-gen
Cynet Malicious (score: 100)
Kaspersky Trojan.Win32.Agent.xbujhp
BitDefender Trojan.Generic.37091201
NANO-Antivirus Trojan.Win32.AVI.ktrcax
ViRobot Clean
MicroWorld-eScan Trojan.Generic.37091201
Tencent Win32.HackTool.PowerRun.Qwhl
Sophos Generic Reputation PUA (PUA)
F-Secure Trojan.TR/AVI.Agent.pvdxg
DrWeb Clean
VIPRE Trojan.Generic.37091201
TrendMicro TROJ_GEN.R002C0DKK24
McAfeeD ti!08AF6526A87B
Trapmine Clean
CTX exe.trojan.generic
Emsisoft Trojan.Generic.37091201 (B)
Ikarus Trojan.BAT.DefDisable
FireEye Generic.mg.50faa83beefd6182
Jiangmin Clean
Webroot Clean
Varist W32/ABRisk.HQLF-6975
Avira TR/AVI.Agent.pvdxg
Fortinet W32/PossibleThreat
Antiy-AVL Trojan/BAT.DEFDISABLE
Kingsoft Win32.Riskware.Generic.f
Gridinsoft PowerShell_Susp_Parameter_Combo.bot!yf
Xcitium Clean
Arcabit Trojan.Generic.D235F781
SUPERAntiSpyware Clean
Microsoft HackTool:Win32/PowerRun
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!50FAA83BEEFD
TACHYON Clean
VBA32 Trojan.Agent
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0DKK24
Rising Clean
Yandex Clean
SentinelOne Static AI - Suspicious SFX
MaxSecure Trojan.Malware.300983.susgen
GData Trojan.Generic.37091201
AVG Win32:Malware-gen
DeepInstinct MALICIOUS
alibabacloud Trojan:Win/KillAV.A
No IRMA results available.