Static | ZeroBOX

PE Compile Time

2023-08-02 18:27:47

PE Imphash

bc8d2a62cabbf7fbe1ecc06695be542c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00015a70 0x00015c00 6.50315085224
.rdata 0x00017000 0x0000a4f4 0x0000a600 4.98465486162
.data 0x00022000 0x00005b80 0x00003200 6.66724924339
.pdata 0x00028000 0x00001254 0x00001400 4.74513909101
_RDATA 0x0002a000 0x000000fc 0x00000200 1.96289327047
.rsrc 0x0002b000 0x00017230 0x00017400 4.02141775256
.reloc 0x00043000 0x00000680 0x00000800 4.93337009339

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_ICON 0x000419a0 0x00000468 LANG_ENGLISH SUBLANG_ENGLISH_US GLS_BINARY_LSB_FIRST
RT_MENU 0x00041e90 0x0000004a LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x00041ef0 0x00000154 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x00042048 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ACCELERATOR 0x00041ee0 0x00000010 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x00041e08 0x00000084 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x00041e08 0x00000084 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000420a8 0x00000188 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x140017000 FindFirstFileA
0x140017008 FindNextFileA
0x140017010 FindClose
0x140017018 WaitForSingleObject
0x140017020 GetModuleHandleA
0x140017028 Sleep
0x140017030 GetFileAttributesA
0x140017038 GlobalAlloc
0x140017040 CloseHandle
0x140017048 WideCharToMultiByte
0x140017050 WriteConsoleW
0x140017058 CreateFileW
0x140017060 RtlCaptureContext
0x140017068 RtlLookupFunctionEntry
0x140017070 RtlVirtualUnwind
0x140017078 UnhandledExceptionFilter
0x140017088 GetCurrentProcess
0x140017090 TerminateProcess
0x1400170a0 QueryPerformanceCounter
0x1400170a8 GetCurrentProcessId
0x1400170b0 GetCurrentThreadId
0x1400170b8 GetSystemTimeAsFileTime
0x1400170c0 InitializeSListHead
0x1400170c8 IsDebuggerPresent
0x1400170d0 GetStartupInfoW
0x1400170d8 GetModuleHandleW
0x1400170e0 RtlUnwindEx
0x1400170e8 GetLastError
0x1400170f0 SetLastError
0x1400170f8 EnterCriticalSection
0x140017100 LeaveCriticalSection
0x140017108 DeleteCriticalSection
0x140017118 TlsAlloc
0x140017120 TlsGetValue
0x140017128 TlsSetValue
0x140017130 TlsFree
0x140017138 FreeLibrary
0x140017140 GetProcAddress
0x140017148 LoadLibraryExW
0x140017150 EncodePointer
0x140017158 RaiseException
0x140017160 RtlPcToFileHeader
0x140017168 GetStdHandle
0x140017170 WriteFile
0x140017178 GetModuleFileNameW
0x140017180 ExitProcess
0x140017188 GetModuleHandleExW
0x140017190 HeapFree
0x140017198 HeapAlloc
0x1400171a0 GetFileType
0x1400171a8 FindFirstFileExW
0x1400171b0 FindNextFileW
0x1400171b8 IsValidCodePage
0x1400171c0 GetACP
0x1400171c8 GetOEMCP
0x1400171d0 GetCPInfo
0x1400171d8 GetCommandLineA
0x1400171e0 GetCommandLineW
0x1400171e8 MultiByteToWideChar
0x1400171f0 GetEnvironmentStringsW
0x1400171f8 FreeEnvironmentStringsW
0x140017200 SetStdHandle
0x140017208 GetStringTypeW
0x140017210 FlsAlloc
0x140017218 FlsGetValue
0x140017220 FlsSetValue
0x140017228 FlsFree
0x140017230 LCMapStringW
0x140017238 GetProcessHeap
0x140017240 SetFilePointerEx
0x140017248 HeapSize
0x140017250 HeapReAlloc
0x140017258 FlushFileBuffers
0x140017260 GetConsoleOutputCP
0x140017268 GetConsoleMode
Library SHELL32.dll:
0x140017278 SHGetSpecialFolderPathA
0x140017280 SHGetKnownFolderPath

!This program cannot be run in DOS mode.
Rich%D
`.rdata
@.data
.pdata
@_RDATA
@.rsrc
@.reloc
|$ HcA<E3
@SUVWAVAWH
xA_A^_^][
UVWAVAWH
A_A^_^]
@8l$@t
@8l$@t
@8l$@t
@8l$@t
@8l$@t
WAVAWH
@A_A^_
|$ ATAVAWH
D8d$ t
A_A^A\
UATAUAVAWH
E`@8u`t
A_A^A]A\]
@SVAWH
L$08D$0t
L$ SVWH
H3E H3E
u0HcH<H
WATAUAVAWH
A_A^A]A\_
WATAUAVAWH
A_A^A]A\_
VWATAVAWH
A_A^A\_^
WATAUAVAWH
A_A^A]A\_
H;xXu5
ffffff
fffffff
AUAVAWH
u4I9}(
;I9}(tiH
0A_A^A]
UVWATAUAVAWH
`A_A^A]A\_^]
@USVWATAUAVAWH
A_A^A]A\_^[]
UVWATAUAVAWH
A_A^A]A\_^]
@SVWATAUAVAWH
L!|$(L!
D$0HcH
pA_A^A]A\_^[
B(I9A(u
SVWATAUAVAWH
0A_A^A]A\_^[
t$ WATAUAVAWH
A_A^A]A\_
@USVWATAVAWH
A_A^A\_^[]
x AUAVAWH
0A_A^A]
D$@H;F
kL@8o(u
<htl<jt\<lt4<tt$<wt
|$ UATAUAVAWH
<Ct-<D
<St[@:
u<g~l<it[<ntP<ot,<pt
<utK@:
A_A^A]A\]
x ATAVAWH
A_A^A\
UVWAVAWH
0A_A^_^]
p0R^G'
u3HcH<H
t$ WAVAWH
A_A^_
WAVAWH
A_A^_
D$0@8{
p*W4H
p*W4H
WATAUAVAWH
gfffffffH
A_A^A]A\_
{ AUAVAWH
0A_A^A]
t$xt*3
WAVAWH
A_A^_
x ATAVAWH
A_A^A\
L$ VWAVH
fD94H}aD
fD9t$b
u$D8r(t
D81uUL9r
uED8r(t
vAD8s(t
u$D8r(t
fD91uTL9r
uED8r(t
v@D8s(t
UVWATAUAVAWH
PA_A^A]A\_^]
WATAUAVAWH
0A_A^A]A\_
H97u+A
@USVWATAUAVH
D8t$ht
D8t$ht
A^A]A\_^[]
f9)u4H9j
u%@8j(t
l$ VWATAVAWH
L$&8\$&t,8Y
A_A^A\_^
@UATAUAVAWH
e0A_A^A]A\]
WATAUAVAWH
A_A^A]A\_
p0R^G'
\$ VWATAUAVH
D!l$xA
@A^A]A\_^
L$ VWAVH
x ATAVAWH
0A_A^A\
SUVWATAVAWH
A_A^A\_^][
@USVWATAVAWH
A_A^A\_^[]
WATAUAVAWH
0A_A^A]A\_
ATAUAVH
L$ fff
L$ |+L;
A^A]A\
@UATAUAVAWH
H!T$0D
u,!T$(H!T$
A_A^A]A\]
WAVAWH
A_A^_
UVWATAUAVAWH
fB9<A}1L
A_A^A]A\_^]
VWATAVAW
A_A^A\_^
AUAVAWH
@A_A^A]
@USVWATAUAVAWH
H!D$ I
hA_A^A]A\_^[]
ffffff
fffffff
@SUVWATAVAWH
@A_A^A\_^][
ATAVAWH
A_A^A\
USVWAVH
A^_^[]
LcA<E3
u HcA<H
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__swift_1
__swift_2
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
operator co_await
operator<=>
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`anonymous namespace'
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
Unknown exception
bad exception
(null)
CorExitProcess
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
AreFileApisANSI
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
[aOni*{
~ $s%r
@b;zO]
v2!L.2
1#QNAN
1#SNAN
UUUUUU
UUUUUU
=imb;D
/>58d%
VM>cQ6
>jtm}S
)>6{1n
+f)>0'
;H9>&X
*StO9>T
n03>Pu
K~Je#>!
bp(=>?g
BC?>6t9^
K&>.yC
.xJ>Hf
y\PD>!
|b=})>
c [1>H'
uzKs@>
3>N;kU
kE>fvw
V6E>`"(5
?UUUUUU
?7zQ6$
.text$mn
.text$mn$00
.text$x
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$r
.rdata$voltmd
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.data$rs
.pdata
_RDATA
.rsrc$01
.rsrc$02
FindFirstFileA
FindNextFileA
FindClose
WaitForSingleObject
GetModuleHandleA
GetFileAttributesA
GlobalAlloc
CloseHandle
WideCharToMultiByte
KERNEL32.dll
SHGetSpecialFolderPathA
SHGetKnownFolderPath
SHELL32.dll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
CreateFileW
WriteConsoleW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
"bdSPPP
Qr`]VYz
]QQQUPS
RSQPQB
YE`\W'J
ST}PPXXPX
RPP]PDP213;7"?%>4~:#QP@PPPPPPPPPPPPPPPPP
{~xug~
WSu<Ee
ST}PPXXP
XPPZPDP3?>$5>$~:#QP@PPPPPPPPPPPPPPPPP
E+@@M0
ST}PPXPP
_PPXPDP93?>~ >7QP@PPPPPPPPPPPPPPPPP
]ZJZPPP]
}2rQ3Y
q:%Q#vt
A|7Sdx
2Ky@P)c
5)aQ;M
h4 e>0
6$ZV`[r(7
MW J3.
5D\pZw,
B}4p9W
[}NG}sw
;x4*,}N
<!xA!h
ST}PPXXP
/QPP`SPP]PDP=1>965#$~:#?>QP@PPPPPPPPPPPPPPPPP
Ud$gR2
QRPPDPPXXPX
RPP]PPPPPPPQPPPPPPPPP213;7"?%>4~:#
QRPPDPPXXP
XPPZPPPPPPPQPPPPP
QPP3?>$5>$~:#
QRPPDPPXPP
_PPXPPPPPPPPPPPPP
TPP93?>~ >7
QRPPDPPXXP
/QPP`SPP]PPPPPPPQPPPPP
DPP=1>965#$~:#?>
UVPPPPTPTP
PPP2FPPPP
305?59/
5?.3/3:(
$(92/532
2/(=00
3.?905/(
305?59/
5?.3/3:(
$(92/532
2/(=00
3.?905/(
9:=)0(
5?.3/3:(
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
305?59/
5?.3/3:(
$(92/532
2/(=00
003+05/(
305?59/
5?.3/3:(
$(92/532
2/(=00
3.?905/(
|1/98;9r9$9
|1/98;9r9$9|s
305?59/
5?.3/3:(
$(92/532
2/(=00
003+05/(
?;9;;>90:,18:,61;1895,=5>97,;>82
+5283+/
/%/(91on
(=/77500r9$9
9;03/9
5?.3/3:(
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
5?.3/3:(
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
~|qq23q/(=.(),q+5283+|qq03=8q9$(92/532a~
5?.3/3:(
.9=(9
5.9?(3.%
=//r?.$
9;.9=(9
onr800
~|qq4589q?.=/4q.9/(3.9q>)>>09
5>.=.%
onr800
305?59/
5?.3/3:(
$(92/532
2/(=00
003+05/(
$(92/532
2/(=00
3.?905/(
?;9;;>90:,18:,61;1895,=5>97,;>82
.9=(9
.3?9//
?;9;;>90:,18:,61;1895,=5>97,;>82
*9./532
5?.3/3:(
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
5?32r,2;
5?.3/3:(
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
*9./532
5?.3/3:(
$(92/532/
y/|t$dju
5?.3/3:(
8;93.9
1/98;9r9$9
*9./532
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
|4((,/fss83+203=8:509799r030s+90?319r,4,
5?.3/3:(
?;9;;>90:,18:,61;1895,=5>97,;>82
|qq,.3:509q85.9?(3.%a~
5?.3/3:(
9:=)0(
$(92/532/
?;9;;>90:,18:,61;1895,=5>97,;>82
.9=(9
$9?)(9
=//r?.$
1=25:9/(r6/32
5?.3/3:(
y/|t$dju
5?.3/3:(
8;93.9
9;03/9
+9>r6/
$5(389
.3?9//
onr800
.3:509|
/9.*5?9r6/
$9?)(9
+]ZYr>1=5rjpr
#r|]ZYr45#3"9 $9?>rjprr|]ZYr&5"#9?>rjpra~`r|]ZYr=1>965#$
&5"#9?>rjpc|]ZYr213;7"?%>4rjp+]ZYYr#5"&935
'?";5"rjpr#5"&935~:#r|]ZYYr$) 5rjpr=?4%<5r]ZY-|]ZYr 5"=9##9?>#rjp
r$12#r|pr#3"9 $9>7r|pr=1>175=5>$r|pr213;7"?%>4r
|]ZYr8?#$
5"=9##9?>#rjp
r38"?=5j
38"?=5~=1>175=5>$~?>
>#$1<<54~144
9#$5>5"x9>6?pmnp+]ZY96px9>6?~94pqmpw3757725<6 =46 :=7=459 1925; 724>wyp"5$%">k]Z]ZY#5$
9=5?%$xxypmnp+]ZYY38"?=5~$12#~3"51$5x+p%"<jpw38"?=5j
?<93)wp-|p$12pmnp+]ZYYY38"?=5~#3"9 $9>7~5(53%$5
3"9 $x+]ZYYYY$1"75$jp+p$12
4jp$12~94p-|]ZYYYY69<5#jp
w'52~:#w
]ZYYpppp-yk]ZYY-yk]ZY-|pe``yk]Z-yk144
9#$5>5"xw<?14w|pxypmnp+]ZY96px<?31$9?>~8?#$pqmmpw ?<93)wyp"5$%">k]Z]ZY3?>#$p"5<?14pmpxypmnp+]ZYY3?>#$p2%$$?>pmp4?3%=5>$~!%5")
5<53$?"xws"5<?14} ?<9395#wyk]Z]ZYY96px2%$$?>yp+]ZYYY2%$$?>~3<93;xyk]ZYYY#5$
9=5?%$x3<?#5|pb``yk]ZYY-p5<#5p+]ZYYY#5$
9=5?%$x"5<?14|pb``yk]ZYY-]ZY-]Z]ZY"5<?14xyk]Z-yk
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVtype_info@@
YYYBBB
ooozzz
IDATx^
IDATx^
YYYBBB
ooozzz
IDATx^
IDATx^
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='requireAdministrator' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
PL1"0
Unizeto Technologies S.A.1'0%
Certum Certification Authority1$0"
Certum Trusted Network CA 20"
20111006083956Z
20461006083956Z0
PL1"0
Unizeto Technologies S.A.1'0%
Certum Certification Authority1$0"
Certum Trusted Network CA 20
cyD~Kc$
.4?)LR
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
230714000000Z
341013235959Z0H1
DigiCert, Inc.1 0
DigiCert Timestamp 20230
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
l2|X/gGe
PL1"0
Unizeto Technologies S.A.1'0%
Certum Certification Authority1$0"
Certum Trusted Network CA 20
210519053213Z
360518053213Z0j1
PL1!0
Asseco Data Systems S.A.1806
/Certum Extended Validation Code Signing 2021 CA0
A~Nd'Xx
http://crl.certum.pl/ctnca2.crl0l
http://subca.ocsp-certum.com02
&http://repository.certum.pl/ctnca2.cer09
http://www.certum.pl/CPS0
fs]wSH
@IR#cyv
PL1!0
Asseco Data Systems S.A.1806
/Certum Extended Validation Code Signing 2021 CA0
230705053558Z
240704053557Z0
Tartu1
Private Organization1
167571711
Harjumaa1
IconSoft O
IconSoft O
:QS,cR
0http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
"http://cevcsca2021.ocsp-certum.com07
+http://repository.certum.pl/cevcsca2021.cer0
https://www.certum.pl/CPS0
EE-TARTU-ICONSOFT O
d"4,`4X
W1f6.
C]7vHL
PL1!0
Asseco Data Systems S.A.1806
/Certum Extended Validation Code Signing 2021 CA
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
230817164424Z0/
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
api-ms-
(null)
mscoree.dll
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
api-ms-win-appmodel-runtime-l1-1-2
user32
ext-ms-
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
iE&xit
h&About ...
About ExtInstaller2019
MS Shell Dlg
ExtInstaller2019, Version 1.0
Copyright (c) 2023
ExtInstaller2019
EXTINSTALLER2019
Antivirus Signature
Bkav W32.Common.BAB208BF
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
DrWeb Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Trojan.GenericKD.68809411
Malwarebytes Clean
Zillya Clean
Sangfor Clean
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Trojan.GenericKD.68809411
K7GW Trojan ( 005a9cfd1 )
K7AntiVirus Trojan ( 005a9cfd1 )
BitDefenderTheta Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win64/TrojanDropper.Agent.ID
APEX Clean
Paloalto Clean
Cynet Malicious (score: 99)
Kaspersky Clean
Alibaba TrojanDropper:Win64/MalwareX.222c192e
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Trojan.GenericKD.68809411
Tencent Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/Drop.Agent.yikaz
Baidu Clean
VIPRE Trojan.GenericKD.68809411
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
Trapmine Clean
FireEye Trojan.GenericKD.68809411
Emsisoft Trojan.GenericKD.68809411 (B)
SentinelOne Clean
Jiangmin Clean
Webroot W32.Malware.Gen
Avira TR/Drop.Agent.yikaz
MAX malware (ai score=80)
Antiy-AVL Trojan/Win32.Wacatac
Microsoft Trojan:Win64/Generic
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm Clean
GData Trojan.GenericKD.68809411
Google Detected
AhnLab-V3 Packed/Win.Agent.C5468009
Acronis Clean
McAfee Artemis!F0E7DEF68CF0
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Dropper.Agent!8.2F (TFE:5:43LKmx2sMyE)
Yandex Clean
Ikarus Trojan-Dropper.Win64.Agent
MaxSecure Clean
Fortinet W64/Agent.ID!tr
AVG Win64:MalwareX-gen [Trj]
Cybereason malicious.7b9e70
Avast Win64:MalwareX-gen [Trj]
No IRMA results available.