2.4
中危

0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613

0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe

分析耗时

134s

最近分析

381天前

文件大小

480.0KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM PLUTO
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.73
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:KillAV-XB [Trj] 20200126 18.4.3895.0
Baidu Win32.Worm.Eggnog.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200126 2013.8.14.323
McAfee W32/Pluto.gen@MM 20200126 6.0.6.653
Tencent Malware.Win32.Gencirc.10b07853 20200126 1.0.0.1
行为判定
动态指标
分配可读-可写-可执行内存(通常用于自解压) (1 个事件)
Time & API Arguments Status Return Repeated
1727545310.35975
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003e0000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2236
success 0 0
在文件系统上创建可执行文件 (50 个事件)
file C:\My Downloads\Hard Truck 18 Wheels of Steel Key Generator.exe
file C:\My Downloads\Hitman 2 Silent Assassin ISO - Full Downloader.exe
file C:\My Downloads\Warcraft 3 battle.net Key Generator.exe
file C:\My Downloads\Red Ace Squadron Full Downloader.exe
file C:\My Downloads\F1 Grand Pix 4 Key Generator.exe
file C:\My Downloads\LordOfTheRingsr Full Downloader.exe
file C:\My Downloads\Age of Sail 2 Key Generator.exe
file C:\My Downloads\Critical Point Manga game Full Downloader.exe
file C:\My Downloads\Necromania Trap Of Darkness Crack.exe
file C:\My Downloads\Macromedia Flash 5.0 ISO - Full Downloader.exe
file C:\My Downloads\Red Ace Squadron Key Generator.exe
file C:\My Downloads\Cabelas Ultimate Deer Hunt 2 Crack.exe
file C:\My Downloads\Dweebs 2 Patch.exe
file C:\My Downloads\Quake 3 Arena ISO - Full Downloader.exe
file C:\My Downloads\Grand Prix 4 ISO - Full Downloader.exe
file C:\My Downloads\AikaQuest3Hentai Crack.exe
file C:\My Downloads\Internet and Computer Speed Booster Key Generator.exe
file C:\My Downloads\FIFA 2003 ISO - Full Downloader.exe
file C:\My Downloads\The Sun Of All Fears Patch.exe
file C:\My Downloads\Industry Giant 2 Crack.exe
file C:\My Downloads\Borland Delphi 6 ISO - Full Downloader.exe
file C:\My Downloads\Red Ace Squadron ISO - Full Downloader.exe
file C:\My Downloads\Cat Attacks Child ISO - Full Downloader.exe
file C:\My Downloads\Dark Age Of Camelot Shrouded Isles Patch.exe
file C:\My Downloads\Dark Age Of Camelot Shrouded Isles Full Downloader.exe
file C:\My Downloads\Winzip 8.0 Crack.exe
file C:\My Downloads\Grand Prix 4 Key Generator.exe
file C:\My Downloads\CKY3 - Bam Margera World Industries Alien Workshop ISO - Full Downloader.exe
file C:\My Downloads\MS Train Simulator ISO - Full Downloader.exe
file C:\My Downloads\Tomb Raider 3 Crack.exe
file C:\My Downloads\Soldiers Of Anarchy Crack.exe
file C:\My Downloads\Free Virus Removal Tool From Symantec Key Generator.exe
file C:\My Downloads\Emperor Rise Of the Middle Kingdom Key Generator.exe
file C:\My Downloads\Age Of Empires 2 ISO - Full Downloader.exe
file C:\My Downloads\Macromedia Dreamweaver MX Patch.exe
file C:\My Downloads\LordOfTheRingsr Key Generator.exe
file C:\My Downloads\Tomb Raider 3 Key Generator.exe
file C:\My Downloads\BORLAND Delphi 7 Key Generator.exe
file C:\My Downloads\Norton AntiVirus 2002 ISO - Full Downloader.exe
file C:\My Downloads\KaZaA Spyware Remover Full Downloader.exe
file C:\My Downloads\MoviezChannelsInstaler Patch.exe
file C:\My Downloads\Nero Burning Rom 5.8.0.1 ISO - Full Downloader.exe
file C:\My Downloads\Mafia Full Downloader.exe
file C:\My Downloads\Windows XP Key Generator.exe
file C:\My Downloads\AIM Account Stealer Patch.exe
file C:\My Downloads\Zidane-ScreenInstaler ISO - Full Downloader.exe
file C:\My Downloads\Austerlitz Napoleons Greatest Victory Patch.exe
file C:\My Downloads\Battle.net Patch.exe
file C:\My Downloads\Age of Sail 2 Crack.exe
file C:\My Downloads\Stronghold Crusader Patch.exe
创建隐藏或系统文件 (4 个事件)
Time & API Arguments Status Return Repeated
1727545310.50075
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath: C:\My Downloads
filepath_r: C:\My Downloads
success 1 0
1727545310.79775
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath: C:\Windows\rundll32_.exe
filepath_r: C:\Windows\rundll32_.exe
success 1 0
1727545310.81275
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath: C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\J5FJV4ueci.exe
filepath_r: C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\J5FJV4ueci.exe
success 1 0
1727545310.81275
SetFileAttributesW
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\D1yO0Db8oRw.exe
filepath_r: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\D1yO0Db8oRw.exe
success 1 0
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
Attempts to identify installed AV products by installation directory (1 个事件)
file C:\My Downloads\Norton AntiVirus 2002 ISO - Full Downloader.exe
从本地电子邮件客户端收集凭据 (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail\NoMailClient
文件已被 VirusTotal 上 56 个反病毒引擎识别为恶意 (50 out of 56 个事件)
ALYac Trojan.Agent.DQRF
APEX Malicious
AVG Win32:KillAV-XB [Trj]
Acronis suspicious
Ad-Aware Trojan.Agent.DQRF
AhnLab-V3 Win32/Pluto.worm.464460
Arcabit Trojan.Agent.DQRF
Avast Win32:KillAV-XB [Trj]
Avira TR/Downloader.Gen
Baidu Win32.Worm.Eggnog.a
BitDefender Trojan.Agent.DQRF
BitDefenderTheta AI:Packer.F87A7C0321
CAT-QuickHeal Worm.PlutoPMF.S2185859
ClamAV Win.Malware.Pluto-6911336-0
Comodo Worm.Win32.Pluto.A@2enn
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.c7a8d8
Cyren W32/DelfInject.E.gen!Eldorado
DrWeb Win32.HLLM.Pluton.1
ESET-NOD32 Win32/Pluto.A
Emsisoft Trojan.Agent.DQRF (B)
Endgame malicious (high confidence)
F-Prot W32/DelfInject.E.gen!Eldorado
F-Secure Trojan.TR/Downloader.Gen
FireEye Generic.mg.bc5384bc7a8d8761
Fortinet W32/Pluto.A!worm
GData Trojan.Agent.DQRF
Invincea heuristic
Jiangmin Worm/Sramota.qz
K7AntiVirus Trojan ( 00003f371 )
K7GW Trojan ( 00003f371 )
Kaspersky Email-Worm.Win32.Pluto.gen
MAX malware (ai score=88)
Malwarebytes Worm.PlutonX
MaxSecure Backdoor.Generic
McAfee W32/Pluto.gen@MM
McAfee-GW-Edition BehavesLike.Win32.Pluto.gh
MicroWorld-eScan Trojan.Agent.DQRF
Microsoft Worm:Win32/Pluto.A@mm
NANO-Antivirus Trojan.Win32.Pluto.fsey
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM05.1.D1A5.Malware.Gen
Rising Backdoor.Generic!8.CE (TFE:dGZlOgWa1an1NOoRFA)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos W32/Pluto-A
Symantec W32.HLLW.Pluto
TACHYON Worm/W32.DP-Pluto.Zen
Tencent Malware.Win32.Gencirc.10b07853
Trapmine malicious.moderate.ml.score
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

PE Imphash

f567617694c2b74ca607507ab4d0305c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x00043000 0x00043000 6.535173231266724
UPX1 0x00044000 0x00028000 0x00027200 4.591644018248605
.rsrc 0x0006c000 0x00001000 0x00000e00 3.4389958687436275
.imports 0x0006d000 0x00002000 0x00001c00 4.649428421907257

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x00064df0 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_CURSOR 0x00064df0 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_CURSOR 0x00064df0 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_CURSOR 0x00064df0 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_CURSOR 0x00064df0 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_CURSOR 0x00064df0 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_CURSOR 0x00064df0 0x00000134 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x0006c6bc 0x000002e8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00066be8 0x00000314 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_RCDATA 0x00067128 0x00000155 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_RCDATA 0x00067128 0x00000155 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_RCDATA 0x00067128 0x00000155 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000672f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000672f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000672f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000672f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000672f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000672f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_CURSOR 0x000672f8 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_ICON 0x0006c9a8 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.DLL:
0x45920c TlsSetValue
0x459210 TlsGetValue
0x459214 LocalAlloc
0x459218 GetModuleHandleA
0x45921c GetModuleFileNameA
Library KERNEL32.DLL:
0x459248 lstrcpyA
0x459250 WriteFile
0x459254 WaitForSingleObject
0x459258 VirtualQuery
0x45925c VirtualAlloc
0x459260 TerminateProcess
0x459264 Sleep
0x459268 SizeofResource
0x45926c SetThreadLocale
0x459270 SetFilePointer
0x459274 SetFileAttributesA
0x459278 SetEvent
0x45927c SetErrorMode
0x459280 SetEndOfFile
0x459284 ReadFile
0x459288 OpenProcess
0x45928c MulDiv
0x459290 LockResource
0x459294 LoadResource
0x459298 LoadLibraryA
0x4592a4 GlobalUnlock
0x4592a8 GlobalReAlloc
0x4592ac GlobalHandle
0x4592b0 GlobalLock
0x4592b4 GlobalFree
0x4592b8 GlobalDeleteAtom
0x4592bc GlobalAlloc
0x4592c0 GlobalAddAtomA
0x4592c8 GetVersionExA
0x4592cc GetVersion
0x4592d0 GetTickCount
0x4592d4 GetThreadLocale
0x4592d8 GetSystemInfo
0x4592dc GetProfileIntA
0x4592e0 GetProcAddress
0x4592e8 GetModuleHandleA
0x4592ec GetModuleFileNameA
0x4592f0 GetLocaleInfoA
0x4592f4 GetLocalTime
0x4592f8 GetLastError
0x4592fc GetExitCodeThread
0x459300 GetDriveTypeA
0x459304 GetDiskFreeSpaceA
0x459308 GetDateFormatA
0x45930c GetCurrentThreadId
0x459310 GetCurrentProcessId
0x459314 GetCPInfo
0x459318 FreeResource
0x45931c FreeLibrary
0x459320 FormatMessageA
0x459324 FindResourceA
0x459328 FindNextFileA
0x45932c FindFirstFileA
0x459330 FindClose
0x45933c EnumCalendarInfoA
0x459344 DeleteFileA
0x45934c CreateThread
0x459350 CreateMutexA
0x459354 CreateFileA
0x459358 CreateEventA
0x45935c CreateDirectoryA
0x459360 CopyFileA
0x459364 CompareStringA
0x459368 CloseHandle
Library KERNEL32.DLL:
0x45912c GetCurrentThreadId
0x459140 VirtualFree
0x459144 VirtualAlloc
0x459148 LocalFree
0x45914c LocalAlloc
0x459158 VirtualQuery
0x45915c WideCharToMultiByte
0x459160 MultiByteToWideChar
0x459164 lstrlenA
0x459168 lstrcpyA
0x45916c LoadLibraryExA
0x459170 GetThreadLocale
0x459174 GetStartupInfoA
0x459178 GetModuleFileNameA
0x45917c GetLocaleInfoA
0x459180 GetLastError
0x459184 GetCommandLineA
0x459188 FreeLibrary
0x45918c ExitProcess
0x459190 ExitThread
0x459194 CreateThread
0x459198 WriteFile
0x45919c SetFilePointer
0x4591a0 SetEndOfFile
0x4591a4 RtlUnwind
0x4591a8 ReadFile
0x4591ac RaiseException
0x4591b0 GetStdHandle
0x4591b4 GetFileSize
0x4591b8 GetSystemTime
0x4591bc GetFileType
0x4591c0 CreateFileA
0x4591c4 CloseHandle
Library advapi32.dll:
0x4591dc RegQueryValueExA
0x4591e0 RegOpenKeyExA
0x4591e4 RegCloseKey
Library advapi32.dll:
0x459224 RegSetValueExA
0x459228 RegQueryValueExA
0x45922c RegQueryInfoKeyA
0x459230 RegOpenKeyExA
0x459234 RegFlushKey
0x459238 RegEnumKeyExA
0x45923c RegCreateKeyExA
0x459240 RegCloseKey
Library comctl32.dll:
0x4596d4 ImageList_Read
0x4596e4 ImageList_DragMove
0x4596e8 ImageList_DragLeave
0x4596ec ImageList_DragEnter
0x4596f0 ImageList_EndDrag
0x4596f4 ImageList_BeginDrag
0x4596f8 ImageList_Remove
0x4596fc ImageList_DrawEx
0x459700 ImageList_Draw
0x459710 ImageList_Add
0x459718 ImageList_Destroy
0x45971c ImageList_Create
Library gdi32.dll:
0x459380 UnrealizeObject
0x459384 StretchBlt
0x459388 SetWindowOrgEx
0x45938c SetViewportOrgEx
0x459390 SetTextColor
0x459394 SetStretchBltMode
0x459398 SetROP2
0x45939c SetPixel
0x4593a0 SetDIBColorTable
0x4593a4 SetBrushOrgEx
0x4593a8 SetBkMode
0x4593ac SetBkColor
0x4593b0 SelectPalette
0x4593b4 SelectObject
0x4593b8 SaveDC
0x4593bc RestoreDC
0x4593c0 RectVisible
0x4593c4 RealizePalette
0x4593c8 PatBlt
0x4593cc MoveToEx
0x4593d0 MaskBlt
0x4593d4 LineTo
0x4593d8 IntersectClipRect
0x4593dc GetWindowOrgEx
0x4593e0 GetTextMetricsA
0x4593e4 GetTextExtentPointA
0x4593ec GetStockObject
0x4593f0 GetPixel
0x4593f4 GetPaletteEntries
0x4593f8 GetObjectA
0x4593fc GetDeviceCaps
0x459400 GetDIBits
0x459404 GetDIBColorTable
0x459408 GetDCOrgEx
0x459410 GetClipBox
0x459414 GetBrushOrgEx
0x459418 GetBitmapBits
0x45941c ExcludeClipRect
0x459420 EnumFontsA
0x459424 EnumFontFamiliesExA
0x459428 DeleteObject
0x45942c DeleteDC
0x459430 CreateSolidBrush
0x459434 CreateRectRgn
0x459438 CreatePenIndirect
0x45943c CreatePalette
0x459444 CreateFontIndirectA
0x459448 CreateDIBitmap
0x45944c CreateDIBSection
0x459450 CreateCompatibleDC
0x459458 CreateBrushIndirect
0x45945c CreateBitmap
0x459460 BitBlt
Library mpr.dll:
0x459370 WNetOpenEnumA
0x459374 WNetEnumResourceA
0x459378 WNetCloseEnum
Library ole32.dll:
0x4596c0 IsEqualGUID
Library oleaut32.dll:
0x4591ec VariantChangeTypeEx
0x4591f0 VariantCopyInd
0x4591f4 VariantClear
0x4591f8 SysStringLen
0x4591fc SysFreeString
0x459200 SysReAllocStringLen
0x459204 SysAllocStringLen
Library user32.dll:
0x459468 WindowFromPoint
0x45946c WinHelpA
0x459470 WaitMessage
0x459474 UpdateWindow
0x459478 UnregisterClassA
0x45947c UnhookWindowsHookEx
0x459480 TranslateMessage
0x459488 TrackPopupMenu
0x459490 ShowWindow
0x459494 ShowScrollBar
0x459498 ShowOwnedPopups
0x45949c ShowCursor
0x4594a0 SetWindowRgn
0x4594a4 SetWindowsHookExA
0x4594a8 SetWindowTextA
0x4594ac SetWindowPos
0x4594b0 SetWindowPlacement
0x4594b4 SetWindowLongA
0x4594b8 SetTimer
0x4594bc SetScrollRange
0x4594c0 SetScrollPos
0x4594c4 SetScrollInfo
0x4594c8 SetRect
0x4594cc SetPropA
0x4594d0 SetMenuItemInfoA
0x4594d4 SetMenu
0x4594d8 SetForegroundWindow
0x4594dc SetFocus
0x4594e0 SetCursor
0x4594e4 SetCapture
0x4594e8 SetActiveWindow
0x4594ec SendMessageA
0x4594f0 ScrollWindow
0x4594f4 ScreenToClient
0x4594f8 RemovePropA
0x4594fc RemoveMenu
0x459500 ReleaseDC
0x459504 ReleaseCapture
0x459510 RegisterClassA
0x459514 PtInRect
0x459518 PostQuitMessage
0x45951c PostMessageA
0x459520 PeekMessageA
0x459524 OffsetRect
0x459528 OemToCharA
0x459530 MessageBoxA
0x459534 MapWindowPoints
0x459538 MapVirtualKeyA
0x45953c LoadStringA
0x459540 LoadIconA
0x459544 LoadCursorA
0x459548 LoadBitmapA
0x45954c KillTimer
0x459550 IsZoomed
0x459554 IsWindowVisible
0x459558 IsWindowEnabled
0x45955c IsWindow
0x459560 IsIconic
0x459564 IsDialogMessageA
0x459568 IsChild
0x45956c InvalidateRect
0x459570 IntersectRect
0x459574 InsertMenuItemA
0x459578 InsertMenuA
0x45957c InflateRect
0x459584 GetWindowTextA
0x459588 GetWindowRgn
0x45958c GetWindowRect
0x459590 GetWindowPlacement
0x459594 GetWindowLongA
0x459598 GetWindowDC
0x45959c GetTopWindow
0x4595a0 GetSystemMetrics
0x4595a4 GetSystemMenu
0x4595a8 GetSysColor
0x4595ac GetSubMenu
0x4595b0 GetScrollRange
0x4595b4 GetScrollPos
0x4595b8 GetScrollInfo
0x4595bc GetPropA
0x4595c0 GetParent
0x4595c4 GetWindow
0x4595c8 GetMenuStringA
0x4595cc GetMenuState
0x4595d0 GetMenuItemInfoA
0x4595d4 GetMenuItemID
0x4595d8 GetMenuItemCount
0x4595dc GetMenu
0x4595e0 GetLastActivePopup
0x4595e4 GetKeyboardState
0x4595ec GetKeyboardLayout
0x4595f0 GetKeyState
0x4595f4 GetKeyNameTextA
0x4595f8 GetIconInfo
0x4595fc GetForegroundWindow
0x459600 GetFocus
0x459604 GetDesktopWindow
0x459608 GetDCEx
0x45960c GetDC
0x459610 GetCursorPos
0x459614 GetCursor
0x459618 GetClientRect
0x45961c GetClassInfoA
0x459620 GetCapture
0x459624 GetActiveWindow
0x459628 FrameRect
0x45962c FindWindowA
0x459630 FillRect
0x459634 EqualRect
0x459638 EnumWindows
0x45963c EnumThreadWindows
0x459640 EndPaint
0x459644 EnableWindow
0x459648 EnableScrollBar
0x45964c EnableMenuItem
0x459650 DrawTextA
0x459654 DrawMenuBar
0x459658 DrawIcon
0x45965c DrawFrameControl
0x459660 DrawFocusRect
0x459664 DrawEdge
0x459668 DispatchMessageA
0x45966c DestroyWindow
0x459670 DestroyMenu
0x459674 DestroyIcon
0x459678 DestroyCursor
0x45967c DeleteMenu
0x459680 DefWindowProcA
0x459684 DefMDIChildProcA
0x459688 DefFrameProcA
0x45968c CreateWindowExA
0x459690 CreatePopupMenu
0x459694 CreateMenu
0x459698 CreateIcon
0x45969c ClientToScreen
0x4596a0 CheckMenuItem
0x4596a4 CallWindowProcA
0x4596a8 CallNextHookEx
0x4596ac BeginPaint
0x4596b0 CharLowerA
0x4596b4 AdjustWindowRectEx
Library user32.dll:
0x4591cc GetKeyboardType
0x4591d0 LoadStringA
0x4591d4 MessageBoxA
Library WININET.DLL:
Library wsock32.dll:
0x459724 WSACleanup
0x459728 WSAStartup
0x45972c WSASetLastError
0x459730 WSAGetLastError
0x459740 WSAAsyncSelect
0x459744 gethostname
0x459748 getservbyname
0x45974c getprotobyname
0x459750 gethostbyname
0x459754 socket
0x459758 shutdown
0x45975c setsockopt
0x459760 sendto
0x459764 send
0x459768 recvfrom
0x45976c recv
0x459770 ntohs
0x459774 ntohl
0x459778 listen
0x45977c ioctlsocket
0x459780 inet_ntoa
0x459784 inet_addr
0x459788 htons
0x45978c getsockname
0x459790 getpeername
0x459794 connect
0x459798 closesocket
0x45979c bind
0x4597a0 accept

L!This program must be run under Win32
.imports
Boolean
Integer
Cardinal
String
TObject
TObject
System
IUnknown
System
TInterfacedObject%
;u3YZ]_^[
SVWUL$
]_^[SVWUL$
uZ]_^[
SVWUdE
YZ]_^[
_^[U3Uh
d2d"h4E
]US=,E
d2d"=EE
u3ZYYd
#_^[SVWU
YZ]_^[SVW
SVW<$L$
]_^[USVW
3Uhd"@
d1d!=EE
2E3ZYYd
E_^[YY]
UQSVW30E
d1d!=EE
E3ZYYd
E_^[Y]
YZ]_^[
d2d"=EE
}3ZYYd
E_^[Y]
< v;"u
Ek<1fU
9uDJt
1^[^8u
-CGL$
SVWPts11
-ti+tf$tfxtaXt\0u
FxtOXtJt
Y12_^[F
FuP*Bt
uM3Uh]-@
EP3ZYYd
f%fUf?f
SOFTWARE\Borland\Delphi\RTL
FPUMaskValue
Iu9u_^[
]U3Uh/@
33ZYYd
_^[YY]SV
_^[RQS|
PRQQTj
S1VWUd
SPRQT$(j
R|$(U0
9t7H;Ou
Ku]_^[
SPRQT$(H
R[|$(/
ZTUWVSPRTj
Zd$,1Yd
t=HtN`
r6t0R=
t/=t&,*&"
3UhZ7@
d2d";~
P?_^[]
Ku^[SV
t>?=DE
^Portions Copyright (c) 1983,97 Borland
U1UhP6@
QRZX1Yd
PVS_^[]
PQqZXSVW
ISVRP1L
JZ^[X$
thtkFW)w
9uXJt
8uAJt
t+JIt%S
[St-Xt&J|
t0JN|*9}&~")9~
t@t1SVW
1Z)_^[
$}X<$t
_^[PSVW
Mu]_^[
r*PRf8
u&PX%E
USVW}Q
ft=HfE
UQS3EB
^[USEf
d0d UE3ZYYd
y3UhJ@
d0d UE3ZYYd
-E9[]f:
PRZXt#JA~
PRBXXRJZXf
USVWME]
3mEE;Et
u5];}}
MO|"GE
uUSVEh
um3UhO@
EPL3ZYYd
;u;tmC}
t@EPS[j
Software\Borland\Locales
Software\Borland\Delphi\Locales
t93UhQ@
d0d ]ES
u_^[YY]
UQE3Uh
d2d"E@
t3ZYYd
Ht Ht.I
+P6j@tg6XHu]"F$dS@
H H$@Ht
HXYu3s
HXYu3s
_^[3C$
QRP<XZYx
@~!@PQ@
PRZX[B5`E
RPrXZx
_^|HtE=
@aQYR@
b@"E@|oe@p+
BkU'9p|B0<RB~QC/j\
Cv)/&D
dEJzEb
9;5S]=];Z T7aZ%]g']
R`%uYnb
5{RPD$
USVW3\$
USVW\$
3USVW3\$
USVW\$
H3ZYYd
d0d -(E
U3Uhqd@
QRPhPPqdPN
PNPPW2
S] S]$SQRPj
UQSVWEh
Magellan MSWHEEL
MouseZ
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
U3Uho@
U3Uho@
U3Uhr@
TFileNamer@
TSearchRecX
Exceptions@
EAbort
EHeapException\t@
EOutOfMemory@
EInOutError
EExternalhu@
EExternalExceptionu@
EIntError v@
EDivByZeroxv@
ERangeErrorv@
EIntOverflow@
EMathErrorw@
EInvalidOpw@
EZeroDivide4x@
EOverflowx@
EUnderflowx@
EInvalidPointer@y@
EInvalidCast@
EConvertErrory@
EAccessViolation@
EPrivilegez@
EStackOverflow
EControlCd{@
EVariantError{@
EAssertionFailed@
EAbstractError||@
EIntfCastError|@
EWin32Error
TActiveThreadArray
$TMultiReadExclusiveWriteSynchronizerUS
"[SVWVW
BFKu_^[
BFKu_^[
9t*^ar
_^[SVWUI
| v;}
N|7 vU+A
U3X3ZYYd
LP^[SVWQj
$Z_^[SVWQj
PWVSu
$Z_^[Qj
u%EPPEPEPEPu
uTC,PSC
3URURURURP:
EUE3RPEUM
E3RPEUM
1FW)^_
1FW)[^_
1t$Far
)t[^_
D$ D$$
(_^[SV
9t%t^]E-u
*t"0r<9w7k
X_^[[]
+;}$E|PEPE
E1PEPE
d0d eU3
U3X,3ZYYd
sMf<sGf<sAf
LUSVW3
d0d fE
eE3ZYYd
EEMf`xV
f;\Fwb
E_^[YY]
d0d EP
EE_^[]
USVMUu
}URMfhf}
fMfEfkEdf
fLJfMfMf;Mr
fMf)M@f
EZY^[]
d0d iE
f@fEEd@
PEgPEPj
K3ZYYd
OEGa^[]
PEPEPj
EOi^[]
E3Uhs@
U-YURYE
YU%YEH
t%HtFHtgyUYE
UYUQYE
UYUUY}
UYU$Y}
lu/UYE
(u/UfYE
YUBYf}
E"<^[]AM/PM
t_^[USVWMUE
]E3Uh@
&_^[YY]
)D>$,Dt
SVWUQ3
$Z]_^[
d0d 3fE
t"t:Rf}EEfEfEfEfE6f}EEfEfEfEfE
f}EEfEfEfEfE}
;~5fd/}
fEfEfEfE
fEfEfEfE
}uEPfMfUE3ZYYd
U3Uhy@
;E|#UDxE
U3Xi3ZYYd
6E[]US3
M;E|#U@wE
U3X3ZYYd
E[]US3
3EEMUt
;E|ZMUuIE
Ee]3ZYYd
Z_^[UQSVWM]
1_^[Y]
USVW3E3Uh
JCDHyYU
JC8HVYUsC
u3ZYYd
_^[]USVWu
u3_^[]
UQSVW]
u3_^[Y]
d0d EP30@
SVW3Uh@
tUJC:;~
{UQCA;
T$@XwE
b6x8j@D$
PD$HPj
d0d PU
"3ZYYd
d0d EPU
|3ZYYd
TErrorRec
USV3E3Uhi@
d0d 3v
E,F^[]|@
TExceptRec
]]3Uh~@
U3E3Uh@
d0d 3EE
t<HtHU
r3t7G=
SV3E3Uh4@
UE3Uh@
d0d E%
Y;UY0E
@@F;}_^[
UVWMU%
;U|;Uu
JRK;\$
$YZ^[SV
$~FK;~
$YZ^[SVWU3
+G]_^[
YZ]_^[
u^[SVW
_^[SVWU
U3QQQQQS3Uh
d0d *=E
Y}EP @
7}E|E|EP@
7E3u?EP@
|uuhd@
m/d/yy
mmmm d, yyyy
:mm:ss
US3EE3Uh
t3ZYYd
kernel32.dll
GetDiskFreeSpaceExA
tN(;F,t;
C C$3C 3C,C4
INFNANU
+E[^_]
N[YCV5E
N^$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)U@WVSE
<'t$<"t
33EUU<#t&<0t%<.t,<,t3<'t5<"t1<Et:<et6<;tF
-<#t'<0t#<.t<,t<'t
<Et$<et <;tS
-u2AF>0t
KE;E~10}
00fJu2}
3m[^_]
< tN33
EEBN33
k3ZYYd
U3UhM@
d0d -E
93ZYYd
SVWt;1
uKu_^[SW:?
SVW3Uh
d0d EkM
Ej^_^[Y]
[[~[USV1
k3ZYYd
TBiDiMode
bdLeftToRight
bdRightToLeft
bdRightToLeftNoAlign
bdRightToLeftReadingOnly(@
THelpContext
TShortCut
TNotifyEvent
Sender
TObject@
THelpEvent
Command
Integer
CallHelp
Boolean
Boolean
EStreamError@
EFCreateError@
EFOpenError @
EFilerErrorx@
EReadError@
EWriteError(@
EClassNotFound@
EResNotFound@
EListError8@
EBitsError@
EStringListError@
EComponentErrorL@
EOutOfResources@
EInvalidOperation
TListl@
TThreadList@
TPersistentD@
TPersistent
Classes
IStringsAdapter
Classes
TStringsx@
TStrings@
Classes
TStringItem
TStringList@
TStringList
Classes
TStreaml@
THandleStream@
TFileStream@@
TCustomMemoryStream@
TMemoryStream @
TResourceStream
TStreamAdapter(@
TFiler@
TReader
TThread(@
TComponentName<@
IDesignerNotify
Classes
TComponent@
TComponent@
Classes
TBasicActionLink@
TBasicAction@
TBasicAction@
Classes
TIdentMapEntry
d0d EPUhyE
TgEP]E
I3ZYYd
EUEhBt
EI$3E3ZYYd
HE_^[YY]
MU3Uh@
d2d"AEbEltI
8lAERPEU
E}AEE;
uE?3ZYYd
@EOEt@E
o3ZYYd
G3ZYYd
LELF^[]
Nuu]]USVW
QDKu3ZYYd
TIntConstUt
UQSVWUu
Nu3_^[Y]
USVWMu
E_^[YY]
U3UhV@
d0d 3;5l@
;EJEPy\|\
E?HYB^[]
d0d UE
YER3ZYYd
xA3ZYYd
$f8=<$
SV3Uh@
43ZYYd
EF@^[Y]
SV3Uh@
]M3Uh@
E)?^[YY]
SVW3Uh@
<3ZYYd
ED>_^[Y]
=^[SV^
Ku^[Uj
SV3Uh@
d0d ;s
EC=^[Y]Uj
SV3UhI@
ELCf=^[Y]
d0d E@
6UE|63ZYYd
Eq9YY]
d0d E@
EE3Uh@
d0d E@
C3ZYYd
d0d UPyE
;3ZYYd
E'AA;Y]
SVWUQ;s
PRQB6YZXSVWQ
k*93ZYYd
>E>8^[]
1o@f3t3f3Uf3}
IA3ZYYd
UQSEE@
MUE3UhO@
EZ8W8CNu3ZYYd
}63ZYYd
EF<`6_^[]
m1tEEM
Q<3ZYYd
USUEEPh
Strings
MMUE3Uh5
;u;N|0F3
:z4E_^[]
n4YZ^[
S$3ZYYd
ESu33ZYYd
]9S3_^[]
E82[Y]
MMUE3Uh
uN|)FE
uN|@FE
CENu3ZYYd
MUE3Uh!
K|#C3M
FKu3ZYYd
Et71_^[]
MMUE3Uh
Ep;EU{t
ENuE3ZYYd
60E^[]
UQSVWM
S$_^[Y]
Q\3ZYYd
*?0^Y]
d0d E,3Uh
Q,3ZYYd
E/3ZYYd
E{5/^[YY]
d0d ;tdEy3Uh
Eb3ZYYd
/3ZYYd
E4._^[YY]
MUE3Uh
d0d E$
t3ZYYd
Qh3ZYYd
En'-^Y]
SV3Uha
E43N-^[Y]
d0d E}4U
Q,3ZYYd
E2,^[Y]
d0d E3Uh
u3ZYYd
E ,3ZYYd
]M3UhF
QD3ZYYd
EO1i+_^[YY]
MUE3Uh
d0d E4
K|C3M
E0*_^[]SV'
F 3F$F(
8Wxt&C
E/)E_^[YY]
Rp3ZYYd
E.(^[Y]
SVW3Uhw
Rp3ZYYd
.8(_^[Y]SX
SVWUL$
SVW3Uhq
-3ZYYd
E$->'_^[Y]
E,&^[Y]
$Z^[Uj
SVW3Uh
E+%_^[Y]
SVW3Uh
Rp3ZYYd
E*$_^[Y]
SVW3UhU
Rp3ZYYd
E@*Z$_^[Y]
]MU3Uh
d0d ]uEU
CN;};u~
Up];]|3ZYYd
E)#_^[]SV
d0d t1U
;t!UxyE
"3ZYYd
E@(Z"^[YY]
d0d t1U
;t!UTxE
61"3ZYYd
E'!^[YY]
E3ZYYd
!E[YY]
d0d fu@m{
3ZYYd
SVW3Uh[
3]_^[USVWt
U3EE3Uh
d0d EPU xE
UQSVWM
PEPVM{
Y_^[Y]
d0d UHxE
[Y]USVWt
TPropFixup@
@[]US
d0d (E
e3ZYYd
FKu3ZYYd
USVWUE=(E
Ku3ZYYd
_^[YY]
UQSVWE=(E
Ku3ZYYd
_^[Y]S
d0d UxE
|4E3ZYYd
d0d UvE
44Ex3ZYYd
EEP`/`
E3UhA
$Z[SVW
C8S4|$
d0d E@,
KEOu3ZYYd
3C,_^[
SV3Uh"A
u!UxyE
d0d PuLElBK
^[Y]UE
USVW3Uh$A
_^[]USVW3Uh
USVW3Uh%A
RB(3ZYYd
MMUE3Uh='A
d0d MUE
E@(E3Uh
d0d EE}
d0d EH
E@(MUf~
E@0UL3ZYYd
UB,3Uh'A
E3ZYYd
[Y]USVWE
E@(EE@$Ef=
UB(3Uh(A
EEJtEb
EUP(EUP$-
t t6DT$
d0d E[
3Uhu,A
MUE3UhD.A
d0d 3Uh-A
d2d"UE
.uE`P+
UYEECqE
E3ZYYd
USVWMUEE
E3Uh.A
d0d Ep
GNu3ZYYd
_^[]Uj
U3Uh/A
d0d Ec
PEPEPEP
g3ZYYd
U3QQQQQQS3Uh1A
@1]qUE
fE!UxyE
@&3ZYYd
]MUE3UhT4A
d0d Ex
Ey<$UE
UUEMUE8YkE<
UE5EUEMEP
UY3ZYYd
[]USVW
MMUE3Uh/7A
d0d 3Uh6A
d0d MUE
UUB03Uh6A
d0d EP
u/E@0X
EKu3ZYYd
P03ZYYd
g3ZYYd
E_^[]USVW3
E3Uh7A
d0d 3Uh7A
93ZYYd
_^[YY]
U3UhX8A
E.3ZYYd
$0Z^[SVQ3
S3Uh9A
d0d U}
u3ZYYd
[]UQUE
UE3Uh;A
d0d E|
UY3ZYYd
S3Uh;A
d0d U3ZYYd
E[Y]USV3
M3Uh<A
d0d t*MU
S U<U2
AtZ3ZYYd
]]3Uh?=A
d0d EmUC
s3ZYYd
E^EVpE_^[]SfxF
SVWfx>
_^[VWS
<$| <$
Pt*3,E
UQSVWE
t]Juf3E3Uh\?A
P)EE_^[Y]
TThreadWindow
PX-hDcE
_^[UQSVWt
_^[Y]SVa
US3C$E
uZ]_^[
MGNu_^[SVWUL$
GNuYZ]_^[UQSVW3EF
EShpCA
d0d tI
S 3ZYYd
K|"C3G
EKu3Z]_^[
M3Uh/HA
tyt9]8u.uE
Ef_^[]
SV3UhHA
FMu]_^[SVW
;C,t:C<p
R0_^[]
SVWUG<p
CNu]_^[
G^[USVWU
33ZYYd
33ZYYd
3Uh{NA
33ZYYd
33ZYYd
d0d 3UhOA
EEwE3UhOA
d0d UF
EPEPEPE
E3ZYYd
33UhPA
d0d t;C
3C 3C$C,
USVW$E
DwFKu3ZYYd
U3UhQA
TColor
EInvalidGraphic
EInvalidGraphicOperation@
TFontPitch
fpDefault
fpVariable
fpFixedlSA
TFontName|SA
TFontCharset
TFontStyle
fsBold
fsItalic
fsUnderline
fsStrikeOut@
TFontStyles
TPenStyle
psSolid
psDash
psDashDot
psDashDotDot
psClear
psInsideFrameXTA
TPenMode
pmBlack
pmWhite
pmCopy
pmNotCopy
pmMergePenNot
pmMaskPenNot
pmMergeNotPen
pmMaskNotPen
pmMerge
pmNotMerge
pmMask
pmNotMask
pmNotXor@
TBrushStyle
bsSolid
bsClear
bsHorizontal
bsVertical
bsFDiagonal
bsBDiagonal
bsCross
bsDiagCrossUA
TGraphicsObjectUA
TGraphicsObjectUA
Graphics
IChangeNotifier
Graphics
TFontVA
TFontVA
Graphics
CharsetPRA
Color(
HeighthSA
Name,SA
Pitch(
SizeSA
Style@
Graphics
ColorTTA
ModeSA
Style(
TBrush0YA
TBrush
Graphics
Style@
TCanvas
TCanvasYA
Graphics
Brush(
CopyModeVA
Font,XA
TGraphic@
TGraphicZA
Graphics
TSharedImage@
TBitmapImage@
TBitmap
TBitmap\A
Graphics
TIconImage]A
TIcon<^A
TIcon]A
Graphics
TResourceManager@
P YE3Uh,`A
d2d"E@
t!Ef;p
E!E^[YY]UUE}
EEE3Uh`A
d1d!EH
E]USVWM
EE;3UhUaA
E3ZYYd
EZ_^[YY]
EE3UhaA
E3ZYYd
E_^[Y]
UQSVEE_3Uh/bA
d2d"EX
u3ZYYd
USV3EE
1E3UhbA
-3ZYYd
clBlack
clMaroon
clGreen
clOlive
clNavy
clPurple
clTeal
clGray
clSilver
clLime
clYellow
clBlue
clFuchsia
clAqua
clWhite
clScrollBar
clBackground
clActiveCaption
clInactiveCaption
clMenu
clWindow
clWindowFrame
clMenuText
clWindowText
clCaptionText
clActiveBorder
clInactiveBorder
clAppWorkSpace
clHighlight
clHighlightText
clBtnFace
clBtnShadow
clGrayText
clBtnText
clInactiveCaptionText
clBtnHighlight
cl3DDkShadow
cl3DLight
clInfoText
clInfoBk
clNone
ANSI_CHARSET
DEFAULT_CHARSET
SYMBOL_CHARSET
MAC_CHARSET
SHIFTJIS_CHARSET
HANGEUL_CHARSET
JOHAB_CHARSET
GB2312_CHARSET
CHINESEBIG5_CHARSET
GREEK_CHARSET
TURKISH_CHARSET
HEBREW_CHARSET
ARABIC_CHARSET
BALTIC_CHARSET
RUSSIAN_CHARSET
THAI_CHARSET
EASTEUROPE_CHARSET
OEM_CHARSET
Tj<VQt|
d0d ]}3UhbjA
E3M3ZYYd
0UEg[YY]
EE3UhjA
E[Y]S;P
U3UhlA
3UholA
d0d Ex
E3E3E3E
Default
PjHLP[
E3UhWoA
d0d ]3Uh:oA
E[u3ZYYd
EE3UhoA
53ZYYd
d0d Ex
ItxE3Uh
d0d ]3UhqA
E3ZYYd
EE*3UhrA
u3ZYYd
"[Y]VWeE
%3UhsA
d2d"Ex
R`E63EE@
UQSVWM
+CLhhE
V}P9PC
$YZ^[SV
UQShhE
3Uh8xA
d0d {L
%wE[Y]
VW<$L$
$0YZ_^
YZ^[Uj
3UhnzA
d0d UwE
E'AY]SVQ
C0S,[Sfx&
C(S$[S
w3r[Uj
d0d UtwE
E3ZYYd
d0d UwE
@Ex3ZYYd
3UhV}A
d0d UvE
E?YY]US33Uh}A
)3ZYYd
L[USVW}
d0d EPj
EPEPEbj
d0d EPEPEPE}
tdEPEP
EPEP~h
EPEPEPj
VEP63ZYYd
EP0EP'IE_^[]
USVWMUu
PsE3Uh
PE PE$PE(PE,PEPEPW3ZYYd
qE3Uh,A
d0d VSE$PPEEPEPEj
PE$PEj
EPE$P}
jEPEPE
PE PE$PVSj
PE(PE,PEPEPW1hF
EPE(PE,PEPEPW
EPWEPW}
EPEPEP3ZYYd
EPEPbEPa
E_^[](
<$?O~&
YZ_^[U
UEEPUMIx3Efx
E3UhEA
d0d jhEPU
SEP3ZYYd
d2d"jhEPS
.WS]D$
S<t)<$
EPEPiE3Uh
3ZYYd
SVWMUEE
ffE3ZYYd
3EMI|BA3
E3UhPA
d0d EP
EEQE3Uh-A
WSEPVEPEPEPEPVWEPEPEPEPhxE
L3ZYYd
Ey_3ZYYd
UEY?_^[]
TjTP[u
mE3UhMA
WEPEEPXj
E3ZYYd
EPEPAEP@b
2EPV3UhrA
MUEi3E3E3E3E3UhKA
d2d"EEEEEEEE
UE~d3ZYYd
EP,EP#=_^[]SVt
USUEEP
RE3UhA
+E3UhA
Ej;uE^
E3ZYYd
E'3ZYYd
QP3ZYYd
QP^UQVh
*E3UhA
QT3ZYYd
TBitmapCanvas8A
TBitmapCanvas
Graphics
fE3UhA
d0d E@
|YEUEaEEJt33Uh
d0d E0
M}u3ZYYd
UQSVE}
ce3UhxA
Ku3ZYYd
qe7^[Y]SVWt
^[UQSEEx
d2d"E@Xt
PNE@\t
EyS/UeE
.d3ZYYd
UQSVEExT
E23UhkA
d0d E@T
VS}UBX
PXE@T@
jVS\UB\S(
b3ZYYd
ED^[Y]
EEPEVEPE3UhA
d0d PSj
EP3ZYYd
EPEPEPEPj
u<fP&f
UhSVWMUE3EE
xPjTEP+
j)EEPY
E3Uh_A
>E3UhiA
EPEPME}
@ 3+Pj
EPEPdEPEP=E
EPEPi E}
@ ;Eu>E
@ 3+Pj
EPEPC>
E`FEEPEP~E3Uh
d0d 3UhA
d0d 3E3
33JOhPEPE
wPEP8E
EPs2E3UhA
d0d EPEP
xPEP9h
jSEPVEPl3ZYYd
EP3ZYYd
EPv43ZYYd
EPNEPj
PjTEPP
SV3tF3
Sbt4<$
3E3E3Uh
EPEPE}
jBEPEPj
EP_E3UhA
SEPEt*j
VEPEPTj
VEPpEP?WEPeh
EPEPEPj
EPVEP7}
S 3ZYYd
EPEP3ZYYd
E_^[]SVWt
_^[SVM
\3Uh>A
d0d t;F
F$UB$F(UB(!E3
3E3E3Uh
d0d ;54E
EPs1_^[]
t"jPE@
t8EPE@
PEPEPEPE@
Pj3UhA
3E3E3Uh6A
PF PEPj
EPEPV}
E@ PF PF
Pa3ZYYd
F$^0F,4A
R HP3Y
^[USVW
HE3UhSA
d0d EX
d2d"E@
_^[YY]
UlSVWUE3E
n|EEE3Uh
}(u-fC
UEfC 3
3EzE3UhA
EP/PEPePw3E
EPEP:E
EPEPGE
Ed3ZYYd
H U3IE3ZYYd
}lPjTEP
kcf<$BMt
hE3Uh9A
d0d EPj
_^[]SVWU
T]_^[SVW
;~ t8'VW
3fD$$fD$&fD$
vE3UhA
d0d EPFlP
U3ZYYd
tOE0D$
fT$ fD$"
fD$$T$
T$&]U,MD](
^3E3EEPC
d0d );
E3ZYYd
zEfv|D}EC
vE3UhA
d0d WYP3YZ+
EVYfEf
yEu?||
KuE3Uh A
d0d Ep
yEGu{%|E9C
d0d UDwE
E3ZYYd
d0d UDwE
LEl3ZYYd
S3UhkA
d0d UvE
E3ZYYd
E*Dz[Y]
d0d UvE
E3ZYYd
SVWjH<E
lr oSVbN
TPatternManagerSVt
EE3Uh-A
d0d E@
ETwE_^[YY]
E3UhA
R PEPE
R,33,U
E33ZYYd
tEHpv&wE_^[]UE^EEEE
oEhE@
UQSVWM
E|3UhsA
d0d 33
EoxE|PE
E"x<r_^[Y]
GetMonitorInfoA
GetSystemMetrics
MonitorFromRect
EPV8SEP
MonitorFromWindow
MonitorFromPoint
ugtc>(r^j
GetMonitorInfoA
DISPLAY
ugtc>(r^j
j0CtK3F
GetMonitorInfoW
DISPLAY
ugtc>(r^j
j0ktK3F
GetMonitorInfo
DISPLAY
EteEPVEEPVtwEPEPEP
EPEPEPqt
t6WEPEP[u$}
WEPEP;u
PEPVhB
EnumDisplayMonitors
USER32.DLL
U3Uh]A
id3ZYYd
comctl32.dll
InitializeFlatSB
UninitializeFlatSB
FlatSB_GetScrollProp
FlatSB_SetScrollProp
FlatSB_EnableScrollBar
FlatSB_ShowScrollBar
FlatSB_GetScrollRange
FlatSB_GetScrollInfo
FlatSB_GetScrollPos
FlatSB_SetScrollPos
FlatSB_SetScrollInfo
FlatSB_SetScrollRange
U3UhMA
TDrawItemEvent
Control
TWinControl
Integer
TOwnerDrawState@
TMeasureItemEvent
Control
TWinControl
Integer
Height
Integer@
TListBoxStyle
lbStandard
lbOwnerDrawFixed
lbOwnerDrawVariableA
TCustomListBox@
TCustomListBoxA
StdCtrls
TabStophA
TListBox@
TListBoxhA
StdCtrls3
Align A
Anchors@
BiDiModeEC
BorderStylePRA
Color(
ColumnsA
Constraints
Ctl3D|A
DragCursorA
DragKind\A
DragMode
Enabled
ExtendedSelectVA
ImeMode8A
ImeName
IntegralHeight(
ItemHeightt@
MultiSelect
ParentBiDiMode
ParentColor
ParentCtl3D
ParentFont
ParentShowHint
PopupMenu
ShowHint
Sorted
StyleA
TabOrder
TabStop(
TabWidth
VisibleX@
OnClickX@
OnDblClick
OnDragDropA
OnDragOverhA
OnDrawItemA
OnEndDockA
OnEndDragX@
OnEnterX@
OnExit<A
OnKeyDown|A
OnKeyPress<A
OnKeyUpA
OnMeasureItemA
OnMouseDownA
OnMouseMoveA
OnMouseUp
OnStartDockhA
OnStartDragA
TListBoxStringsLA
TListBoxStringsA
StdCtrls
M3Uh&A
d0d PWh
O&Eka3ZYYd
o`Z_^[]Uj
SVW3UhA
%3ZYYd
Z_^[Y]
f_U_^[
SV3UhcA
d0d cPj
}!U4wE
Y3ZYYd
E2_LY^[Y]
SVW3UhA
d0d =cPVh
P}!U4wE
Y3ZYYd
E^X_^[Y]SVF
EEG"E@
Ex(3ZYYd
E"W^[Y]
SVWWVh
EYS^[]
QDD$ P
(]_^[SV
f$^[LISTBOX
WVC4PC0Pj
^[SVWC
SVWUfG
YZ]_^[
UpSVW}
PpPM36
ERL_^[]
[SVWUQz
^[U3UhyA
D3ZYYd
Delphi Picture
Delphi Component
THintActionA
THintActionlA
StdActns
U3UhiA
TCursor
TAlign
alNone
alBottom
alLeft
alRight
alClient(A
TDragObjectA
TBaseDragControlObject,A
TDragControlObjectA
TDragDockObjectHA
TControlCanvastA
TControlCanvasHA
Controls
TControlActionLink`A
TDragMode
dmManual
dmAutomatic@
TDragKind
dkDrag
dkDockA
TTabOrder
TCaptionA
TAnchorKind
akLeft
akRight
akBottom$A
TAnchors
TConstraintSize
TSizeConstraints@
TSizeConstraintsA
Controls
MaxHeight4A
MaxWidth4A
MinHeight4A
MinWidth@
TMouseEvent
Sender
TObject
Button
TMouseButton
TShiftState
Integer
Integer@
TMouseMoveEvent
Sender
TObject
TShiftState
Integer
Integer@A
TKeyEvent
Sender
TObject
TShiftStateA
TKeyPressEvent
Sender
TObject
TDragOverEvent
Sender
TObject
Source
TObject
Integer
Integer
TDragState
Accept
Boolean A
TDragDropEvent
Sender
TObject
Source
TObject
Integer
IntegerlA
TStartDragEvent
Sender
TObject
DragObject
TDragObjectA
TEndDragEvent
Sender
TObject
Target
TObject
Integer
IntegerA
TDockDropEvent
Sender
TObject
Source
TDragDockObject
Integer
IntegerLA
TDockOverEvent
Sender
TObject
Source
TDragDockObject
Integer
Integer
TDragState
Accept
BooleanA
TUnDockEvent
Sender
TObject
Client
TControl
NewTarget
TWinControl
Boolean A
TStartDockEvent
Sender
TObject
DragObject
TDragDockObjectdA
TGetSiteInfoEvent
Sender
TObject
DockClient
TControl
InfluenceRect
MousePos
TPoint
CanDock
Boolean@
TCanResizeEvent
Sender
TObject
NewWidth
Integer
NewHeight
Integer
Resize
Boolean8A
TConstrainedResizeEvent
Sender
TObject
MinWidth
Integer
MinHeight
Integer
MaxWidth
Integer
MaxHeight
Integer@
TMouseWheelEvent
Sender
TObject
TShiftState
WheelDelta
Integer
MousePos
TPoint
Handled
Boolean@
TMouseWheelUpDownEvent
Sender
TObject
TShiftState
MousePos
TPoint
Handled
BooleanA
:<=hGB
TControl@
TControlA
Controls
Width(
Height|A
Cursor
TWinControlActionLinkA
TImeMode
imDisable
imClose
imOpen
imDontCare
imSAlpha
imAlpha
imHira
imSKata
imKata
imChinese
imSHanguel
imHanguel@
TImeNameLA
TBorderWidth
IDockManager
Controls
$5%&'/
,3489:<CqB
TWinControlL
TWinControlA
Controls
HelpContext
TCustomControl
TCustomControl
Controls
THintWindow
THintWindow,
Controls
TDockZone
TDockTreeX
TMouseUQS]hfE
P?ghfE
V9f^[3^[
crDefault
crArrow
crCross
crIBeam
crSizeNESW
crSizeNS
crSizeNWSE
crSizeWE
crUpArrow
crHourGlass
crDrag
crNoDrop
crHSplit
crVSplit
crMultiDrag
crSQLWait
crAppStart
crHelp
crHandPoint
crSizeAll
crSize
Sc3$gE
TSiteListSVW
YZ_^[USE
_^[YY]
FKu_^[
SVWQ3C
8=_P~`&
J H J$H$J(H(
Sha[U]
USVW3Uh2
tGHt/nUC
CbEP@E
u&=4E
)_^[YY]3
F0C0^[
F0fX#_^[]
F0f4#3
S _^[]
^[Y]SV#
PHSHPLSLP`S`Vp8{8
^VpP{P
PF0f!^[]
^[SVW<$
PVC8P\
u EPV[w
;B$t'E
3EE;Et^E
PUPUEPh
t1EPEP>ZEPEP1ZEPEPEPXZt
USVW}U3Ej
RPtzEk~
t uuEPYt
3EE_^[]
MMM=TE
SVW38E
;B0t=8E
SVW=TE
xLu$8E
[gu-|$
3F$F(t
YZ_^[USVWU54E
d2d"3E
EPOEUP8UP<(M33UM
EUP8UP<]S<Ep0
F8MEUP@UPDEWp8xP
UE3ZYYd
[]USE33EE
d2d"=8E
UUYt)=TE
M3ZYYd
EPEPEP
YZ]_^[
SVWTSYIj
+PSIYZ_^[
E3UhB
d0d E@
H|l@EE
EEXt?3UhyB
D3ZYYd
EMu3ZYYd
E3UhJ B
d0d E@
|YEUEUEEWt33Uh" B
d0d E
M}u3ZYYd
^[UQSEExT
EP\E@T
QHUBXU33ZYYd
EPXEXER
NCXPC\P
SV;sTt
t1JtPJtq
MM3Uh#B
%s (%s)
S3UhW$B
@pC(&B
3F\FhS
RxjWS@SD$
S3CKlfE
SVWfKD
u$;~pu
:u-t),
F<PF8PN4V0
UQSVWM
t~;^0u
;F<ta3
8W0^0EF4E
C8PC<PK4
C8PC<P
SVRC<PK4
C8PRK4
U+EfHD
;tDt E
_^[]SVW
M3UhU.B
d0d {$
YZ_^[SVW
YZ_^[SVX$t!
:u!}EEE
$PWF0P6
$PWF4P6D$
$PWF8P|6D$
F<PD6+D$
$PWF4P06
$PW^X<P5
f[USVW3
MU3UhT1B
d0d G@ t5UK
_^[YY]
QDC8+D$
$PC<+D$
SV3Uh"2B
d0d C$;t@;u!UxE
fZ^[:PHt
SV3Uh3B
d0d UE
m3ZYYd
CX8;Cxt
CX8Cxj
%|[S$(
3]USV3
M3Uh6B
d0d {$
C4PC0PV&2C<PC8Pj
V|13ZYYd
t8C@@t2U
PEP?4E
tWE@$\
tHUE@}
E@$@@@u
PEPE@$X
PGeVp$t
USEExG
P1E3Uh8B
d1d!UR4
K<QE@0
K8QRPEPk/E@$MU6
EPE@$W
3Uhv:B
t9EP,0MUsEEEEE3P3
umC0QC03|$
Q(@C8PC
SHRS8R<
]_^[USVW
EPs-E3Uh=B
d0d F4
6PEP+EhI
SEu++P}W
PEP2+hI
PE+PEP
SE+E+PE+PVEP*hI
E+E+PSWVEP*EPEP*3ZYYd
USVWMt
EEE^$t
EEE?PEPG
E3Uh@B
PHEUPLEWx8u
+EPMUf3ZYYd
P2333L$
Z_^[USf
SVWPhR
C,S(E[]
fH.fKD
Q_^[SVW
Ht*gFTt
AFTA~TC
USUEEPhEB
IsControl
t-t"@,;
UQSVWMFA
Uf_^[Y]
_^[SVWU3
:u~ChP
C$PdCJ
C$PXCI
+B<PEPK
U>_^[]
ULY0E@
[YY]Uj
FtWX+t
E_^[Y]SV
SVW3UhQB
&_^[Y]
UQSVE3
Iu^[Y]
t$,D$,\$
l$0D$0\$
|$4D$4\$$D$
P8RP<RH4P0
SVWf^t
qE3UhpVB
]K|0C3E
FKu3ZYYd
E:3ZYYd
t$t+:R4;P4
C|EU[C`
S<;Ut~3
DE+C<U
@)0'+E
_^[]USVWEE
@@K:Eu
CK:Eu\}
UYEOu_^[YY]
USMUEE8
U]Yt~UE
E3Uh\B
YU3Y3ZYYd
3UhS]B
d0d UE
3)USVWE
E3Uhi^B
d0d E{EE,
U+W8+W0FKuEX
K|C3j
FKu3ZYYd
USVWUEE}
EE3Uh__B
d2d"EH
EfC3ZYYd
fFOu_^[]
(3C$^[SVW
5]_^[3
$K|!C3
GKuZ]_^[
t^{4C$PVhxE
u4C$PVj
u$C$PV|wE
C$PVC4P8
{4C$%
C<3C@hxE
cEIUCL6!3ZYYd
@3UheB
uI{@t@C
LPEPEP
YCT!3CT.
fe3ZYYd
C PC4Pj
UQEEfHD
d0d E@
Ef`DE3
FKu3_^[
USVWEExG
j}FKuE@
:EtREUl
3Uh*iB
_^[YY]
UQSVWE3UhiB
d0d 3UhiB
d0d ]C,S(3ZYYd
(3ZYYd
[_^[Y]
]_^[SVW%
_^[USVW
;X$uuj
SVW3,t
SVWUE][
P3Uh4oB
d2d"E(
O|TG3E(
u+@@@t%P4
P8RP4R@0PSE}
P{_^[]
K8S4C0=zD$
PU:tVFDt
K4S0oC<PC8Pj
K8S4JC0H5yD$
C<@PD$
K8AS4C0xD$
]_^[U
QDEPW,EWj
"EEPEPJE3UhrB
d0d EP6
EPEPEPEP_^[]SV
^[SVWQ,
fx8fu1TL$
f{lft\
USVWfU
UQSVWM
$Z_^[SVW
_^[YY]
3Uhs{B
d0d :8
73ZYYd
USVWUEEx
7E3UhE|B
d2d"E@
@0MUfUE
PLRUHHUP0E<
;uNE@GE3Uh
Efb3ZYYd
E^[YY]
Z[SVWQ
Z[SVWQ
YZ_^[SVWfF
SEPEPM
MUfJE|
x}E_^[]
USVWEE
E,N|tF3
RPtPCB
GNuE_^[YY]
tREfx
Pu8nu/xE
Q^[SVW
SVWfND
SfN[SfB[SV
P2^SC@
YZ]_^[
uU4$t/f
fu@v$u
YZ]_^[SVWF
SVWMU]
PSEPEPj
8W0EF0EF4^8E
SVWUL$
$eN| F3
$f~GNuYZ]_^[
EEs3Uh)B
EQ3ZYYd
SVWUL$
P~N|lF3
P<RP8RP4
]_^[Vp$t
SVX$t-t
SVW3UhB
d0d C
Pu!UxE
YQN|dF3
ENu]_^[
SAP^[SVV*P^[
F<PF8Pj
db]_^[
SV3UhXB
R3ZYYd
E%W^[Y]
P t(D$
C<<_^[
SVWUQp
$NuZ]_^[
USVWM3E
E3Uh}B
d0d UfxEx
;]u3ZYYd
E2E_^[]
USVUEE:K|!C3
FKu^[YY]
USVWFhx
S<_^[]
SVWMU|
F8U+U+
EV<M+M+
d1d!3E3E3E3E3E3E3E3E
EPEPMUICK,
E+E+C8+EE}
U+U+S<+UU}
t8tRY}
t8tRY}
^[USVWMUEE
Ey3UhB
uKURKt
3P8RP<RH4+
EKu3ZYYd
A8M+M+M
s7E+E~&M
A<M+M+M
USVWUEE
EP3E3Uh7B
d2d"EPEfP
EPE@Pj
EPEPEPEPEPEPEPEP2u
PPEPu}
PEPEPEPEPEPEPEP[u
EPEPEP!E$
PEPEP3ZYYd
EPETP.xUE
Q_^[]U
UEE3PE3UhB
d0d E@<PEPEH833Gj
U3UhNB
PEPjU"E
P3ZYYd
V3UhLB
63ZYYd
EIc^Y]
USVW}Q
EjPE@<PE@8PEPEPjEEPE
Rx3ZYYd
USVW}Q
UQSVWM]
EPS)E+E
[]USVW
t&sl{dE
UQSVWM3
FhPNdVlnE
n_^[Y]
USVWM3
t9;w`t4;
UEPEPG`P
3C`[SVW
3YZ_^[
^[SVfKD
3|3ZYYd
PF Z+C
u_^[Uj
SVW3Uh2B
u!U$xE
Ec}_^[Y]
USV3EF
tCEp83UhB
E13ZYYd
USVWEE@
EgU{Yt E@
;O`t"MI
MI ;Hd|"E@
t+E@ ;B } E@
E0Zp;MEP
}_^[]USVWt
d0d E!K|C3j
FKuE@`(3ZYYd
J(H0J,H4E@
UP,@(B
E_^[]SV
V0P(V4P,V`
@hHhxh
U@`YEYY]
3USVWM
}+}E+EEC
UEz7Vu
E3EhgE
Hud{`EG
S`B C`@
S`B C`@
Rx_^[]
UQSVWU
FdC F`@ FdE
FD3F<F@
FHVhpB
}F`@ y
UB VhxB
[mG C G
USVMUE3EE3
pYE^[]
MUE3Uh7B
d0d EP`E
uN|UFE
ENuEPd
EX`VE;Eu
0E;E}(
EE%3ZYYd
Ey3ZYYd
xy_^[]
YU3Y^[]
EcE[3UhnB
E73UhQB
)EE+C4
)EC8U+U+
)EC<U+U+
EMu3ZYYd
^v3ZYYd
Av3ZYYd
Eo$v_^[]
n33+Vu
GKtHtTt
6nPEsZ+
CnPEvsZ+
W0UW4UW8UW<U
EEPEPMUE*Vu
RY5n[]
3F`m^[]
t$;C8u
d0d u;UwE
;u$F`x
}lVhxB
;F`u5FdG F`@ FdF`Il~`3G
S P VhxB
_k3ZYYd
q_^[YY]
RuvWt$
C N<dC ^[
USEEjz3UhB
d0d ExEUE
Euo[YY]
MU3UhoB
d0d UE
RUB|YC
RUhY3ZYYd
E&u@o^[YY]USVW3
MUE3UhB
d0d EPl
hE3UhdB
d0d E@
K|-C3E@
EYFKu3ZYYd
hKnEPd
UE@`34YxgE
Esm_^[]
@;X`t'U
CTPCXPUC\P
SLP C\P
{3C\[S
PCTP[hI
+QRPCTP
RR ;S }'{
RY[]USU
B EUC`@
IYE[YY]USVW
tNUbUbE
W0G4T$
E3UhaB
EUPLUPPUYE1
EPgMUE@
`EEEEf{
uF4V0{
)EE+F4
)EF8U+U+
)EF<U+U+
)EU dUC
]C4S03ZYYd
E4kNe_^[]
SVjKwE
gt!PN{
FE3UhB
d0d =hE
USER32
WINNLSEnableIME
IMM32.DLL
ImmGetContext
ImmReleaseContext
ImmGetConversionStatus
ImmSetConversionStatus
ImmSetOpenStatus
ImmSetCompositionWindow
ImmSetCompositionFontA
ImmGetCompositionStringA
ImmIsIME
ImmNotifyIME
ND$$D$(
D$,D$0
D$4D$8
Delphi%.8X
ControlOfs%.8X%.8X
U3UhwB
%XTtfE
l3ZYYd
TContainedAction@
TContainedActionB
ActnList
Category
TCustomActionListxB
TCustomActionList
ActnList
TCustomActionhB
TCustomActionB
ActnList
TActionLinkSVYW
|1SDz$W
C@_CDt
^[SVC
SVW~Dt
fTu2xE
SVW~Dt
f+Tu2xE
^[Y]SVWT
USVUEE@$X
K|$C3E@$
FKu^[YY]
|R]_^[
C,he^[
u*;~,u
3FD^[SVWf{2
C4S0C$p
R0GNuC
SVWUQF
f;h`u+G$<
$Z]_^[
FlMFpM
OtUSLX
SL\tMC<x
R0]_^[
:]PtFE<x
R0]_^[SVWU
:]QtFE<x
R0]_^[SVWU;kTtFC<x
R0]_^[SVWU
SXn[tMC<x
R0]_^[
SVWU;k\tFC<x
R0]_^[SVWUf;k`tGC<x
QTFOufk`
R0]_^[
:]btFE<x
R0]_^[SVWF
TChangeLinkB
TCustomImageList@
TCustomImageListB
ImgList
G@G3G@GHt
}!UHwE
C8C<
ERL[Y]
cE3UhqB
d0d EXDE@$PE@(PEP-
>LE@Ht
s0fTG^[
PK3C0fF[
SV3UhB
d0d C,Pj
PC$PC(Ps0u!UxE
JC8=t
EvPJ^[Y]
E3Uh[B
E3Uh>B
d0d EM
EPE@0PE3ZYYd
E7CqI3ZYYd
CTIEfDE^[]
kP=[3[
d0d ;|!UTwE
fCD3ZYYd
EzNH^[Y]
s8fC^[
PC<GP:Pj
C$PEPM
EPC$PC(PE
@PVLyG
EPC$PC(PE
S0_^[]
USVWUEE@$PEPEH(33E
d0d EP$E
Q4EP(E
Q4EP(E
Q@EPN|mF3
PSEPbMUECNu3ZYYd
E>D3ZYYd
E>D3ZYYd
F5C5F7C7V4
C$PC(PEP8P*a
F5C5F7C7V4
F6C6F<C<
C$PC(PPPr
d0d t9
R ;C$|
R,;C(}!UHwE
B3ZYYd
EHB^[Y]SV:V4t
33[SVWUFL
8F@t"x
f=EOuf~V
FXVT]_^[
FOu]_^[
:E3UhB
d0d Uq
E3ZYYd
E:@3ZYYd
Ei:@E_^[]
USUEUEPEPh(B
Bitmap
E3UhUB
E3Uh8B
uEEP(E
Q@EP$E
EAEP(E
Q@EP$E
Q4E@$PEPEH(33
R UJ$H
R,UJ(N
E@$PEPEH(EP$
UY~E@$PEPEH(EP$
EPE\PESUYb~MUEMCN
Ej7Eb7E.
=3ZYYd
E=7w=3ZYYd
E 7Z=_^[]
<UE3UhB
d0d Et
7u!UxE
=3ZYYd
Ey6<3ZYYd
E|B<[YY]
E-E3Uh-B
@UY.{E
QT3ZYYd
E,:_^[]
E3E3E3E
3E3Uh6B
GqEO3EG3E?3y9[]
EMenuErrorHB
TMenuBreak
mbNone
mbBreak
mbBarBreakB
TMenuChangeEvent
Sender
TObject
Source
TMenuItem
Rebuild
BooleanB
TMenuDrawItemEvent
Sender
TObject
ACanvas
TCanvas
Selected
Boolean(B
TMenuMeasureItemEvent
Sender
TObject
ACanvas
TCanvas
Integer
Height
Integer@
TMenuActionLinkB
TMenuItem
TMenuItemB
Action
BitmapDB
Caption
Checked
Default
Enabled@
GroupIndex$@
HelpContext
ImageIndex
RadioItem@@
ShortCut
VisibleX@
OnClickB
OnDrawItem$B
OnMeasureItem
TMenuD
Items@
TMainMenu
TMainMenu
AutoMerge@
BiDiModeB
Images
OwnerDraw
ParentBiDiMode|B
OnChange@
TPopupAlignment
paLeft
paRight
paCenter
TPopupMenu
TPopupMenu
Alignment
AutoPopup@
BiDiMode$@
HelpContextB
Images
OwnerDraw
ParentBiDiMode|B
OnChangeX@
OnPopupSVW3
_Z.[Uj
d0d UwE
pKE3ZYYd
E3-Y]UQUfE3}
Y]USfEi3j
SVfE3Uhe
d0d ]3
003UE3
AA3AE3
`0v3-3
oUwME|
tL1E t
J13ZYYd
T1J+^[]
3Px3Z;|9l3P(5P
5ZYuu
~5_^[USVW3
UEE43Uh
d0d 33E
u3ZYYd
0)_^[YY]
8[USVM
:Bw$EU
E^[]USVWME3E3E33t
@1E;u~
@1EE:Ew
EEUEMUYE
@1:Ev}
@"f@`S
\fFDF4
F(PYFP{
3F8fFDft
O!^[USVW3
]]M3Uh
d0d {0
,u$uh
UfCTuE
CDE3E3E3EE
EPjjWY
~C$,P
CDPVjWX3ZYYd
RR(m3]
USEEXdt
M=[YY]Uj
SV3Uhf
d0d Ua%E
E/'I!^[Y]
]MU3Uh
N|TF3;]}(
@1:Ev7UvE
UP1CNu3ZYYd
E%_^[]
d0d {(
[(3ZYYd
E.%H[Y]SV
ShortCutText
&PE'PEEbPRjjE
PE%PE'PE
bPiR3ZYYd
d0d EV
t)Efx~
%u UE]3EEE
t4EX4~
;|"Ex,
EX4~/;}$EPE@4PE@-PM
BEY2[E@
iP3ZYYd
R,U+U;}2E@@
R,U+U+y
R U+U;}2E@@
R U+U+y
t6MM.t
PEPEh]PM}
VUELZ}
PEH$UE;E+E
EP~OEPE
PSEH$UE
EfXTft7}
UMUE3ZYYd
]MU3UhZC
G<EF$tC
3f~Tft
PMUE+E
Q4^[SVW
P1:S1u
GNu_^[SVW
:^,tB^,~Xt'F
FDPPHt
:^-tg^-yE
Q47~Xt'F
:^1t1~Xt
Vf;VTt
Q4^V:V0t
CXt4]}
UQSVEE
FKu^[Y]
:^.tJt:~X
t4FXO|%G3
Q4]_^[
d0d {X
FPH|3HVP;B
}(JFP@1:C1v
JFPP1vK1
FPsXspCll%C
Q43ZYYd
FPe3GX3GlGp~(
Q4_^[S
@,;Ctt
CxSt)C
S3Uh"%C
d0d u!UXyE
FpVl^[
3F8O~8
R8FKu_^[
V:V/tV/~,
G,FtG0Fx_^[
tMS-HSH
SLS4BS$`S0sxst
UQSVWt
@8Fl^d
[UQSVWE
SD;t+E
2VN|$F3E
E_^[Y]
xHZ]_^[
G({_^[
UQSVWE
to3Uh-C
E_^[Y]
D$0D$$D$(P
USVWEEP{;EE
VEP@;f
{UF;u}
tcE@$EUR5U3Uh
O^[SfxB
SM3UhE3C
URPF8U
33ZYYd
P#7EEH|w@E3h
uFMu}}
}yEH|q@E3h
_^[]UQSVW
8tt3EE
PVW]5_^[Y]
C,P~3E
H(I\;J(u
0V8C,t
TPopupListU
USVWE3Uh/=C
K|qC3}
tEPLxE
9E3UhA;C
.E3Uh$;C
S03ZYYd
PY-3ZYYd
E4n3ZYYd
P/E3Uh<C
M8E3Uhw<C
-,PEP,E3UhZ<C
d0d UE=
UEM3ZYYd
EPEP#,U3ZYYd
E83ZYYd
E[3ZYYd
}FHFLF(px@t8>C
@$F,FQ
PC(hP-YZ_^[
U3Uhh@C
TScrollBarInc
TScrollBarStyle
ssRegular
ssFlat
ssHotTracklAC
TControlScrollBarAC
TControlScrollBarlAC
ButtonSizePRA
Color@C
IncrementT
Margin
ParentColor(
Position(
Smooth(
Size@C
Style(
ThumbSize
Tracking
Visible@
TScrollingWinControlDC
TScrollingWinControlCC
HorzScrollBarAC
VertScrollBar8EC
TFormBorderStyle
bsNone
bsSingle
bsSizeable
bsDialog
bsToolWindow
bsSizeToolWinEC
TBorderStyle
TScrollBoxFC
TScrollBox
Forms0
Align A
Anchors
AutoScroll
AutoSize@
BiDiModeEC
BorderStyleA
Constraints
DockSite|A
DragCursorA
DragKind\A
DragMode
EnabledPRA
Ctl3DVA
ParentBiDiMode
ParentColor
ParentCtl3D
ParentFont
ParentShowHint
PopupMenu
ShowHintA
TabOrder
TabStop
VisibleA
OnCanResizeX@
OnClick4A
OnConstrainedResizeX@
OnDblClickA
OnDockDropHA
OnDockOver
OnDragDropA
OnDragOverA
OnEndDockA
OnEndDragX@
OnEnterX@
OnExit`A
OnGetSiteInfoA
OnMouseDownA
OnMouseMoveA
OnMouseUpA
OnMouseWheel$A
OnMouseWheelDown$A
OnMouseWheelUpX@
OnResize
OnStartDockhA
OnStartDragA
OnUnDockMC
IDesigner8@
IOleForm
TWindowState
wsNormal
wsMinimized
wsMaximizedxNC
TFormStyle
fsNormal
fsMDIChild
fsMDIForm
fsStayOnTopNC
TBorderIcon
biSystemMenu
biMinimize
biMaximize
biHelp
TBorderIcons
TPosition
poDesigned
poDefault
poDefaultPosOnly
poDefaultSizeOnly
poScreenCenter
poDesktopCenterOC
TDefaultMonitor
dmDesktop
dmPrimary
dmMainForm
dmActiveFormOC
TPrintScale
poNone
poProportional
poPrintToFit@
TCloseEvent
Sender
TObject
Action
TCloseAction`PC
TCloseQueryEvent
Sender
TObject
CanClose
BooleanPC
TShortCutEvent
TWMKey
Handled
Boolean
TCustomFormSC
TCustomForm
TFormTC
TFormSC
FormsN
ActionH
ActiveControlA
Align A
Anchors
AutoScroll
AutoSize@
BiDiMode
BorderIcons4EC
BorderStyleHA
BorderWidthA
Caption(
ClientHeight(
ClientWidthPRA
ColorA
Constraints
UseDockManagerOC
DefaultMonitor
DockSiteA
DragKind\A
DragMode
Enabled
ParentFontVA
FonttNC
FormStyle(
Height
HelpFileAC
HorzScrollBar8^A
KeyPreview
OldCreateOrder
ObjectMenuItem
ParentBiDiMode(
PixelsPerInch
PopupMenu
PositionOC
PrintScale
Scaled
ShowHintAC
VertScrollBar
Visible(
Width4NC
WindowState
WindowMenuX@
OnActivateA
OnCanResizeX@
OnClick$PC
OnClose\PC
OnCloseQuery4A
OnConstrainedResizeX@
OnCreateX@
OnDblClickX@
OnDestroyX@
OnDeactivateA
OnDockDropHA
OnDockOver
OnDragDropA
OnDragOverA
OnEndDock`A
OnGetSiteInfoX@
OnHide|@
OnHelp<A
OnKeyDown|A
OnKeyPress<A
OnKeyUpA
OnMouseDownA
OnMouseMoveA
OnMouseUpA
OnMouseWheel$A
OnMouseWheelDown$A
OnMouseWheelUpX@
OnPaintX@
OnResizePC
OnShortCutX@
OnShow
OnStartDockA
OnUnDock@
TCustomDockFormxaC
TCustomDockFormX`C
PixelsPerInch
TMonitor@
TScreenbC
TScreenhbC
THintInfo@
TApplicationcC
TApplication@cC
t %PjV
3Uh;eC
d0d 3Uh
E3ZYYd
?3ZYYd
tE_^[]SVt,
;X$t@S
GKu3]_^[
CTL3D32.DLL
Ctl3dRegister
Ctl3dUnregister
Ctl3dSubclassCtl
Ctl3dSubclassDlgEx
Ctl3dDlgFramePaint
Ctl3dCtlColorEx
Ctl3dAutoSubclass
Ctl3dUnAutoSubclass
Ctl3DColorChange
BtnWndProc3d
TPUtilWindow
SVW3UhlC
t1;}&EEPE
7-_^[YY]
U3Uh9mC
C3ZYYd
E\v^[]USVWt
("P&\3
USVEEX
to3E3EE@
K|:C3Ex
0;YFKu
+X_^[]USMUEjE@
USVWUEEx
EEH<EUEE
33E3E3
+R\Ef@
tft-ft;JEP
t%ft6ftG
USVWMUEu
E3UhzC
ExU+W8+W0
N|F3j
E_^[]
]3ZYYd
;}5b+;}
;}6J+;}
SVWU;t}C
]_^[SVW
d0d EF3ZYYd
UE3UhuC
d0d yE
d@3UhUC
%.3ZYYd
?Z3ZYYd
[UUUEE@
UE3ZYYd
UQSVWEEf
tA3UhqC
d0d ]U
_^[Y]UQSVWEEf
tA3UhC
d0d ]U
`_^[Y]
UQSVEE
d2d"E3
;B4t/E<
@4PEpXP
E7}^[Y]
PixelsPerInch
TextHeight
IgnoreFontProperty
PPVjC<+F
;uBH|6@EE
EMu_^[YY]
SVWUL$
$N|7F3
3ZYYd
C$;t%;t!u
S,_^[]
E@<PE@8Pj
`E3UhC
d0d E@
PE3UhC
d0d EP
S03ZYYd
EQEPE@
P3ZYYd
EP9E3Uh
d0d EPBE3UhC
d0d UE=
EHEPEP
Em_^[]
K|!C3E
FKu3^[]
t.+t_E
QDEPE@
t=jP%%%
FOuZ_^[
d2d"ExP
t1E@$u
Qh3ZYYd
GFKu_^[
FKu3_^[
SVWU3j
vP]_^[
d0d tpE
H|a@E3
uzC8Pk<U
C8PC<PL$
F(Z_^[
jPUYZ^[MDICLIENT
EB EEPj
tltA;t
u!U\yE
fK3ZYYd
UQSVWU3
P`E@D
UfBD3Uh
@l;tTt*
;EuEp$t"
\3ZYYd
f#PDEfPD
_^[Y]
]P_Z^[
d0d E0
Ef,3ZYYd
3u3ZYYd
R[Y]SVWU
:O|BGD$
`Pzu)fC
f#CDfCD0T%P
SVW3Uh[C
UFL2VUE
E:T_^[Y]
fG|^[SV
fW{^[fz
US3t.E
USVWUF
M33c4UMvxE&ECU(
UFp%YM33
4UM1xEE
B PB$PJ
UQSVE^
<}^[Y]
Sfx[Sfx[SVj
ME3UhC
d0d E@
d2d"E@
d0d Ef^w3ZYYd
@0CtE+p<y7
3E@8PE@<P
@0sE+p<y7
3E@8PE@<P
PEPHE@8UR<
EjPhTi@
d0d Eft3ZYYd
Ep;u!E]Pwu
x3ZYYd
x_^[YY]S
d0d FXU
USVWE3Uh/C
v_^[YY]3
RPu!U\yE
(#uT3ZYYd
Ezt[Y]
d0d ]ExG
u!U(xE
f@8fE3
d2d"E;3UhC
E@PBE3
3E3ZYYd
Ezr3ZYYd
EP'EhE
/ri3ZYYd
rE^[]UQSVWEEl
tRE>N|CF3
PYGNu_^[Y]
USVWC
t1F(]H|$@3(
R8GNuU/Y_^[]
UQSVWEEl
t]EN|NF3
GNu3_^[Y]
UQSUC
UQSVWEEl
t]EN|NF3
GNu3_^[Y]
UQSUC
K|-C3E
FKu3^[]
USVUEE
EE^[]USVW}
SVW3UhDC
d0d Hu9jAE3sE"uPEv
>3ZYYd
EQrkl_^[Y]
/YfgEOu
]_^[USVWu
_^[YY]
ueNPhuT
JhAE3)qErPEtt
Y1hUh3ZYYd
p$j^[Y]
SGLgGNu_^[
SV3UhC
nh^[YY]
paUBpj
cE3UhC
d0d E@$
E@$PhtC
E@$PhtC
EPLE@$
CjZEP|UB43ZYYd
gE@LP
Default
EtS`EHK`EDC`E@;`E$3`E(+`Ep#`ELt
`GNuEL_
CL@%^[
C\;Cht
CX;Cdt
@l^[SVWUh
u]_^[SVW_Pt.C
]UB(E,\ij
EUB0Pj@9H
xj3ZYYd
EP&PbE
>3ZYYd
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
layout text
CH,!^[
SVWUf;s8tsfs8fuZT
C<YZ]_^[
Pj<jbt
fHxfxx
t$t+:R4;P4
C0EC4Ej=wE
t.t4GE
EVEPMU
+uE)EC8;u
S<;Ut~3
DE+C<U
@)0'+E
_^[]USVWEE
@@K:Eu E
CK:EuYC
YEOu_^[YY]
UMUEUYtg
.VE3UhjC
Y3ZYYd
WEx3UhC
E&3ZYYd
Ef`zE9[[]SV
USVW=E
t<3UhuC
EPvE2Du
TApplication
3CH3ClCD
MAINICON
.C,EPiE
3C$Ct[
C,PjC$P
S3ZYYd
U[]SVE
X0;P4u
3sl;PHu
S^[USVW]
;B$uDjS
Px4$jV{
NuC|YZ^[
~CK|{|
CxfN^[
@@$P9U
@@$Pg[]
USVWUE3UhC
d2d"E3
K|2C3E
E@$P+UY
Y3ZYYd
bL_^[YY]
vcltest3.dll
RegisterAutomation
C$PTu5C$P0
C$t+Pwt;s$t
&TPC$P\^[
Ct#P^[SVW3
_^[VWJ
SVW3s0t:
wqd~u77E0t
u.~0t#P
$Z]_^[
SVWQ3j
FOu_^[]
UQSVWM
8W,3ZYYd
-F|F~0
`~0_^[Y]
t3ZYYd
j.zP|S
EE;Et`E(
EPEPpwE
EPE@$Pvzj
E@$P{3sEETt
d1d!SWVE@$PzE3ZYYd
E;Et8j
E@$Pu{EsEPz
M3UhwC
d0d EV
H8B^[]
t5^$F0t
PF8RKPS
SV:Spt3
P,slSD@
ClY:3Cl^[
t,)P[wt
GNu_^[SVWTu
;s4tK{4
C4[Ns4{4
C44NYZ_^[USVW3
MME3Uh
d0d EP
d0d Ef
E^3ZYYd
w3ZYYd
D>_^[]
K|C3j
3LFKu_^[
C<XGtvC<
E3Uh9C
d0d Ef%93ZYYd
E<7v=^[Y]
@@$P_t
@@$Psu
UQSVEEx$
pK|$C3
FKuU3UY^[Y]
tfGr_qf
_^[SfCrft
SVWUT$
;^Hu0T$
FLPdsu|F@D$
F@^HD$
$ ]_^[S
d2d"MUEVE
EE}EE)E3ZYYd
UE+93ZYYd
82;t$E
RBl^[]UpSVW3
jFu3Uh7C
@HEEEEE
@H~0Vu}
Q@3E3E
PAlE+EPE+EPEP"oxU
QlEPEP
EPEPEP
@lf'2t2
xPL|PPxU
xPT|PX
Cx5_^[]
CHt n0;t
YZ]_^[
PQd3ZYYd
TCustomIniFile@
TIniFile@
SVM3Uh
~>E80u6EX
E=~3ZYYd
SVW3Uh`
d0d UE
E57O1_^[Y]
UQSVM3E
]M3UhA
]3ZYYd
0113ZYYd
ET6n0E_^[]
d0d E`]3ZYYd
*0y03ZYYd
E5/E_^[]
tI3Uhv
d0d E]3ZYYd
r//3ZYYd
E4.E_^[]
]M3Uhi
tI3Uh.
d0d Eh]3ZYYd
/3ZYYd
E,4F.E_^[]
SVW3Uh
E3-_^[Y]
SVW3Uh+
Ej3-_^[Y]
SVW3Uh
3 -_^[Y]
SVW3Uh
E2,_^[Y]
q6Pi6Pa6PS]
6P5P^u1C
+3ZYYd
Em1+_^[]
MU3Uh*
d0d EV3Uh
\t)]E2UE
u3ZYYd
E*3ZYYd
*3ZYYd
Ek0*[]
]M3Uh3
d0d ES3Uh
[t)]E
u3ZYYd
E)3ZYYd
)3ZYYd
Eb/|)^[]USVW3
]]MUE3UhQ
"E3Uh/
d0d MUE
S8E53Uh
N|DF3j
UEYCNu3ZYYd
E{(3ZYYd
EF"(3ZYYd
h.^(_^[]
A2PcZu1C
(3ZYYd
E-'^[]
1P1PY_^[
53ZYYd
ERegistryException<
TRegistryUS3
d0d ]E
J&3ZYYd
E+%[]S
^[SV-"
d0d E*Ed
u+EPh?
E3EPEPj
,MU3ZYYd
Eb)|#E^[]
MU3Uhp
bt`MAE3x)]K|JC3E@Ej
EPE,PVG
Q4FKu3ZYYd
E-(E%(?"_^[]
SVWUQ3
3/(SD$
'Z]_^[
]M3Uhq
PPt.}E
3ZYYd
E$&> _^[]
d0d 3EE
POt.uE
Ev%_^[]
d0d E%EO
)3EEPh?
iPN3ZYYd
E^[YY]
-3ZYYd
CKY3 - Bam Margera World Industries Alien Workshop
Cat Attacks Child
Windows XP
AIM Account Stealer
MSN Password Hacker and Stealer
Hacking Tool Collection
Macromedia Flash 5.0
DSL Modem Uncapper
Internet and Computer Speed Booster
ZoneAlarm Firewall
Borland Delphi 6
BORLAND Delphi 7
Shakira
Gladiator
AikaQuest3Hentai
MoviezChannelsInstaler
Zidane-ScreenInstaler
LordOfTheRingsr
Quake 4 BETA
Xbox.info
Battle.net
Warcraft 3 battle.net
Half-life WON
Winzip 8.0
Winrar 3.2
Warcraft 3 ONLINE
Half-life ONLINE
Grand Theft Auto 3
Macromedia
KaZaA Media Desktop v2.5 UNOFFICIAL
KaZaA Spyware Remover
Age Of Empires 2
Norton AntiVirus 2002
Macromedia Dreamweaver MX
Microsoft Office XP (English)
CloneCD
Windows XP SP1
The Neverending Story Part I
Free Virus Removal Tool From Symantec
The Sun Of All Fears
Crazy Taxi
Duke Nukem Manhattan Project
Industry Giant 2
F1 Grand Pix 4
Star Wars II Movie
Nero Burning Rom 5.8.0.1
Need For Speed 5 Porsche Unleashed
Half Life Blue Shift
Quake 3 Arena
Warcraft 3
Civilization 3
Black And White
Strike Fighter Project 1
The Eye Of Kraken
Hoyle Card Games 2003
Hard Truck 18 Wheels of Steel
Comanche 4
Grand Prix 4
Age of Sail 2
Sudden Strike 2
Neverwinter Nights
Soldier Of Fortune 2
Valhalla Chronicles
International Cricket Captain 2003
Critical Point Manga game
Elder Scrolls III Morrowind THX Brrbrr
Unreal Tournament 3
Aliens versus Predator 2 Primal Hunt
Star Wars Starfighter
Norton Utilities 2002 XP
Hitman 2 Silent Assassin
MS Train Simulator
Cabelas Ultimate Deer Hunt 2
Dweebs 2
Age Of Wonders 2
Austerlitz Napoleons Greatest Victory
Emperor Rise Of the Middle Kingdom
Necromania Trap Of Darkness
Prisoner Of War
Squad Battles Eagles Strike
Stronghold Crusader
Tomb Raider 3
Deadly Dozen
Empire Earth
Freedom Force
Gearhead Garage
Red Ace Squadron
Clive Barkers Undying
The Thing
Dark Age Of Camelot Shrouded Isles
Combat Flight Simulator 3
Soldiers Of Anarchy
FIFA 2003
Key Generator
Full Downloader
ISO - Full Downloader
Downloader
USVW3E3Uh
d0d E2
s3ZYYd
_^[YY]
USVMUE|
S'C3ZYYd
3Uh$D
3Uh8%D
E]taU0
p3ZYYd
U3QQQQSVEEZ
3Uh&D
fuE43ZYYd
\Software\ed2k
SV3Uh8'D
v3ZYYd
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eDonkey2000
UninstallString
uninstall
\incoming
\Software\Morpheus
SV3Uh(D
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Morpheus 2.0
UninstallString
UNWISE.EXE
\My Shared Folder
\Software\Xolox
U3QQQQS3Uh*D
(EEPU`
Software\Xolox
shareddirs
\Software\Kazaa
uLh$-D
\Software\Kazaa\LocalContent
012345:
DisableSharing
\Software\Shareaza
Software\Shareaza\Shareaza\Transfers
DownloadsPath
\SOFTWARE\LimeWire
S3Uh.D
SOFTWARE\LimeWire
InstallDir
\Shared
EHEtSt
q3ZYYd
C:\My Downloads
U3Uh0D
MAPI32.DLL
ug|$ 3v`D$
i3ugD$
SOFTWARE\Microsoft\Windows Messaging Subsystem
USVW=tkE
MAPILogon
USVWk=xkE
PR3xkE
MAPILogoff
MAPIFindNext
USVW=kE
MAPIReadMail
U3Uh3D
TTimer|4D
TTimer84D
ExtCtrls
Enabledh
IntervalX@
OnTimerSVt
^[UQSVW
u?3Uh5D
d0d Ef3ZYYd
PVE@(Pj3C
SV3Uh{6D
C(P5s$t@{4
C(P6u!UyE
y3ZYYd
C0S,[U3Uh6D
U3Uh17D
U3Uhi7D
U3Uh7D
TConversion
TConversionFormat
U3Uh8D
U3UhE9D
Cancel
Ignore
NoToAll
YesToAll
D$$D$(
H+D$,D$0
QP+fkE
commdlg_help
commdlg_FindReplace
WndProcPtr%.8X%.8X
U3Uh;D
u+f=kE
U3Uh;D
U3Uh;<D
d0d -E
210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210245242209139145154145144143146144188223150151143147154187223141154137141154172134158147154173143139146172171223154151139223153144245242145144150140141154137223145138141210147158150141139223158223152145150140138223139145154140223145154154157223140158151223154152158140140154146223140150151171245242177176182171190178173176185177182245242210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210210245242
_TBuffer@
U3Uh@D
TWSocket (c) 96-99 F. Piette V3.17
ESocketException@
TBgExceptionEvent
Sender
TObject
Exception
CanClose
BooleanBD
TSocketState
wsInvalidState
wsOpened
wsBound
wsConnecting
wsConnected
wsAccepting
wsListening
wsClosed@
TSocketSendFlags
wsSendNormal
wsSendUrgent@
TSocketLingerOnOff
wsLingerOff
wsLingerOn
wsLingerNoSetCD
TDataAvailable
Sender
TObject
Word0DD
TDataSent
Sender
TObject
TSessionClosed
Sender
TObject
WordDD
TSessionAvailable
Sender
TObject
TSessionConnected
Sender
TObject
TDnsLookupDone
Sender
TObject
Word8ED
TChangeState
Sender
TObject
OldState
TSocketState
NewState
TSocketStateED
_TCustomWSocket GD
_TCustomWSocketED
UWSocket
TSocksAuthentication
socksNoAuthentication
socksAuthenticateUsercodeGD
TSocksAuthStateEvent
Sender
TObject
AuthState
TSocksAuthStateGD
TSocksErrorEvent
Sender
TObject
Integer
StringxHD
_TCustomSocksWSocketID
_TCustomSocksWSocketxHD
UWSocket
_TCustomLineWSocketKD
_TCustomLineWSocketLJD
UWSocket
LineMode
LineEnd@LD
_TCustomSyncWSocketdMD
_TCustomSyncWSocket@LD
UWSocket
_TWSocketND
_TWSocketMD
UWSocket"
LocalPort
DnsResultt@
DnsResultListBD
State(
ReadCount(
RcvdCount(
LastError
MultiThreadedCD
OnDataAvailable,DD
OnDataSent\DD
OnSessionClosedDD
OnSessionAvailableDD
OnSessionConnectedDD
OnSocksConnected4ED
OnChangeStateX@
OnLineTooLong
OnDnsLookupDoneX@
OnErrorBD
OnBgException(
FlushTimeoutlCD
SendFlagsCD
LingerOnOff(
LingerTimeout
SocksLevel
SocksServer
SocksPort
SocksUsercode
SocksPasswordHGD
SocksAuthenticationGD
OnSocksErrorGD
OnSocksAuthStateUQSVEE
9v3ZYYd
E^[Y]<0r
t*4$D$
%s: WSAStartup error #%d
USVWEE
t:3UhiWD
d0d EP]
t-3UhWD
_^[YY]
E3Uh*XD
PVE@@P?
_^[Y]USVW}
Q0E_^[]
XSocketWindowClass
wsock32.dll
USVW~UE3UhKZD
E@0E@(j
E@@UE}
E_^[YY]SV
Dup (closesocket)
WSAAsyncSelect
ioctlSocket
^[SVW3D
_^[USV
PVQRJ;
YQURP8RU
SX8SQRL
X8SQRL
SVWUQL
TryToSend failed
uYZ_^[
d0d E8PE
USVWfUE
P<3UhaD
d0d fUE
E0V|@u'OEp<3'
P<3ZYYd
33ZYYd
MU3UhfcD
Q4C<u3ZYYd
E/I_^[YY]Uj
SVW3UhcD
fu'FDt V(QM3
Qt3ZYYd
E_^[Y]
fu:~Dt3
R@V$F(
Qt_^[US3
Cannot change Proto if not closed
Cannot change Port if not closed
EF3UhfD
Cannot change LocalPort if not closed
Pu$fEP
3UhMhD
lb[YY]
Cannot change Addr if not closed
EE 3Uh
d0d EVt
|4h,jD
-tjPuTljD
JFEEIPu/E
E3ZYYd
WSocketResolveHost: '
' Invalid Hostname.
wsock32.dll
255.255.255.255
' Invalid IP address.
WSocketResolveHost: Cannot convert host address '%s'
MUEEE3Uh
d0d Et
EPEPu&EEE
PU3ZYYd
WSocketResolvePort: Invalid Port.
wsock32.dll
WSocketResolvePort: Cannot convert port '%s'
d0d ESt
.EPMu&EEE
WSocketResolveProto: Invalid Protocol.
wsock32.dll
WSocketResolveProto: Cannot convert protocol '%s'
GetPeerName
WSACancelAsyncRequest
EV3UhkpD
PLuFt&uDU
CDPEPh
SP3ZYYd
E2E*D^[]
DNS lookup: invalid host name.
%s: can't start DNS lookup, error #%d
E3UhqD
PC$dC(
SP3ZYYd
DNS lookup: invalid host name.
%s: can't start DNS lookup, error #%d
3Uh9sD
d0d E3
PfE3EEPEPL
SP+fEP>
E\v^[]
winsock.bind failed, error #%d
winsock.getsockname failed, error #%d
Cannot set linger option at this time
setsockopt(SO_LINGER)
UE3UhqxD
d0d EL
3Uh.vD
d0d Ee
uLUEUEl
u2UEUEx
RHEcEj
E@@PEL
xUB<yD
E$>_^[]
Connect: Socket already in use
Connect: No Port Specified
Connect: No IP Address Specified
Connect: No Protocol Specified
connect:
Connect (socket)
setsockopt(SO_BROADCAST)
setsockopt(SO_KEEPALIVE)
setsockopt(SO_REUSEADDR)
WSAAsyncSelect
Connect
UE3Uh|D
d0d Ep
3Uhh{D
d0d Ee
uLUE`UEl
Qd3Hu0j
E@@PEL
_^[YY]
listen: port not assigned
listen: protocol not assigned
listen: address not assigned
listen:
socket
Listen
WSAASyncSelect
not a listening socket
Accept
SVWG0X
C3G0{u
FKuG0fr_^[
UQSVWfML
tF~<3'
Qh3UhD
R43ZYYd
Disconnect (closesocket)
eYZ^[S
wsock32.dll
Winsock.GetHostName failed
Invalid SendFlags
Invalid internal SendFlags
[U3QQQQSVUE
QT3ZYYd
Error
in function
No Error
Interrupted system call
Bad file number
Permission denied
Bad address
Invalid argument
Too many open files
Operation would block
Operation now in progress
Operation already in progress
Socket operation on non-socket
Destination address required
Message too long
Protocol wrong type for socket
Protocol not available
Protocol not supported
Socket type not supported
Operation not supported on socket
Protocol family not supported
Address family not supported by protocol family
Address already in use
Address not available
Network is down
Network is unreachable
Network dropped connection on reset
Connection aborted
Connection reset by peer
No buffer space available
Socket is already connected
Socket is not connected
Can't send after socket shutdown
Too many references: can't splice
Connection timed out
Connection refused
Too many levels of symbolic links
File name too long
Host is down
No route to host
Directory not empty
Too many processes
Too many users
Disc quota exceeded
Stale NFS file handle
Too many levels of remote in path
Network sub-system is unusable
WinSock DLL cannot support this application
WinSock not initialized
Host not found
Non-authoritative host not found
Non-recoverable error
No Data
Not a WinSock error
w3ZYYd
-#[YY]&
Can't change socks level if not closed
Invalid socks level. Must be 4, 4A or 5.
QT8UECU(
Can't change socks port if not closed
QT8UEsU
,"[YY]
Can't change socks server if not closed
listening is not supported thru socks server
UE3UhD
d0d E-
d0d Eq
E3ZYYd
_^[YY]
tcp is the only protocol supported thru socks server
connect:
\Z^[SV
Eb|^[Y]
6T5Y 0
|'_^[]UxSVW3
d0d EP
eUYPEP
s3ZYYd
0.0.0.1
UQSVWME
S83ZYYd
*_^[Y]
MM3UhOD
f,Nf-(Nt
t#fu-E
f$N.f%N(f&N"f'N
ENEF`E^[]
data receive error
TWSocket logic error
too much data availaible
socks version error
authentification method not acceptable
request rejected or failed
connection refused
authentification failed
unassigned error #
general SOCKS server failure
connection not allowed by ruleset
network unreachable
host unreachable
time to live expired
command not supported
address type not supported
socks authentication failed
internal error
UQSVWE:
d1d!E<
Et_^[Y]
SMTP component (c) 97-98 F. Piette V2.07
SmtpException
TSmtpContentType
smtpHTML
smtpPlainText
TSmtpDisplay
Sender
TObject
String@D
TSmtpHeaderLineEvent
Sender
TObject
Integer@
TSmtpGetDataEvent
Sender
TObject
LineNum
Integer
MsgLine
MaxLen
Integer
BooleanD
TSmtpRequestDone
Sender
TObject
RqType
TSmtpRequest
_TCustomSmtpClient@
_TCustomSmtpClientD
USmtpProt
_TSmtpCli
_TSmtpCli D
USmtpProt
SignOn
FromNamet@
RcptName
HdrFrom
HdrSubject
CharSet
ContentType
ErrorMessage
LastResponse(
OnDisplay
OnCommand
OnResponseD
OnGetData<D
OnHeaderLineD
OnRequestDonet@
EmailFiles
AKt3ZYYd
b3ZYYd
E+E[YY]
]MU3UhD
UEUElE\4
yC8C,tD
iso-8859-1
SMTP component not ready
R@^UQSU
E8R|[Y]Uj
d0d EKX
Q03ZYYd
]fM3UhrD
CXPESt
Q8Ch+HCh~
AStD3u>nCH<
uzCX4Sp8-
CpClC$
E#=z^[YY]
Program error: FNext is nil
SVW3UhiD
d0d ftmhD
Fy_^[YY]
(Winsock error #
d0d ft]hD
E@$P$UE@$
Q@EP,E@$
Q<E@$U
d2d"E@$
BpUBlE
Q<w3ZYYd
:}0w_^[]
(Winsock error #
?|5v^[YY]
UQSVW]
QX3ZYYd
SMTP component not connected
CX~Spn8-t}
;3Cl43
)3ZYYd
S3Uh5D
MAIL FROM:<
RcptName list is empty
UUU3UhD
EU:uhD
RCPT TO:<
S:SPt%
text/plain
text/html
SV3UhD
R@EK<D
Q4EK@D
From:
Subject:
Mime-Version: 1.0
Content-Type:
; charset="
Date:
d0d EP
SHEX$E
tZ3UhD
SD3ZYYd
Q0EX$E
E3ZYYd
qk_^[]
3Ch3Cl
SMTP component already connected
426 Operation aborted.
^d3Flf
FX0mF\(m
SMTP component already connected
Q<_^Sf"
MUE3UhD
d0d E@8
K|"C3M
Q4FKu3ZYYd
Eke_^[]
d0d dwE
Ku3ZYYd
*rc_^[]
ddd, d mmm yyyy hh:mm:ss
EBm3UhD
Ehb[Y]UQSU
Exhb[Y]S
C\SXh[
UEwuhD
YeO__^[]
Content-Type: application/octet-stream;
name="
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="
SVW3UhD
X3ZYYd
Ec]_^[Y]
CONTENT-TYPE:
Content-Type: multipart/mixed;
boundary="
MMUE3UhD
d0d EX
K|rC3M
]FKu3ZYYd
b\_^[]
File not found '
SV3UhsD
7a3ZYYd
E"a<[^[Y]
mmddyyhhnn
= Multipart Boundary
This is a multipart MIME message.
Content-Type:
; charset="
Content-Transfer-Encoding: 7bit
_3ZYYd
TDnsQuery (c) 1999 F. Piette V0.01 BETA
TDnsAnswerNameArray
TDnsMXExchangeArray
TDnsRequestDoneEvent
Sender
TObject
_TDnsQuery@
_TDnsQueryD
UDnsquery
Addr<D
OnRequestDoneSVt
GF$F((D
/T^[SVW
3F$_^[
E`3UhjD
d0d fC0j
E+\EV^[Y]S
Q@S(C$
Q<S,C$
USVWUuu
|.u+EHU
+E_^[YY]
t^Vqaf
Q<YZ]_^[USVW3
XUYCOu;
Yf3ZYYd
U3ZYYd
TSmtpThreadUSVWt
G@*GxEDG<
E(G,E0
?HGPE@G E,
GLG4U$TE
UQSVEEW3UhoD
d0d UD
EW3ZYYd
E&S@M^[Y]
SVW3Uh9D
d0d C0R
E\RvL_^[Y]
R@Ft@8V8
UQSVWEE3
P(3UhD
d0d E@t
]L_^[Y]
UQSVWE3Uh5D
d0d E@t
R|3ZYYd
L_^[Y]
UQSVWE3UhD
d0d E@t
Rx3ZYYd
K_^[Y]
UQSVWE3UhD
d0d E@t
uK_^[Y]
UQSVWE3Uh D
d0d E@t
%K_^[Y]
FX LFt
AbYPrG3
FOuB_^[
U3QQQQQSVWEER3UhD
EOUPGKu
N2N]~&
OUPGKu3ZYYd
NG_^[]
SVW3UhD
d0d FH
F$MV$FH8W
UF8MVLFP
FtDV4MMV$FH8W
UFt@Mf~n
tPEVtRDMEVtR@MEPEPFPPN$V
FpVlFtDUMMFt@U?MUxE
LF_^[]
UXpNMS
8W EPM
8W C;]
I3ZYYd
KE_^[]
SV3UhD
d0d CP
A3ZYYd
K.E^[Y]
US3UhD
d0d KvCx3ZYYd
,J3UhPD
D_^[Y]
SV3UhYD
uCxCt(IfuSC
~93|:3
nUCt(I
E<IVC^[Y]
TSmtpRelayServerException
TContentType
ctHTML
ctPlainText@D
TSmtpRelayServerProcessed
Sender
TObject
RecipientIndex
Integer
IntegerD
TSmtpRelayServerFinished
Sender
TObject
Aborted
Boolean@
TSmtpRelayServerGetData
Sender
TObject
RecipientIndex
Integer
HeaderTo
String
Subject
String
TStringsD
TSmtpRelayServer
TSmtpRelayServerD
USmtpRelayServer
Connections(
TimeOut
Signon
HeaderFrom
Subjectt@
Recipientst@
charSet
ContentTypet@
Attachments<D
OnEMailProcessedD
OnFinishedD
OnGetData;
f94$3F0F\
GF(PF0PF4PFd
PF\PFTPFdPFPPF8PF$P
PF9PFhPFpPFxPL$@
Ct0VDCCt4VHCCt<VLCCtLV@CF`t
C$>ShD
6C`ShLD
5CT3ChCl3CpCt
iso-8859-1
C$=f{r
CtSp^[
Fdi5F$a5
V5F\N5
C5FT;5F`35
EEPE3UhfD
d0d UE+UED
EwBEUEtVEPI
Q4ES@}
l3ZYYd
S@I:^[]
D:\compo\SmtpRelayServer\USmtpRelayServer.pas
Assertion failure
SE3Uh+D
d0d E3
t*UM@D
t*UM@D
UE@X UYE3
P43ZYYd
NameServer
No DNS SERVER Available
UQSVWE3Uh
d0d ExH
NI8E@9
EEc3ZYYd
778_^[Y]
FROM property is empty
SVWUQh
FOuZ]_^[
Component is busy
Component is busy
Component is busy
Component is busy
Component is busy
EN?3UhD
d0d {9
QL5CPU=;3ZYYd
E:4[Y]
Component is busy
E>3Uh\
d0d {9
UCX:3ZYYd
]:S4[YY]
Component is busy
93ZYYd
3]U3UhF
d0d -E
93ZYYd
SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Transient
SYSTEM\CurrentControlSet\Services\VxD\MSTCP
SYSTEM\CurrentControlSet\Services\VxD\MSTCP\Transient
kernel32.dll
CreateToolhelp32Snapshot
Heap32ListFirst
Heap32ListNext
Heap32First
Heap32Next
Toolhelp32ReadProcessMemory
Process32First
Process32Next
Process32FirstW
Process32NextW
Thread32First
Thread32Next
Module32First
Module32Next
Module32FirstW
Module32NextW
AGENTW.EXE
ACKWIN32.EXE
CLAW95.EXE
MONITOR.EXE
AVPM.EXE
EVPN.EXE
AVP32.EXE
F-STOPW.EXE
APVXDWIN.EXE
PAVPROXY.EXE
VBCONS.EXE
_AVPCC.EXE
GBPOLL.EXE
TAUMON.EXE
ZONEALARM.EXE
VSMON.EXE
AVKSERV
PERSWF.EXE
MPFAGENT.EXE
MPFSERVICE.EXE
MPFTRAY.EXE
PORTMONITOR.EXE
CPDCLNT.EXE
VSHWIN32.EXE
VSECOMR.EXE
WEBSCANX.EXE
VSSTAT.EXE
CPD.EXE
ALOGSERV.EXE
CMGRDIAN.EXE
RULAUNCH.EXE
VSMAIN.EXE
GBPOLL
CFGWIZ.EXE
IAMAPP.EXE
FRW.EXE
WRCTRL.EXE
WRADMIN.EXE
SPHINX.EXE
BLACKICE.EXE
BLACKD.EXE
RAPAPP.EXE
AVGCTRL
NISUM.EXE
IAMSTATS.EXE
LUSPT.EXE
CCAPP.EXE
CCEVTMGR.EXE
WIMMUN32
NISSERV.EXE
AUTODOWN.EXE
VET32.EXE
MWATCH.EXE
EFPEADM.EXE
FSGK32
CLEANER3.EXE
CLEANER.EXE
NAVW32.EXE
AVXMONITOR9X.EXE
ICSUPPNT
AVXQUAR.EXE
NORMIST.EXE
NVC95.EXE
NUPGRADE.EXE
AVGCC32.EXE
AVGCTRL.EXE
AVGSERV.EXE
ICLOADNT.EXE
IOMON98.EXE
VET95.EXE
RESCUE.EXE
GUARD.EXE
DOORS.EXE
AVGSERV9
PCCIOMON.EXE
AVKSERV.EXE
MINILOG.EXE
FNRB32
NMAIN.EXE
IAMSERV.EXE
GUARDDOG.EXE
PERSFW.EXE
LOCKDOWN.EXE
NPROTECT.EXE
NDD32.EXE
SMC.EXE
NETUTILS.EXE
NTXCONFIG
LDNETMON.EXE
CONNECTIONMONITOR.EXE
NVSVC32
AVSYNMGR.EXE
MPFSERVICE
NAVENGNAVEX15
NAV AUTO-PROTECT
SYMPROXYSVC.EXE
SWEEPNET
DEFSCANGUI
AVSYNMGR
AVGSERV
_AVPM.EXE
AVP.EXE
NAVAPW32.EXE
DEFWATCH.EXE
VPC32.EXE
VPTRAY.EXE
POPROXY.EXE
NAVAPSVC.EXE
NAVLU32.EXE
NAVWNT.EXE
LUALL.EXE
SWNETSUP.EXE
ICLOAD95.EXE
ICMON.EXE
ICSUPP95.EXE
IFACE.EXE
ADVXDWIN.EXE
PADMIN.EXE
RAV7WIN
VETTRAY
AUTODOWN
RESCUE
WRCTRL
WRADMIN
PCCIOMON
CLAW95
NWTOOL16.EXE
NTVDM.EXE
ANTI-TROJAN.EXE
TC.EXE
CDP.EXE
NAVW32
AVXMONITOR9X
AVXMONITORNT
AVXQUAR
NORMIST
CLAW95C
TCA.EXE
TCM.EXE
MOOLIVE.EXE
MGHTML.EXE
MCMNHDLR.EXE
MCVSRTE.EXE
MGAVRTCL.EXE
MGAVRTE.EXE
SCAN32.EXE
SCRSCAN.EXE
SYMTRAY.EXE
VSCHED.EXE
MCTOOL.EXE
AVXQUAR.EXE.EXE
AMON9X.EXE
AVGW.EXE
SBSERV
WEBTRAP.EXE
POP3TRAP.EXE
TDS-3.EXE
SS3EDIT.EXE
JEDI.EXE
APVXDWIN
RAV7WIN.EXE
RAV7.EXE
SWEEP95.EXE
MCAGENT.EXE
MCUPDATE.EXE
FSAV32
ADVXDWIN
PADMIN
NWTOOL16
ANTI-TROJAN
LOCKDOWN
AVSCHED32
DEFALERT
CLAW95CF.EXE
LDSCAN
VIR-HELP.EXE
SCRSCAN
SYMTRAY
VSCHED
MCTOOL
AMON9X
PCCWIN98
ATUPDATER
POP3TRAP
SS3EDIT
MONITOR
SWEEP95
MCAGENT
ZAPRO.EXE
LOCKDOWN2000.EXE
CCPXYSVC.EXE
ETRUSTCIPE.EXE
VBCMSERV.EXE
ANTS.EXE
PCCWIN97.EXE
PCCNTMON.EXE
PCSCAN.EXE
NUI.EXE
AVKWCTL9
MCUPDATE
NTRTSCAN
PCCWIN97
PCCNTMON
PCSCAN
CLAW95CF
AVKPOP
AVKSERVICE
VETTRAY.EXE
NTRTSCAN.EXE
VPTRAY
EXPERT
FP-WIN
F-STOPW
VIR-HELP
F-PROT
ATWATCH
NAVAPSVC
GBMENU
FSMA32
FSMB32
MCVSSHLD.EXE
PCCWIN98.EXE
PAVPROXY
AVXMONITORNT.EXE
SWEEPSRV.SYS
_AVP32.EXE
AVCONSOL.EXE
ICSUPPNT.EXE
PVIEW95
WGFE95
LDPROMENU
GENERICS
PROCESSMONITOR
AVXW.EXE
DVP95_0.EXE
F-PROT95.EX
EXPERT.EXE
P-WIN.EXE
FAMEH32
NAVWNT
NPSSVC
SWNETSUP
ICLOAD95
ICSUPP95
SCAN32
MOOLIVE
MGHTML
MCMNHDLR
MCVSRTE
MGAVRTCL
MGAVRTE
AUTOTRACE.EXE
F-PROT.EXE
SPYXX.EXE
ATWATCH.EXE
ATUPDATER.EXE
ATCON.EXE
WEBTRAP
PROGRAMAUDITOR
LUCOMSERVER
AUTOTRACE
NWSERVICE
NOTSTART.EXE
NEOWATCHLOG
NSCHED32
WATCHDOG
ISRV95
REALMON
AVWINNT
DVP95.EXE
BLACKD
IAMAPP
NISSERV
IAMSTATS
NAVAPW32
CCEVTMGR
VSECOMR
WEBSCANX
AVCONSOL
VSSTAT
ALOGSERV
CMGRDIAN
AVGCC32
ICLOADNT
IOMON98
ACKWIN32
VSHWIN32
VBCMSERV
_AVPCC
TAUMON
ZONEALARM
PERSWF
NAVLU32
PVIEW95.EXE
WGFE95.EXE
CTRL.EXE
LDSCAN.EXE
GENERICS.EXE
MCVSSHLD
FNRB32.EXE
FSAA.EXE
FSGK32.EXE
FSM32.EXE
FSMA32.EXE
FSMB32.EXE
DEFSCANGUI.EXE
DEFALERT.EXE
NPSCHECK.EXE
VBCONS
NOTSTART
MINILOG
IAMSERV
PERSFW
LOCKDOWN2000
SPHINX
NPROTECT
NETUTILS
LDNETMON
PORTMONITOR
CONNECTIONMONITOR
SYMPROXYSVC
_AVP32
NUPGRADE
PROCESSMONITOR.EXE
TFAK.EXE
LUCOMSERVER.EXE
WIMMUN32.EXE
VSMAIN
RTVSCN95
DEFWATCH
POPROXY
ALERTSVC
NWSERVICE.EXE
NTXCONFIG.EXE
NEOWATCHLOG.EXE
NSCHED32.EXE
F-PROT95
ISRV95.EXE
REALMON.EXE
AVWINNT.EXE
AVGSERV9.EXE
AVKPOP.EXE
MWATCH
EFPEADM
CLEANER3
CLEANER
AVKWCTL9.EXE
FSAV32.EXE
FAMEH32.EXE
FCH32.EXE
FIH32.EXE
GBMENU.EXE
AVSCHED32.EXE
AVKSERVICE.EXE
RULAUNCH
GUARDDOG
CPDCLNT
CFGWIZ
BLACKICE
ETRUSTCIPE
MCSHIELD.EXE
RTVSCN95.EXE
F-AGNT95.EXE
LDPROMENU.EXE
DVP95_0
F-AGNT95
WATCHDOG.EXE
SBSERV.EXE
NPSSVC.EXE
ALERTSVC.EXE
PROGRAMAUDITOR.EXE
USVW33Uhl&E
MEPv>3ZYYd
U3Uh&E
Listbox1
FormCreate
TForm1
TForm1
TNetEnumThread@
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdevghijklmnopqrstuvwxyz
194.176.224.1
194.176.224.2
145.236.224.248
194.149.0.157
213.197.64.7
193.194.159.159
194.38.96.75
152.66.116.1
Check the attachment!
See the attachement!
Enjoy the attachement!
More details attached!
Check the Attachement ..
Check the Attachement ..
Attached one Gift for u..
WOW CHECK THIS!
This File is Corrupted!
This Software need more virtual memory!
Error: Low System Performance!
Error: Can Not Find Config.INI!
This software need MSIO32.DLL!
Application attempted to read memory at 0xFFFFFFFFh!
The system cannot find the file specified.
Stack overflow.
Cannot allocate memory.
A fatal exception 06 has occurred at <A900>:<A0973BFD>.
Fatal Exception 0E has occurred at memory address in module Vxd IOS(04) + memory address.
A fatal exception 0E has occurred at 0028:C02A0201 in VXD IOS(04)+00001FC9
screensaver
screensaver4u
screensaverforu
freescreensaver
lovers
lovescr
loverscreensaver
loversgang
loveshore
love4u
enjoylove
sharelove
shareit
checkfriends
urfriend
friendscircle
friendship
friends
friendscr
friends4u
friendship4u
friendshipbird
friendshipforu
friendsworld
werfriends
passion
bullshitscr
shakeit
shakescr
shakinglove
shakingfriendship
passionup
rishtha
greetings
lovegreetings
friendsgreetings
friendsearch
lovefinder
truefriends
truelovers
fucker
Greets!!
Get 8 FREE issues - no risk!!
Your News Alert!!
$150 FREE Bonus!!
Your Gift!
New bonus in your cash account!
Tools For Your Online Business!
Daily Email Reminder!
Free Shipping!
Its Easy!
Warning!
SCAM alert!!!
Sponsors needed!
New Reading
CALL FOR INFORMATION!
25 merchants and rising!
My eBay ads!
Empty account!
Market Update Report!
Click on this!
Fantastic!
Bad news!!
Lost & Found!
New Contests!
Today Only!!
Get a FREE gift!
Membership Confirmation
Report
Please Help...
I need help about script!!!
Interesting...
Introduction
Various!
Announcement!
History screen!
Correction of errors!
Just a reminder!
Payment notices!
SV3Uh06E
UQSVMEa
03ZYYd
3Uhm8E
d0d MU*
uYuuh8E
u98.t.uh8E
t3ZYYd
UE3Uh79E
d0d $E
Kr3C3M
EFKu3ZYYd
x_^[YY]
Startup
M3UhI;E
d0d EPVj
E3Uh,;E
d2d"EEPEPEPEP<-=
u/EEEEEPEPEPEP
u~S(`;E
umEPC(
t=EPC(U
o{, M}
#3ZYYd
EP+E3ZYYd
ELf_^[]
CD Drive
U3QQQQ3Uh<E
tNEMEU
E{UYW,E
\Software\Microsoft\Windows\CurrentVersion\explorer\Shell Folders
Startup
U3QQQQ3UhF>E
tNEMEUsE
m3ZYYd
\Software\Microsoft\Windows\CurrentVersion\explorer\Shell Folders
Common Startup
win.ini
rundll32_.exe
Windows
3UhQ@E
EEPEUX?MU,E
EEPE}UX
UY3ZYYd
\Software\Microsoft\Windows\CurrentVersion\Run
SVWfUfE3Uh|AE
d0d f]fu
UErf;r
8WHCNf;sf;uv
fEPf;]s
fU?3ZYYd
=3_^[]
QDKu3ZYYd
_^[YY]
UUUE3Uh
EUJE,E
E~_^[]
\SOFTWARE
\SOFTWARE\
email_num
SVW3EE}3UhGE
v*EvRP3)
rCNuU@HE
~ME8/tEEg7 E
EE_^[])
SOFTWARE\Microsoft\WAB\WAB4\WAB File Name
USVW3EEE3UhKIE
PEMEdIE
h3ZYYd
nd_^[]
\Software\
email_num
USV3EEE3Uh
d0d JE
E>MEJE
KrCC33RP
E{MU,E
Q4FKu,E
43ZYYd
:0^[]!
I-Worm.PlutonX Created By .......
\Software\
email_num
t>EMEKE
\Software\
S3Uh=LE
E'METLE
v3ZYYd
|r[YY]
\Software\
E3UhNE
#3UhEME
EPE33t
EE23Uh
uc(Ej@j
E\u>Ex$
v0 E
Q43ZYYd
_F3UhqNE
E3ZYYd
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
DefaultProfile
Software\Microsoft\Windows Messaging Subsystem\Profiles
SVW3Uh
E%ME4RE
U3EPEEU
R@EEUE+1t#EkEUU
Q4EHEUE0t
E)EUE1
Q43UhQE
d0d f=
[3ZYYd
\Software\
Microsoft
"Microsoft" <information@microsoft.com>
UQSVWEE
~bU$TE
uQU0TE
u@U<TE
u/UHTE
Q43ZYYd
E_^[Y]
,EEO3UhUE
d0d E-
,E),EAUUE
d0d MUK?
u78.t,uh8WE
t3ZYYd
S3UhWE
d0d cEEWE
u$EEWE
C{u3ZYYd
3UhmXE
d0d EEXE
UY"3ZYYd
rundll32_.exe
'$U [E
STARTUP
I-Worm.PlutonX Created By .......
U3Uh$\E
~3ZYYd
U3UhW\E
d0d 3ZYYd
[XI-Worm.PlutonX
Runtime error at 00000000
0123456789ABCDEF
%.*d`q@
MS Sans Serif
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=@
PlutonX
TLHelp32
System
SysInit
KWindows
USmtpRelayServer
USmtpThread
/USmtpProt
SysUtils
SysConst
3Messages
^Classes
Consts
QTypInfo
sActiveX
+Graphics
&Controls
Printers
WWinSpool
Commctrl
FlatSB
StdActns
Clipbrd
EActnList
vMenus
ImgList
dStdCtrls
MultiMon
Dialogs
ExtCtrls
3CommDlg
yUWSocket
UWsockbuf
WinSock
bUDnsquery
USmtpRelayServerConsts
8Registry
IniFiles
nComCtrls
ComStrs
RichEdit
ToolWin
KillAV
6IWorm
TForm1
Height
Caption
clBtnFace
Font.Charset
DEFAULT_CHARSET
Font.Color
clWindowText
Font.Height
Font.Name
MS Sans Serif
Font.Style
OldCreateOrder
Visible
OnCreate
FormCreate
PixelsPerInch
TextHeight
TListBox
ListBox1
Height
ItemHeight
TabOrder
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
GetModuleFileNameA
lstrcpyA
WritePrivateProfileStringA
WriteFile
WaitForSingleObject
VirtualQuery
VirtualAlloc
TerminateProcess
SizeofResource
SetThreadLocale
SetFilePointer
SetFileAttributesA
SetEvent
SetErrorMode
SetEndOfFile
ReadFile
OpenProcess
MulDiv
LockResource
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetTickCount
GetThreadLocale
GetSystemInfo
GetProfileIntA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCPInfo
FreeResource
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateMutexA
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpyA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
ExitThread
CreateThread
WriteFile
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetSystemTime
GetFileType
CreateFileA
CloseHandle
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumKeyExA
RegCreateKeyExA
RegCloseKey
ImageList_GetImageInfo
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Remove
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
UnrealizeObject
StretchBlt
SetWindowOrgEx
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetROP2
SetPixel
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SelectPalette
SelectObject
SaveDC
RestoreDC
RectVisible
RealizePalette
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetTextMetricsA
GetTextExtentPointA
GetSystemPaletteEntries
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
ExcludeClipRect
EnumFontsA
EnumFontFamiliesExA
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePenIndirect
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateDIBitmap
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
BitBlt
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
IsEqualGUID
VariantChangeTypeEx
VariantCopyInd
VariantClear
SysStringLen
SysFreeString
SysReAllocStringLen
SysAllocStringLen
WindowFromPoint
WinHelpA
WaitMessage
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
ShowCursor
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetCapture
SetActiveWindow
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassA
PtInRect
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBoxA
MapWindowPoints
MapVirtualKeyA
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRgn
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetWindow
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDesktopWindow
GetDCEx
GetCursorPos
GetCursor
GetClientRect
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
DrawTextA
DrawMenuBar
DrawIcon
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
ClientToScreen
CheckMenuItem
CallWindowProcA
CallNextHookEx
BeginPaint
CharLowerA
AdjustWindowRectEx
ActivateKeyboardLayout
GetKeyboardType
LoadStringA
MessageBoxA
InternetGetConnectedState
WSACleanup
WSAStartup
WSASetLastError
WSAGetLastError
WSACancelAsyncRequest
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
WSAAsyncSelect
gethostname
getservbyname
getprotobyname
gethostbyname
socket
shutdown
setsockopt
sendto
recvfrom
listen
ioctlsocket
inet_ntoa
inet_addr
getsockname
getpeername
connect
closesocket
accept
.idata
.rdata
P.reloc
P.rsrc
ZDZlSBio+{
n:NGnBb?i
rl&BmC{
pbSaBd6sim
w+x7t#:B*<k.
L5/C3c
-In;Vl
^[oB:SQT
DVdMd"m\Tjkvsi0VLwVwob]6
__z ;f
cq2 17^!bjoh?Wpb>g`
'.5V`
N4.ZN~D{`z3fvu
+<~nlc
dWMggO
SnfMHC
_)*.!h){
P`W)m_{
ca+sUEnKr0b
C2.FP04)#Vs
"4kWR3
6$7:sl
tS#3mh`6
Fhs-m4Fj?B#Z
z,*qm
"weK-P(
G/KMp+?m
iO~fhn
/yJ7>le
2:AzcSph
SCCe6UmKd*
v%P>cF\
/R{1i~W
+CBLln_!
@t>p%&
wf.z+%
JRSpOVtX"e/Bl
4J:KM;o
Xkgp$0_
dOb@+u?
k2iJb:rs/&
iWTo"y
hrzcpW
(<2.+!M
/V$xBH@
rnEL@E
RIAl"dG
^jXJIDl#(
mFiY[*n
[R_hEdihyLU0pH
Gm=`A`#3
* LA#l%&H
l!cpyL
M!T'mY{n
NE'At,buv}%sA&`(
wlvEOfiR
adLrary
DeGtom #X
c3 .&9,
AX%:ec
Id'Wp,)P
wEn%j[
LNl+In5
T+?1A5
/Sh9hc]B[
M4d Oq(NotFhR;Jo
v'T))ch.%B
pBk+Sl
w@echBl
T+ {DIBeoL+
%n@FOs
.A!7u{
6ntdH'{6
ep0WNiJUA
XlWG%T9h
I4 n1R2Ao+
A"h)``wH
ln#qk,cc+}4
A%(0i
2`=h&p#.
oF#1j: +
P/hvtQu
eek[s3.q
Oo.PoA0.
sj6tA!
fb 5/41%"GG
eGZHG
iGGePrM
UgHK\
%G65m-qf|F-x@
h#;k-Z#C
jD5Yql
nNAdj[[Pd9.V
c+uL7@JT
-~ali_@a
hqngP>VOar
) MXmEKL
h]"n4 k?]W!
ODE|NP
T}>QBSS9
.ZN$48
LLLLLLL
LLLLLLL
LLLLLL@
LLLLLL
LLLLxw
LLLLGw
DDDDHw{
DDDHxy
KERNEL32.DLL
advapi32.dll
comctl32.dll
gdi32.dll
mpr.dll
ole32.dll
oleaut32.dll
user32.dll
WININET.DLL
wsock32.dll
LoadLibraryA
GetProcAddress
ExitProcess
RegCloseKey
ImageList_Add
SaveDC
WNetOpenEnumA
IsEqualGUID
VariantClear
InternetGetConnectedState
KERNEL32.DLL
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
GetModuleFileNameA
KERNEL32.DLL
lstrcpyA
WritePrivateProfileStringA
WriteFile
WaitForSingleObject
VirtualQuery
VirtualAlloc
TerminateProcess
SizeofResource
SetThreadLocale
SetFilePointer
SetFileAttributesA
SetEvent
SetErrorMode
SetEndOfFile
ReadFile
OpenProcess
MulDiv
LockResource
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetTickCount
GetThreadLocale
GetSystemInfo
GetProfileIntA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCPInfo
FreeResource
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateMutexA
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
KERNEL32.DLL
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpyA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
ExitThread
CreateThread
WriteFile
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetSystemTime
GetFileType
CreateFileA
CloseHandle
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
advapi32.dll
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumKeyExA
RegCreateKeyExA
RegCloseKey
comctl32.dll
ImageList_GetImageInfo
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_Read
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Remove
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Add
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
gdi32.dll
UnrealizeObject
StretchBlt
SetWindowOrgEx
SetViewportOrgEx
SetTextColor
SetStretchBltMode
SetROP2
SetPixel
SetDIBColorTable
SetBrushOrgEx
SetBkMode
SetBkColor
SelectPalette
SelectObject
SaveDC
RestoreDC
RectVisible
RealizePalette
PatBlt
MoveToEx
MaskBlt
LineTo
IntersectClipRect
GetWindowOrgEx
GetTextMetricsA
GetTextExtentPointA
GetSystemPaletteEntries
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetDeviceCaps
GetDIBits
GetDIBColorTable
GetDCOrgEx
GetCurrentPositionEx
GetClipBox
GetBrushOrgEx
GetBitmapBits
ExcludeClipRect
EnumFontsA
EnumFontFamiliesExA
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePenIndirect
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateDIBitmap
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
BitBlt
mpr.dll
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
ole32.dll
IsEqualGUID
oleaut32.dll
VariantChangeTypeEx
VariantCopyInd
VariantClear
SysStringLen
SysFreeString
SysReAllocStringLen
SysAllocStringLen
user32.dll
WindowFromPoint
WinHelpA
WaitMessage
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
ShowCursor
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetCapture
SetActiveWindow
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassA
PtInRect
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBoxA
MapWindowPoints
MapVirtualKeyA
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRgn
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetWindow
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDesktopWindow
GetDCEx
GetCursorPos
GetCursor
GetClientRect
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
DrawTextA
DrawMenuBar
DrawIcon
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
ClientToScreen
CheckMenuItem
CallWindowProcA
CallNextHookEx
BeginPaint
CharLowerA
AdjustWindowRectEx
ActivateKeyboardLayout
user32.dll
GetKeyboardType
LoadStringA
MessageBoxA
WININET.DLL
InternetGetConnectedState
wsock32.dll
WSACleanup
WSAStartup
WSASetLastError
WSAGetLastError
WSACancelAsyncRequest
WSAAsyncGetHostByName
WSAAsyncGetHostByAddr
WSAAsyncSelect
gethostname
getservbyname
getprotobyname
gethostbyname
socket
shutdown
setsockopt
sendto
recvfrom
listen
ioctlsocket
inet_ntoa
inet_addr
getsockname
getpeername
connect
closesocket
accept
il-KO#i#
LNw ]zR
<*"At`|Shkf?;k
+=+xyBH)
3g\5;(_d`T
,vp*>aS".kzv\me
c7m+k(\|
h>q/P2"
S8J^jq
q,}Z(n80#?v
/^B7iE%?J
%!Ym|`xVqtEB
69Yk!Hz
ZRFYlxWynd
#,QQ*Ni
p4>!+/!^0
|'vi2;I1w
??gQ%-
H3&n)DF
j()xfD#nL
7XLa78ids3Gu]M
aID!9I
|#"!O3G
'N~Wd=R6
K>NL"Hy+&*cRy
;'%zS;R
R3r$)
Wc1`!1
QM`jVQ5w_#6
#>/ePo%sv\
FjO$/-{
]8 G~@|a
Ji]EB[9-Gk"
Wjr@omT
Mps^?D
]f'TG w:wI
>Qi-{gxW
8W$$~V6
O+z.^cr}jC*!9
#9u_d}t#AB*+
%Ok|mKEn1'.{tRWgw
OoQ=xy0
S389oU9z
%4QN7ND(udV
UEkw_1O}
S T{gY}g
Xm,;k|
G0uYZ^
_T:L`l`8k|v^
LUB.anHZ3
Z,08q2"CR0w1m)-N
w#-_L{
,b]zvs
pmvmCAcS
o9!AbBFXNk8ys*
#):K$k
V?|Z%'
MK_stR~{F
K O|Qo
tfv?5m
|M!Q6IE
:F(]L3^3w
sl)i^W
EQ1mRUrz(
oeqJ.UiCL6
u|mD \
+X2pG*
,RP|eD
62M}Cu&
K0>5WNg*
mXK}xT:$Ih
89(8"qME
I(G](!%
x(l<S(2o
@5t{=)[N
+e p6
Q_{]LU\e
O%<u{Q
a[$?H,
S"KO&Y
jZ&o;6
sp0'81N|8{
pem4tb
b\z0i&\f8'4
G)_EcRucZ
(.|aPng*L`Y.
OJ/E&{M'
w'`{hu
PNixpTqd
D6[W.U|1MT
8RpC])
98Za#Uz
zQ7F.2A9h
^-Mf@9Ude2.U
?ja$FH,
`x}VP3xL\u
Bdt^+O'W'
O<6NcF
bD=@B~(E(
VXh>ZY]'~)x
_^Qc<Rm\-%6a[1!` *wK-o{V@
8H6p*"l^
^/4d[*g
Y"z,:5?
uK0$W_
vklHx
,:vq{"
uZ,0kZbF
{Yj^f={60B L
o fh\wUh
lc,&l!tG
|RqgF>_S
#<*A]?
Ui6I=g
9B;ac_
LxheG]8C
K.!rq>E
C%/%%j}}"x63
YKv;Y3
n[tuWJaY
s/(u9"
?`?9VG>n)o
9[ipBNU*X
h~q=DJ@
T^'IGu;Tk!7#bi_^nWD8w8
^hao+Ko)'+
3Ww<?}b={a
/ZfrTPR,h/<
1\AH3N|+vU
Tl50vE0<,QI
xIYZ,/Y
,C):gq
cKRqmL>hq>nq
ZTV^}Ji"K
<kCHp.F1
o/"g+=
"!2t[?<
xI2T~}XX
E3$=60N4oS
.6BlY]
dnf3WT
@]@Vj_
k~upFfNB'
%Z`xE=Q
jEzRC`{I|
Vp4>7-^h:
M\DE4c
%IGH}X
3T&&gI
2I)3Rq7\
=@SYIq0% p
F 'fq9
o\}AmE; i
.bS#4(9
S[%):Zl
`,>.olh
5*A&%O
$L v?@.ONE
^tVKzp=o
pXuqm9G
.1+bJSw[*;
Jf/`8Op
tpO1Tz:3
8+13Z6
<"<H1]Z
pAa#=^yY7
<O,^Hn!
GmSYlC?oZ
5]Zjywr
6=YMSA zW
pi&O_]|
Q))v'{h9(%y
pqun=;ZCl
{=b*i#
bOk+<9
_5~{c$
;z:MkSWp4
wi,{48
opGJ0~$k
/r_|W\}lupB"#
^J7f|<
qp=*NQ*_=}
@r.rCV=
"<rk R-@C @^
d:;1M;Q
gJKTcB!
-zDDM7:}Jh
9rBF>+Tr7~
kp?"A)O,WU]mn+M:k**
_FeK\)
yFuQ$ksDD3"3
TdG=HB
f:03_]
L$[eZ~t
;`Hv5!#^M1
GUgx0Q
33@}"=x6
v4%W_7
G%RC}\`
789#^^x_cO
f!x`LfV;*
AN%olF{2iL
?WF>p;A
Ar:V)h7)
p&-bF2`
(KR^,h
[E/RtZ
-5l, 5
zyhuH!kfh
(jb`'>r8
`*{/U#DOqjJ
dCtt$]aZ&[
&y^RJDk
xssk&Q
Y]LIYhIhze$8
{9/7JMT:9
~cb#TVZ
]p3hIs
}oVuG4ENN
VhJ/6|a%K
T\XD+__3wD[
`-pf2o9WG
=J%RD%
GeNEaU[=$zx
5;Tf`k
lpK+z0
r!gMcJ
GV8/#q3)V
J}8t'C-
WZyi Bs
\M;0>D
Bff@<P
%8XQDG`[
I8e,S6+*
9chC68Wo6
MmewOAjp
G` q)d`F)R
9sk7&#%-
o+M`uQXGa
Aa_*]<^Z1
.pc(8/!Y
zLHdD(<28
q"(ng"
rumnCyA
!K$ af
%P1hE$
L7&U,|
Fqzo!`=a
PzjP_v
AF6Ly2@
W~KsJ|8
[bDonka5
.o]#:>ft
SAfV1<q2 V
VXDwjed
Q:S$._
#VICrTh}[
CC$vs*
e@R<[Z]H
nh3jkk
j!BKm)?
@RA>/Y
.1R0<G
C<B=Fx:IVf
l|XQ:j;
Qzq.A2
mfhcWS P)*
Cc3#Wq]4
aV*!`>
7g/s8,9U
44X2}T
Ptk#z6z&
x@Spl'{g}6yk
BTR2Yk3/_
I@ioKn0ODy"q
OAx9a+\
c>L"vpa3^B_%
{~&&TH"
}B5U'E
Y\%r37^s
"?R!q)
r9t>QA
Rn|DJP!YuP0
ephyS_P#
mI"\G=D3;4Z
|{0z#e2
U";4yTi
<)O_i#
~c*'Sw[
AR/Hc6
c;Oqr
PqK?(7/
)}v=eQi+qB;KV$eaF~
{H`'C[
{-4=.fUS
?c?aWf:Y
i!!M5+P
;5c!ikhE
jj`QQ:
N)SqG'
HWu%k]Y{5*6a hb
i%2\DEL
SyC3b;iZs
GS%}W<R%
s_XU>`4_
e/?tRhS
FC:X%}Rh
q8L4L@O
4T}Qs}Y1Y3>x
UA+?1DU
P_4 2.SCce`Uxz?q9v
@*NKP9C.CSiN
fcIIsy?UA;D?Qq
Su3X!8
*0`Gm{R
U|@})G
?>zct3
z-$?qPu
uG!I~Dd
8!o0Je"-"x
H`.ZSa
BB<\Ma.
k=!mss
o>K(A2!%
%xhl{<9`
Z986 q
7~HhQ&
DWgG},S=\fTa:\:Z^OQ@[
x-o/|Y4
~>PFpR[z
~Wuehj
-2U&o`|O
&0&NPjvX
h#WDT_z
&Ky[pB55*
XB13ocEYb
O*]$-t:
#=ORiO
NG57"~d
`vWYHa4
}FQB_o:'nl
fd1 wI
z";]L_v=5
TP?puvg
lT 0|W]>Nu
2DW6(/
mKB+4r0
p)S./TKt_/K
Vi(y4;
9yqEE9
HmY{7L#.
Z>N0R0S
e8w=R?
Ogm5N*XgCM
<IeS1<g=
!Rm]wl&q:*
$*HV_H
fJR2c"%P[
F#M%Bw
9OJ~UZl(Kmn
SXvadB
a#,N|7&Q
~V%b4?>QQ~
8IkFMgxOR
H%kFo)
Nl6JErHs;K{M}
@=`FfB}rnDE8+mT
a}"@s_\4U
wbO sB d$AE80@R$
RH#tXe
7*m[_'U>=<
HY2n>b
_pW+18&D\rTLa
";TX($~8V
OA2f= 5K&
;1<O^+h
=YcI.,9
sgy@p^M=?g0
>1U:%HuT+!
"h7Sq<6hnj>C
uzr$'O-
\f5][V
]kDBMa|^3K4i>yCw}
:T_ G9,)7dT*&
^]S4t/
\'G}':
Xm=?-z
>{a~#[
WQAVveg
~w`^6j}t
@wM=7[-p*
`O;:Z&i{)
Ib I,e
AZ%q>v
Cw{|pk4:Eb)
{i4C0K
]M(4\D6Jn
*R;C8qor
S>N5S'qe
gDrN:@qRnr
,T=IygU&]
yk*.v[{}^[7o,
{1REUfIU_O"=
{p4e{k|
al2nDECN1
jx2:l$A
|c]yL])J^g:;
u.Jxr}W
Tm&RIN\
HkJ$t,
[9g?QGM
]cTz"#S+
a|v)#e
jW'kJlI>
CWNY!ev]X)
kK$=9}Xh.*]
FJ7kB7s4
g:b+m7zSP$3
{.!'/?|^m3
:n\=@)?F
a/R,B,&2\
Z~AX_')
Z(5h*l:
H@-ug>
(V8lrT7PY
j3FS!5
gEE{)4?
Q !t9-l
@hLJu%
-nDft@Mc>2eU
}sFiDS@(wx
!J<J2L
|1rCg(X8|eb?Z
7m!P/b
RbCuyPp.
*sye2
dM=BMF<t
Y!I7(j}XbIUU9+.
zH`"K5
h(c +Gj!a
W31LIc=
Nr'SOU*
'S!bFj
Fv}~0&
>#:fQWW=w&>
F3<ceow"F
gT -mZ
t%$ rR
SoO/f$3_Z
p*uC?Y^
z#tC|{p
AGMC<lj
tVBt0
,'6Llp`.xn
8[Gx9[T%k+X*s
z^&kF$D@9h
<iY}e/XRN>?|t
6gi?Mr
X'TZ>,
JC,#`9S)I/
<2r\=x:~O[
h${8"cR
5)j&C0
%i,0{Y&<;>J
Gf2" C
JjM#0#??|j61
,9j4Mckm\'L
w|MQC_Y
_zSX$I
|\PY=lb;S
4:4iF'
)-IvsF
JM~eEk
.,pk;w
\DYw~5V(Eia76
QZ"}%^K.
'ZLZu].
qwOo210[x\hn(
$"}Vt^
Bu/t;S/Yy
;OR\L@{p^VF_t
dJM@ie=E
99RHDrY|
+MbR~"ebRq
zy8:4,
/T$aH-[
e2[k]j
LC'k[2](
Bd#O`J`]
3HA))i# ~p
q!^[4y(~v gv
f@]nj.l
JaAynB
aUuNZH`
uvs6.5_b
@qxnAPdOMYu
W7n2.+u
L"b=I^:{
+)up9U[
2^KUt{L!na
v8@r[?6
;N\*fVVF_
9`(=F\(5=[
7qr(BM
W|A'zt
wK)guB1
e{Yx UxH
,~udm
t~eG|Bfx-/IL
r>L8ig{R
..UjGK
f9`{z5(?yQ'
b5EdHk`jAe
c{iEa$
Ad0VM)L:<f
W\b"~
{c0N>$
zG5H13
27}M!3;ky
N)!fF#`*
}X3q*w
L]g4eo
mK[bzM
%]aJ|<
_b>$Yb
cb[Q?SC
I)E5c4wv
u" |tGX({ySgw<<5?{"J8uv-^q+
T6S=cL6^
/gH8UzS
S(Ht/7Y
6l3KJS2
1''uqvaT
Q,a~}{]
E99PKdh
toaKD9&!n
C[W-?!
oo.KP[CMsV
:)>^%
J"kE2bL
Pt#U+C
.#R-nBaONNvs]a
{&Zk.kR
6BzEbVhap,0ic
\f1`p1b|a
c*qacW
N_+{42XA
Iqb*4s{/
m-f\xX
^o8?"/
ZZ^NB+
:%e,n)
[u1CI
o{+rjpD
)&[SG<
o?"RcFpho
-"R5KV4
>rKNEGA
@JOF?L[
NSz`UQ.1O
J)U;G+5Bo"=%|SY4u
_I_:3p2H
ox|5| G#6m
w?XEG,p~
As/FVK
jocD?yo
W0!C}/U(
kBTl^Vt
xIUCly
A0w26Z
=\@WYT
BOgE`s1[v
gC7mWz
`@J,+!v
~-'5z5\D'|jw
n\K\t<p%
u>Q#i
H{5J?#K
32D>~/
)6fd1%:q]_7bL
g<#)w~1P
1[zP&Suc
d_{n73mwFf
;'-4jk{3{#C
Jw$tEB
'#~'5I7f*
dk]=(8$A2
e5?Ut
/d['^E}
\LuNkX0x}:nWv
nqHMq
^*>E,i
sk(Q>|
/;Ravw;
c].}Cqq
\uUUW8_]d
Wo2]to+
+k~3dac(
%#r(qG
ft7@}Ab
?{)z.2
^k@[ N4x>lz
iUE4K.
7U($XS9
9unbqoe!p?=
SS]4|;Y
fQ~2[k5PLjV&<I"o~
ML_Xt,}m>m8{
b1AV nk^8<
gNVFd`8+
]^]5kU/
${#iO3
@^3t!c
ul]!BV*
cogkX'
ThRS-&WFQ
b-oLs816
|&Ukfo(.J
ZT3=o
{<qCn$UlX"'-|-[Y
~_S`kPq
xSn,F]sXJ01N*EAX
8=W3wuT
-pX2J&ya6
^4vT?*
wU .e!e
!AWz#r
R\h=t.
wG,]@G
~36>VD
i3J\p5
K'`K4Ugj
XVE~ASXp6=
IQnH]\BzH
p79}tH
g5'Fd_EA*8do#;v*Y
hW.t=td
?)-?;`*F2T
S)?q&76d
8BU::T'
Mu+!,R#
=p]G3zw
pk\~1)Zeu\}"Y
M@NUR7!
PR'2jc1-?
U)$i_2-(W
Wi`5:x&
q;c*46
#(3"x4
t/z+5_
uEM"pKt
Zi?W;=pw
KXR*l!
263!pcZbB
I.YPVz6~J6)<f
g>YCu3Wv<5?#K3WI2zNJ
.C#x<H<zO-
Q2)`8C$\
t>u8Xqm:`
3/'A=l1cH_2
BHfG~;ui]\;
(A3>Vtl
6`(j(7(
Yg>G?eDC910O
<({I*$d
kDz])j>
3}9*"Yju
vy:OE^
zm`<fAYOG
xZ@vu]
vA&=|:
R_)"~V/Q&;
RUf OWf]b`,
5e=9#s%O/
CU.b1!
e_PDng
puS>S1W
Kb3m0~x&1
w(XfSG
"MrHV:
b)8%)D+_
]JE@ULuxnt)
'7mlD|b
i4:dX* m1a8n+n
i{b`b5(%RK/:2tt?
0QmZeV
>TK?&q
m/-`#dL2UEQ
FcC2O{R!9?sH!UR
n$W}Cop?,@J
M.2)_N)lA5`
e+mSW?:
S}Nw EH
4.!-=A
@i66IJ
Yg* E!.7NVQ
'Jx71~
K+.:;;
"8_yW&
al3j_n
`m6,kA'
!Y@J*l8
OYqV4=:Zxn1v
k_CHmRD
[FP(7gK
`\}G1%y
`xqNY$
28`^7^qF-#o1<!]
&`@*v I'
p4B/O&P
,kXra{>
f,}#&\
B%dvck
aMs!)^
q<]2'HP
G@+"$\Y
[Y4(kc
V!2THa[Nd2
s=2QRJl!
PA'Z8d!=Xn
MZ{gT(
v{;ZL0J0E.(Iq
56K?d~a
L:'1$Vb3
ZpRYEY-'rAYS
JW{JAL
Ha &{H/Kb9G
UAF]:%
j}!m 6
S~daBc=z3\4Iz<D&$"\Wv
s:xQy]%fIgW*
|9]d{/P
}H9xEmeEduF=
'5NHR$0z;Bs
>K.' s4c?{
n\N*bGQ
D)FH#0/ZR*sg?8z>P*O[!
Mj~)R,
rT),w7D+
WBD*O'@
N)1]8c!
4!w[b6!\
;Dlh_Z
LDK?m?-:
s|]FQ]
]|C;+\G6=A
&D[$16
zG>peJ
8?c9=5#+
_0xr_U
{lT]j*
}X}=UQ
'ViMp*O
`%m?VRFo
arq_o~
vli(.-ofO6^|wq
U1.a'R
#ww^|bU
;*f"V9
13[K~_y46}F
<E>b4k
7Zg81n:3
kR_C*-
}JFKeU>K0<^jK*
A!sABX)]lK_|jw
s0pys7gV964`i
K@zxAd
.mUF%S
!tkbf``
|@q!@g0mx@
Ao?LT`.S
UJl'HE>GR
'dNN. oO l
?0"<.#p~iT=o$
h?m4(?]
TR3DdsQXE8c5\a
')Jlw 'wT\,`3_F*@cK=
{ePthl
1v\A.:1k
Za:j&9
'Y^Z&6Y"
6<h%/`
L\mIHX3
%b?ZL7.WF22:R
J)VHKiIx>
Sf"l$kFgGii,uP
|hVpD_
"dQDr$RI>5q
+XuIu4z
`.`aKV_
FnVtj7yS
\Q4\J!OJ
=B93t`e9XrM
WOR#YT'j!|
4"&U8I6
~BC5&SdW#
z_bt9Lo;Ky
>ZadAE
jQ2=M$
|-ujb_|
nolb~+
|Wu<
XX~`}>
* {gyF
b"w7Qf]-
jkX`7~/^k
NC'ZSh
aJ4m0!
tZ{$ZUj
{R/W8
yicE#3
r]tmp7]
AVaalVugT%t(u>_
9(/^6m
m$POMb
>o8B2VsyP
3TEnjp]P
%z2<G(S\@
Tc8:hdi
r)T2nLH
WM<S1@(+
E9PQp-
E=?#[%'>u
MO`?0+i*fo{
,a^d!0'3
)]m%vgz
XohhFa=X
1P:PY-'H
xt&Hq,Y
x3QdwV!
:9(Pd8
ww}bEy81&C
,$*0}_rMb
}5Dfl&S
KO::.t[nBy3(
E~6[`t0h'Y
[~x"\S*
P,Z^5D/
O:5iIO[y\)LtE!{
E+2w9`10U
kG[z?fk
:1tzXQ
;"amG2
AEK'Pd3-6Tekdf
[UuM[<GD
Ribn;J
%&jTq~
EiPyLn
tj+o50Q
h=>+4D{n
Ag<-P5HQWKf?Pe^y./F"Ys7K;9'N_%_
kM?a~SWPYF(h
IC26/@wzX
x={\Kj
l6_I2W
OR~HPO'c*
p3z/ %>gJ'.
oAl)y(
Q}pPoh+
-Ju?o*6
zPQw,Nm!
]?)9!
;o_;{N_m1wO
@@@@@@@
jjjjjj
AAAAAA
BBBBBBB
jjjjjj
CCCCCC
CCCCCC
jjjjjjh
CCCCCC
jjjjjjh
DDDDDD
DDDDDDDDDDDDDDDDDDDD
DDDDDD
DDDDDDD
DVCLAL
PACKAGEINFO
TFORM1
MAINICON
??
Failed to get data for '%s'/Menu '%s' is already being used by another formDocked control must have a name%Error removing control from dock tree
- Dock zone not found
- Dock zone has no control
Drivers
Shift+
Unable to insert a line Clipboard does not support Icons
Unable to write to %s
Bits index out of range
Invalid data type for '%s'
Failed to set data for '%s'
Cancel
&Abort
&Retry
&Ignore
N&o to All
Yes to &All
"Cannot make a visible window modal
Menu index out of range
Menu inserted twice
Sub-menu is not in menu
Not enough timers available@GroupIndex cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active*A control cannot have itself as its parent
Cannot drag a form
Warning
Information
Confirm
Bitmap image is not valid
Icon image is not valid!Cannot change the size of an icon
Unsupported clipboard format
Out of system resources
Canvas does not allow drawing
Invalid image size
Invalid ImageList
Invalid ImageList Index)Failed to read ImageList data from stream$Error creating window device context
Error creating window class+Cannot focus a disabled or invisible window!Control '%s' has no parent window
Cannot hide an MDI Child Form)Cannot change Visible in OnShow or OnHide
Invalid stream format
Resource %s not found
List index out of bounds (%d) List capacity out of bounds (%d)
List count out of bounds (%d)+Operation not allowed on sorted string list%String list does not allow duplicates#A component named %s already exists$''%s'' is not a valid component nameA class named %s already exists
Invalid property value
Invalid property path
Property does not exist
Property is read-only
Error reading %s%s%s: %s
Ancestor for '%s' not found
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Cannot assign a %s to a %s
Cannot create file %s
Cannot open file %s
Stream read error
Stream write error+Out of memory while expanding memory stream*Can't write to a read-only resource stream
Class %s not found
August
September
October
November
December
Win32 Error. Code: %d.
A Win32 API function failed
January
February
1Format '%s' invalid or incompatible with argument
No argument for format '%s'Invalid variant type conversion
Invalid variant operation"Variant method calls not supported
Error creating variant array
Variant is not an array!Variant array index out of bounds
External exception %x
Assertion failed
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Division by zero
Range check error
Integer overflow Invalid floating point operationFloating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Stack overflow
Control-C hit
Privileged instruction
Operation aborted%Exception %s in module %s at %p.
Application Error
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and timeInvalid argument to time encodeInvalid argument to date encode
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
DVCLAL
PACKAGEINFO
TFORM1
MAINICON

Process Tree


0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe, PID: 2236, Parent PID: 1808

default registry file network process services synchronisation iexplore office pdf

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 9427345e217353c4_lordoftheringsr key generator.exe
Filepath C:\My Downloads\LordOfTheRingsr Key Generator.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 8aa96d80ef04f8ef173798ac2474e3e6
SHA1 e074493069f756941d4f4a8cbf2e75c519188eb7
SHA256 9427345e217353c4d0151506f4bdff965b6d480d5b8c9a5b78901c4cef658125
CRC32 D193A647
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 7d70d49837850fa1_f1 grand pix 4 key generator.exe
Filepath C:\My Downloads\F1 Grand Pix 4 Key Generator.exe
Size 480.4KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 797f323b6cc0bd50f389ecc68746a12a
SHA1 265ede7d4cc56fd08ffd9f67d8b826fc936c3a84
SHA256 7d70d49837850fa19a5b7200d97d6803bbbc20659d26523dfb680d6367c59628
CRC32 BFF1E961
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 82f3837d4cccc459_nero burning rom 5.8.0.1 iso - full downloader.exe
Filepath C:\My Downloads\Nero Burning Rom 5.8.0.1 ISO - Full Downloader.exe
Size 480.7KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 725bf446b3ac633d5217223d397c37ff
SHA1 b116a973818096119d677fbd32549721a2600985
SHA256 82f3837d4cccc459fa51e38fd2dd4d2b23ee89aacd5cdd9bbc68bfcd18d55864
CRC32 B31FBE94
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b858c719d57ee8e3_age of sail 2 key generator.exe
Filepath C:\My Downloads\Age of Sail 2 Key Generator.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 0324a79c843543067dccd3561c619a0c
SHA1 5f5239dcb516309dd97e2258cde8d6c848bef631
SHA256 b858c719d57ee8e34ae9818f444be2a1a90a944c8e3d21d23e3a440669a0edbb
CRC32 2A45DA04
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 670fd5658a132ff6_free virus removal tool from symantec key generator.exe
Filepath C:\My Downloads\Free Virus Removal Tool From Symantec Key Generator.exe
Size 480.1KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 79144c78de98b6526ec3178b6b57f467
SHA1 0b6897520364d8d95a538c18f4fdc999107d846d
SHA256 670fd5658a132ff678801b72e7229bf2153b9ec43d27df8f07193342264611f9
CRC32 A48D99C9
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8f5ce2b6f9b89780_red ace squadron key generator.exe
Filepath C:\My Downloads\Red Ace Squadron Key Generator.exe
Size 480.6KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 8c8b50a92cd74ef1525d3730b5b3123e
SHA1 302b099719cec5b250cab5cb287cfbb696f7225e
SHA256 8f5ce2b6f9b89780b8485000751bae14ea2b33d697a0b3911b63817f4ac0cba5
CRC32 FA2807F4
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5578f3606fd7f423_zidane-screeninstaler iso - full downloader.exe
Filepath C:\My Downloads\Zidane-ScreenInstaler ISO - Full Downloader.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 b3b8e2405d27d3360da47dee7a56cef8
SHA1 6376768400c1e0245f3230cb8b2fcd5dd7c7f543
SHA256 5578f3606fd7f42390b65ee90f690df275ade88ab26b91d55cf11ff5615eb3da
CRC32 06341FC7
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 80066aed0ad33eeb_dark age of camelot shrouded isles full downloader.exe
Filepath C:\My Downloads\Dark Age Of Camelot Shrouded Isles Full Downloader.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 e9c180666a7140c04301634580431625
SHA1 1c91e17f52235a1bf124626610a9128078dc1058
SHA256 80066aed0ad33eeb9c87b5721d1cf2e0bed9ed0f2044d7d5fe6f63d40fb17eb7
CRC32 F49FF2CF
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name fd8c0fecddfa947e_grand prix 4 key generator.exe
Filepath C:\My Downloads\Grand Prix 4 Key Generator.exe
Size 480.4KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 87f225ccefaa56d8edd2ef1c7b03f3f2
SHA1 1d40e8b5de4bafe826978643103b61b1ab94ad99
SHA256 fd8c0fecddfa947ecd963b4e0dc4923290961269081fe7c06e2128c1bd555c87
CRC32 0DFB649A
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name cc9c748786a89ff9_aim account stealer patch.exe
Filepath C:\My Downloads\AIM Account Stealer Patch.exe
Size 480.1KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 81d3278da0dc14934918511dc885918e
SHA1 8a498264640bb3046bfc3b27bf3547e93307e5c7
SHA256 cc9c748786a89ff96bc80a7b65741fa166e91e44973d69bf323fa732c620752f
CRC32 6582045D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a817804d702ba2a9_dark age of camelot shrouded isles patch.exe
Filepath C:\My Downloads\Dark Age Of Camelot Shrouded Isles Patch.exe
Size 480.4KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 ec145ef4776105bad1fe3654fe628040
SHA1 ff8a06382c4f367f03d1a922de9375eb1eb26883
SHA256 a817804d702ba2a9c1b4976f25e1e90b7a6051ec220bd0642cbdb22be70eb8fe
CRC32 290333DC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e5d9c8cf59aff504_kazaa spyware remover full downloader.exe
Filepath C:\My Downloads\KaZaA Spyware Remover Full Downloader.exe
Size 480.2KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 321f79c8ffd7164f8421444fd9dca865
SHA1 586e7b9346238e57801a248b51404a2a11fa89b6
SHA256 e5d9c8cf59aff5047fa8cce3a376cc3c04b3c1494aa186dde03a40a3fc0bb053
CRC32 63C5EACA
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8e21e72b8bbf27da_critical point manga game full downloader.exe
Filepath C:\My Downloads\Critical Point Manga game Full Downloader.exe
Size 480.5KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 a4da5b5f5b8b768ca660ff72afd9a122
SHA1 6a4a405755d86d02f66713c8c791e0ce045eaff7
SHA256 8e21e72b8bbf27daad3cb7f70d275110ba19b893d2a49b7bed52dadce683d35a
CRC32 46C00B8E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 6a954cdcc9be2f04_soldiers of anarchy crack.exe
Filepath C:\My Downloads\Soldiers Of Anarchy Crack.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 eb7060c5fef5e506971a0b174e022cd6
SHA1 8a78958919f5e1c8d8996b9773b5f9fe3fbeb56e
SHA256 6a954cdcc9be2f041aeb8629ed952b73d3b09e1b42847687a0f10d63dcee5c5b
CRC32 525250A9
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name d0d03c5a37206929_dweebs 2 patch.exe
Filepath C:\My Downloads\Dweebs 2 Patch.exe
Size 480.3KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 0c783e2a97c84724f16636d109da1229
SHA1 00ad6d574008ca594e6cb3b4ede65b6e6d610c7f
SHA256 d0d03c5a3720692937c2e7d6054c189cee76076d244d8e7f7806fd110ad6984f
CRC32 15EDF80C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 144c8e70cb712253_red ace squadron iso - full downloader.exe
Filepath C:\My Downloads\Red Ace Squadron ISO - Full Downloader.exe
Size 480.8KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 ddca216fc0c28c81d9f0fab3688d843c
SHA1 b122763cc94afb18c30e4654c2deb1710637cde5
SHA256 144c8e70cb7122530838287095dbf461c3df2aab9b8746f96ecf5d31f382ac50
CRC32 0046F2E0
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 839f8e82ea009066_macromedia dreamweaver mx patch.exe
Filepath C:\My Downloads\Macromedia Dreamweaver MX Patch.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 f7ac5cc655767df397bb8a282a2c33a6
SHA1 5f442a6a878173eec106124200c9fb420eb03249
SHA256 839f8e82ea0090666ce3b6bcdebe3f7a07785a1bcb86808571c5c29412681fd2
CRC32 17459339
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b223a4799975d9e8_hard truck 18 wheels of steel key generator.exe
Filepath C:\My Downloads\Hard Truck 18 Wheels of Steel Key Generator.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 469cbd1f0b2d87817a1d6e577326fdc1
SHA1 3478479d4595549f0cfd3907072517773791e680
SHA256 b223a4799975d9e8016c3771b5808e8c3d69f5324d3ae753a48311841cce515e
CRC32 5E79DD13
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 702f5c797c2d1400_stronghold crusader patch.exe
Filepath C:\My Downloads\Stronghold Crusader Patch.exe
Size 480.6KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 51ab1f18cc8d9153dcdc0159e9f0caad
SHA1 84da65f61d0cb54413d19f2cd2d9cf0093de8fb3
SHA256 702f5c797c2d1400e2ad2c5c9fae204cd95894f00b71781ceb7466ce5e616bcd
CRC32 52D29758
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 4aa4eaaeb5d20bd7_macromedia flash 5.0 iso - full downloader.exe
Filepath C:\My Downloads\Macromedia Flash 5.0 ISO - Full Downloader.exe
Size 480.2KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 fd2c548e457acc6ed99d627e87e228c2
SHA1 eed9d12ed97192479cfac008fc1a185b3ceb2e07
SHA256 4aa4eaaeb5d20bd7a2f702d64254e0800030fa473cff795700aba634fbb692f7
CRC32 DEC241D8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 9b2268d266098e73_internet and computer speed booster key generator.exe
Filepath C:\My Downloads\Internet and Computer Speed Booster Key Generator.exe
Size 480.7KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 3200279f5fbbfa501d7d713f7ff76eea
SHA1 8800fc5cde3667c34c9da654f6d2bf2ccdda72a1
SHA256 9b2268d266098e739bb0eee7edb91af77b842ab9d931fcb73600dda2e482a4bb
CRC32 2FF1391B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b5d6fce483afbad6_hitman 2 silent assassin iso - full downloader.exe
Filepath C:\My Downloads\Hitman 2 Silent Assassin ISO - Full Downloader.exe
Size 480.8KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 df9ced2a49fd636300d1e0048772daa3
SHA1 68963e5245d9fb8cca7b7db432c2eec21ea04639
SHA256 b5d6fce483afbad6d8080b84d5c91d2e661e9275e32e5df8dd3c902bae2935b9
CRC32 675890F6
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 52f74243e911be29_borland delphi 6 iso - full downloader.exe
Filepath C:\My Downloads\Borland Delphi 6 ISO - Full Downloader.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 575f52610095e2aeea8e933c2ecc0af2
SHA1 f08b3c3d56ce4a090932d9816f5cfcba99aa2447
SHA256 52f74243e911be29156b4c23e0a0cc42b0fec2519ea88ffb5cf9efdca78107ca
CRC32 CC28AA52
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5b4c74056ae0d367_red ace squadron full downloader.exe
Filepath C:\My Downloads\Red Ace Squadron Full Downloader.exe
Size 480.4KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 03bb83fdb6124dfd36d35da9e80503c3
SHA1 bb44f71fe13ccb2cd6a18fe34a036f1e2f280cc7
SHA256 5b4c74056ae0d3676d5cf7e0ea42317ecca24b091078c25df983a573af2d07eb
CRC32 C95C3F7D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 813ecf513daebb18_necromania trap of darkness crack.exe
Filepath C:\My Downloads\Necromania Trap Of Darkness Crack.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 2337aa598ffd12fdfa9e8e762836270a
SHA1 640807e002dba4bf59b33afb68045d65c1ba0140
SHA256 813ecf513daebb18897d09d5dec6b0c9a608aa61c97e1f10e9c0b00b08661125
CRC32 73C9E6CF
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f9b9f9bb0c424656_tomb raider 3 crack.exe
Filepath C:\My Downloads\Tomb Raider 3 Crack.exe
Size 480.6KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 68eca7cd932ffe4a71a16c88ba5a9e57
SHA1 de11bb20adf61746cd6183f07702058c6ead382c
SHA256 f9b9f9bb0c42465652d9f12112004d316a8282dda7aaac282e264bcdcdd51d36
CRC32 1123BCDA
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 99d58ec95f68fbd9_windows xp key generator.exe
Filepath C:\My Downloads\Windows XP Key Generator.exe
Size 480.8KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 76c0d4a829c60c7b1da3ab247a9dfe74
SHA1 61289ef4f1f455de27ae9287cf40d9173c48747d
SHA256 99d58ec95f68fbd91c57eff3682b5cb41444c7ee72e2917aeb0c6be32a8e4e70
CRC32 A00BD37C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 1d2935b78624abf9_cat attacks child iso - full downloader.exe
Filepath C:\My Downloads\Cat Attacks Child ISO - Full Downloader.exe
Size 480.5KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 8071a78cea67bd5b0242a25530a59038
SHA1 4bdc9f7750f383d745cb789f5633b1e7074d6782
SHA256 1d2935b78624abf9a14b68cd8dd373a0cfcffa992d5fc1e1533015f8cda4aa68
CRC32 83864B1D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f0d635730052d474_grand prix 4 iso - full downloader.exe
Filepath C:\My Downloads\Grand Prix 4 ISO - Full Downloader.exe
Size 480.8KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 e2c4cc1d475b9a0d4c47af1c031f8c8c
SHA1 90d0e8244f3faa8e4ac1cdb7d34b6c1ddda414f4
SHA256 f0d635730052d474c39bdc5572383039a7cf62b0360bbb3c46af5a11a75d8803
CRC32 1ECEC678
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 7644b6926626a6e1_age of empires 2 iso - full downloader.exe
Filepath C:\My Downloads\Age Of Empires 2 ISO - Full Downloader.exe
Size 480.1KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 cc2c4a253c268154e3061700939f5aa2
SHA1 6fdd9a9489dbbd9ef5303ec3e535aafcb3a84655
SHA256 7644b6926626a6e1af04d195bcca7cfbe0aad590198ea8dc95a740a7638330cf
CRC32 63783E91
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b65d47f680aec875_cky3 - bam margera world industries alien workshop iso - full downloader.exe
Filepath C:\My Downloads\CKY3 - Bam Margera World Industries Alien Workshop ISO - Full Downloader.exe
Size 480.8KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 ab74116d4d06ab473a0fa4f8dacf6402
SHA1 eae21d168beaaed10ed5ea27de6b71e353fff3ba
SHA256 b65d47f680aec875aa9ea6f2313dc934a7881535e6a0a99548cea7a8daffc556
CRC32 8164818D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 1d6ed7028c185caa_fifa 2003 iso - full downloader.exe
Filepath C:\My Downloads\FIFA 2003 ISO - Full Downloader.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 7219a89a7b87d2d2f866eff8bc539708
SHA1 2e2131563f4d0570b21874bf910f13ae8a3ba20b
SHA256 1d6ed7028c185caa421394eabfed00845e1ced400b1a89389d40ecadcbe63891
CRC32 4BAE261A
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 389c3d6bd5157d51_quake 3 arena iso - full downloader.exe
Filepath C:\My Downloads\Quake 3 Arena ISO - Full Downloader.exe
Size 480.7KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 eaefcfff89c874bb64d3cb552999487d
SHA1 48b7772107d0dd756dbb67a2387ee20dc7e835d5
SHA256 389c3d6bd5157d5191f8c3856f616ff38dba33c2c3911892d72d9704adbfdb7b
CRC32 783917D8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bcf5a05c86a175bf_age of sail 2 crack.exe
Filepath C:\My Downloads\Age of Sail 2 Crack.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 652eb341d8de6dd6f6613d9f57637edc
SHA1 eaf361ec2cd13b0e0496f8715b686e969923133c
SHA256 bcf5a05c86a175bf02ef3beee32150576a4c64645686306666680902e143fee6
CRC32 08434AFD
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b73093a1f264c5f4_aikaquest3hentai crack.exe
Filepath C:\My Downloads\AikaQuest3Hentai Crack.exe
Size 480.6KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 1f243ad5cda01cac28a462cbe7550312
SHA1 9f9ca8d557afa55e7b2c6c94f8ace2ec7ff3afa6
SHA256 b73093a1f264c5f4245b7b3a8d5a871229a8f55d2dd201967de9231d1f9d2f52
CRC32 D86377BB
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 36a2804375891e43_battle.net patch.exe
Filepath C:\My Downloads\Battle.net Patch.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 5308fb8604ca9196243e348da0acfa36
SHA1 e9300e06723891856df9a4e215a5083bac1b1885
SHA256 36a2804375891e4315c955bca2cc7f2f6bd13b6c7fe2a81ac59d33d882272202
CRC32 37678EA8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 4fdce2be8f5e4a92_cabelas ultimate deer hunt 2 crack.exe
Filepath C:\My Downloads\Cabelas Ultimate Deer Hunt 2 Crack.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 42c22cd4f2c596495eaa55d003338f60
SHA1 f9fe741fc0855dda0a7b21d2b2c031fb5c1f2068
SHA256 4fdce2be8f5e4a92a4cc7bd1a57df6a1182020de9e30f122aceb242e265c7e3a
CRC32 0928A73F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 220672504a2a16f4_industry giant 2 crack.exe
Filepath C:\My Downloads\Industry Giant 2 Crack.exe
Size 480.4KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 cd0d82343a4460cd47797fdeb2d9d30f
SHA1 ee541ba130fa46ee385e2b3d08e7153c6b4519dd
SHA256 220672504a2a16f48eefbd777d2e7808d00dd447f39b60e1683d759fe24f79f7
CRC32 FA31ADFC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c81309ce03c9e8ae_the sun of all fears patch.exe
Filepath C:\My Downloads\The Sun Of All Fears Patch.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 71b5508916895fa1f31e7c290c1ad5ba
SHA1 932f73c53b6ec6a49ae889008f409fefa3d91652
SHA256 c81309ce03c9e8ae071aeac7b7f54aaea57dcb77d517dce68ddeaa5580243d7d
CRC32 DF58E23D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 3a95155eaed22d09_moviezchannelsinstaler patch.exe
Filepath C:\My Downloads\MoviezChannelsInstaler Patch.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 f86d9f94d61b724501fd4caefed93032
SHA1 c837e768f4499feed5626a6b73b851778680f8eb
SHA256 3a95155eaed22d09871825a1497f6f6e6fe31b8aa0503d08fe0d6c44d2c83039
CRC32 51AB7B62
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 171b3858fb92218c_emperor rise of the middle kingdom key generator.exe
Filepath C:\My Downloads\Emperor Rise Of the Middle Kingdom Key Generator.exe
Size 480.0KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 7f0f426cb3368f5c19dc91ff231a8335
SHA1 a741d41b47fcd14b995894a6b6dfa2a96b5c0637
SHA256 171b3858fb92218c0fe890565ac2340fcec97660be345c63f24cfd1fc50cb4bc
CRC32 71930E0B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 382c9328173fe4bc_ms train simulator iso - full downloader.exe
Filepath C:\My Downloads\MS Train Simulator ISO - Full Downloader.exe
Size 480.9KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 a608f4ec8fd21549b1d9e8fab9cfa068
SHA1 5e5e974913a1eafda1b29c8b6e9496651e2675a1
SHA256 382c9328173fe4bc1c305e7ca3569cc027823beec12233ad82ab8a5f265be236
CRC32 A9648F49
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 4a833f15ed1b17b6_warcraft 3 battle.net key generator.exe
Filepath C:\My Downloads\Warcraft 3 battle.net Key Generator.exe
Size 480.7KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 29cd3bb9dbddc9b569f69b9eeebfb889
SHA1 35bfabd026ca2fb9bcda02e43a8d9b6ad3d62b8b
SHA256 4a833f15ed1b17b685eace516bd20fe42e404f12bc3530ae6cf2cf6a9c956e85
CRC32 047E8298
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5ee91b551e0fd76d_mafia full downloader.exe
Filepath C:\My Downloads\Mafia Full Downloader.exe
Size 480.6KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 8538e1a57f9bab24e21142e229036604
SHA1 232ebd698d0decc01a02a705c385f10ec9f2c309
SHA256 5ee91b551e0fd76d680866f47e6c3f9fdbdcdaaaf1f3eb2e55dd063a3194cb6c
CRC32 15F8C5D1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ecf4c039175571fc_austerlitz napoleons greatest victory patch.exe
Filepath C:\My Downloads\Austerlitz Napoleons Greatest Victory Patch.exe
Size 480.8KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 6c0974656b59a02ad9a8b30773015f5f
SHA1 77b59a7c87b653dd9ee995367684d6f70864db0e
SHA256 ecf4c039175571fcfa71e78de25b0a24bbf864058b55e951be2e5217664ce20a
CRC32 6D73CD8E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 2b7bf32ffa4384b0_winzip 8.0 crack.exe
Filepath C:\My Downloads\Winzip 8.0 Crack.exe
Size 480.3KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 4bf05cb3b116d77eb7d9b2931e5d6b89
SHA1 120704ccd175a742d67cfd7df1a58ebabdced7e9
SHA256 2b7bf32ffa4384b03c676c5d92a767bcdf9a4c5c063109a100d06753895bd1f5
CRC32 559D5C39
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bb9cf217c1b7707a_lordoftheringsr full downloader.exe
Filepath C:\My Downloads\LordOfTheRingsr Full Downloader.exe
Size 480.5KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 fd67104eaf1d5fdf39e6c1f01fcf51cc
SHA1 278f14dd230595f3e4f250ab9c908237d2b0db92
SHA256 bb9cf217c1b7707a69e8201cc019880881b5f34e1c9548fee76e7ca967072c65
CRC32 C38D5BDC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b1006e8cb67a8a1e_borland delphi 7 key generator.exe
Filepath C:\My Downloads\BORLAND Delphi 7 Key Generator.exe
Size 480.6KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 7373371abef2384e73a57dae6f5bccfe
SHA1 5b35180ca1a451f3975b5b17b04f6a93e06551db
SHA256 b1006e8cb67a8a1e0209fbb24d598b853c1e66c2494d011f8dcce0e34b36210f
CRC32 52889798
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name d12b3c26415c92ce_norton antivirus 2002 iso - full downloader.exe
Filepath C:\My Downloads\Norton AntiVirus 2002 ISO - Full Downloader.exe
Size 480.7KB
Processes 2236 (0755c19a841e9f6616ea5c34fa87a493a60de7312dcf2b3f06d1f92ae2aa2613.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 c5d461c2b5820db54a9d15ba35c6f570
SHA1 25d52e715df32d79b56e55a569bed7f8f0474292
SHA256 d12b3c26415c92ce77df289a36b4a4dbaf2b5aa4447b1d1a6c222a68e7f269a6
CRC32 A4189DFD
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.