Static | ZeroBOX

PE Compile Time

2022-09-01 14:37:48

PDB Path

QQBVBZCHGJHSF.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0002f324 0x0002f400 7.89579064182
.rsrc 0x00032000 0x00029844 0x00029a00 5.02051508517
.reloc 0x0005c000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0005ae30 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0005b298 0x00000084 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0005b31c 0x0000033c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0005b658 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
QQBVBZCHGJHSF
AssemblyCopyrightAttribute
System.Reflection
mscorlib
System
String
AssemblyTrademarkAttribute
AssemblyProductAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
AssemblyFileVersionAttribute
ComVisibleAttribute
System.Runtime.InteropServices
Boolean
GuidAttribute
AssemblyDescriptionAttribute
RuntimeCompatibilityAttribute
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
AssemblyTitleAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
QQBVBZCHGJHSF.exe
<Module>
VYrKj829AII6em5coG
dhAiQkIxLU1Z3JJtvn
Object
MJCKVKLUIOR
SbL198SD7tu2Ot9UV8
MulticastDelegate
yu3CuYaptOgGU9saRE
tbwK7Wb3LXS5N0r5aC
DdYuVPJb4GaS4MfGUB
GBnFDis32cLTWeQaWp
caqfykEaCmA5MnGpU5
XvUHjiAAG8o9ilcct1
bXm6w8pwg2OU2Q4US7
goULvwjJDZybbeDQ8D
ejG3qNc2eGEPrdiw7V
I7h7GY6EVKVoy72DRZ
ValueType
swUgOfLDJN5YvbkedU
KNy4SMorJpHjFGTOiq
HUHatung6H02yt8iLY
Attribute
System.Windows.Forms
GdcONNVCfdwLAmuUdv
C0448bYKlYty0wbamB
FcupXjQLqeFBp4bgVR
tXSS98C5Hg1YDoH0e1
Settings
QQBVBZCHGJHSF.Properties
ApplicationSettingsBase
System.Configuration
qcwboyy2g2H7Rg2WAF
yGJXqWfmMAQDsymx6I
kgOqNdDtMryyF94CVn
TV0ZZlBn5ZO348RCkV
s95nHQKyh00TKOHuhs
WFFLn8load3bhvQiW0
pn8edq9lPA9TXDWh5O
DKU1tvtc8YZRNy97Br
gHBUSZ7ZovJDDjy3FU
a56CKcGntTGOSdm6m1
C4dt1BxVGH0p9fxAi7
qLZHefPpCDqNM8gSM2
QugS1eNBdGUJom5FBd
Lwi20Q86GZqP4quptt
f3IASfeJefV4MvRLlN
rNx9sw4NdxQYqDlIkF
MpaFBlvXPZsjPoChBv
vykD8rdrLQelgr3vBj
qVhfuIX9PRlSOGw5rL
QQuURXT3j4APrZKhiO
Jqu1Aw5nn8yW3jMQGp
L975deFZ5tnfWydtGD
Isr0LLMDQNqwGUYqqk
zcYVITRXWLCWJqeYPr
weAdumwlCYyNQnINO7
Xe72KdhgR0ejopE0w0
RrxnfkuNRfVL6Hyj4b
AImR3XHhfOKRl5Pkyu
Plwdl1kZFPFRG4QETJ
C7AGWE3YGIRPU4IkIn
wkD7m8W7s0cvXkpf6f
GO8D8Wmi8w0YLdJYMQ
fpC7ooUu4UjAUp1LE8
MnyMwwiD2xLJcKfsTv
bsvPedrtZ2nfZbgsPU
bpWHpW0pQgJMa9l5MI
q18nIE1ARdl3cjAHBu
JKL88cqgVyXvujFG62
awE455O33E9fFN6Qyl
vbc9gPzc7BsheGDe1c
m5oTkY2ZvSUhqKwmxtF
ySFrbv22pLSJbvMhuPm
CE8wcY2IYeusE6ATfVZ
IiZIdt2g2JnTYlf8XNn
.cctor
mxebcQoyQKV7ewjTtg
rOsa0bCDFULb35nruX
IaCGQfW9P6JE59P21n
tU1oZ3JJt
Fn2n6qyB5
iOYVWllF5
bdkYFNy4S
LrJQpHjFG
IOiCqdUHa
yugS6H02y
y8iaLYvdc
YNNbCfdwL
nmuJUdvP0
VYr2Kj89A
IntPtr
LoadLibraryA
kernel32
cI6Iem5co
GetProcAddress
zohgAiQkx
b6qyB5gCOYWllF5Idk
GetTypeFromHandle
RuntimeTypeHandle
Marshal
GetDelegateForFunctionPointer
Delegate
SizeOf
Convert
ToUInt32
UInt32
Exception
BitConverter
GetBytes
Buffer
BlockCopy
get_Size
ToInt32
ToInt16
Process
GetProcessById
Replace
FromBase64String
Thread
System.Threading
RuntimeEnvironment
GetRuntimeDirectory
System.IO
Combine
WHkRBepsi75GIqES5w
mgyvex4i8fSQgpGvvq
akhxUsENuPCA9djb0U
Invoke
handle
BeginInvoke
IAsyncResult
AsyncCallback
callback
object
EndInvoke
result
thread
NMCXNCNMXCNXCMFDKLFDFDKLFDKDFLKERERRGDFDFDFDKJDJDSKKJSKJSSKDJSDJNMCXCXBCXBXC
address
length
protect
process
CXCCXHJCXCYUXYUDSIUWYEWHDSKDKJSJDSKJKDSJKJKDKSDJKDNMCBCBNCBXNBNCXBNCXBNCXJHSDSJHDSSDSD
buffer
bufferSize
bytesWritten
bytesRead
applicationName
commandLine
processAttributes
threadAttributes
inheritHandles
creationFlags
environment
currentDirectory
startupInfo
processInformation
KDit32cLT
ReQ7aWpga
XfyGkaCmA
JMnxGpU51
GUHPjiAG8
d9iNlcct1
bXm86w8wg
bOUe2Q4US
zfc4wboy2
c2Hv7Rg2W
nF9dGJXqW
SMAXQDsym
A6ITQoULv
p0wEbamB4
IContainer
System.ComponentModel
Dispose
disposing
IDisposable
F48sbKlYt
System.Drawing
Control
set_Text
Container
SmLV5OSo8UukdIcapT
jmFUXNum6pYUgxLLaV
JjdeRrUWL1yqmpQSOp
tKWEOJgtI1kEyEKVTH
RrvrrNMYbfIgxPP4ll
AutoScaleMode
ContainerControl
set_AutoScaleMode
z4YYuBVhmZ18oBJknN
set_ClientSize
c1YfDoH0e
ResourceManager
System.Resources
WWbjL198D
CultureInfo
System.Globalization
get_ResourceManager
get_Assembly
Assembly
rupAXjLqe
KBpp4bgVR
RouXt0IfuAViktCaPL
n00nsUqb73bk5RiKIn
atGRqnjLYhhHey6d3r
tXSyS985H
S3LBXS5N0
AppDomain
get_CurrentDomain
ResolveEventHandler
add_AssemblyResolve
ztuc2Ot9U
f896u3CuY
ResolveEventArgs
Stream
get_Name
GetExecutingAssembly
GetManifestResourceStream
otOLgGU9s
IndexOf
Substring
jREDLbwK7
GetManifestResourceNames
Tke9WiAP0rM23QH1o2
gyJA0vZuLThVyeXO7L
add_ResourceResolve
TanpEi6r1SdsUE3For
rWvW1X2EXCDJyXUXXf
RIyBNPkvuX61cGLpLP
whQXbDJbWW7HGqXUnj
jw9UA4cxdXK9dvywYA
Bl7vtrKy5eurxRYDTe
StartsWith
BeMdCmssjnr9G86wPD
kBLwTLajFS8bnUW24J
get_FullName
defaultInstance
SettingsBase
Synchronized
get_Default
X8qxcBYBgpSJ4umxbd
TkWwkOrmTvm47dL8E6
Default
fPbl4GaS4
LfG9UBvBn
Encoding
System.Text
get_UTF8
V5aKC8dYu
get_Unicode
GetString
Intern
J8IwFeB3ufbrQYbrZH
zEaxbyGL9AX1vMcuic
K6vMfO7DoRe4haLq3I
kmL4wUnZPZD6721NMb
uCaFBZxabX453nWUVa
p72hDRZ6w
TgOufDJN5
gvbHkedUJ
dOqkNdtMr
MemoryStream
pyF394CVn
TV0WZZln5
MJD5Zybbe
uQ8FDnjG3
Reverse
get_Chars
YN2MeGEPr
Monitor
HiwR7VX7h
zGYwEVKVo
UInt16
DESCryptoServiceProvider
System.Security.Cryptography
ICryptoTransform
DeflateStream
System.IO.Compression
ReadByte
get_Length
get_Position
get_InputBlockSize
get_OutputBlockSize
TransformFinalBlock
TransformBlock
set_Capacity
set_Position
SymmetricAlgorithm
CreateDecryptor
CompressionMode
T5P6xptArNmWm6jSBf
xqb0c4dxveasAIox4H
jRPBMKmNThBjSqGEg0
OMf3vI34IuOkdTJHK9
z7Mul49y4SLxqnnhNj
NumberStyles
xMxmXjibnrhBlZdKqR
fryIVoXEDPkYR9VUI7
R6YDDb1AvaHKIZ6wWf
PPDcIJbYOnaYHKcOml
Xn7nRkHyV9ur4RYcsB
set_IV
pGRR8J59p16jpcalqS
set_Key
Aw6ISdlWJS0YCiZ7WT
em73CLebEGMhMZ0yC4
XykUg7Tw4L95l6ly62
UIntPtr
JJocqJNh3pDUHuf59r
sKyhda8Uw5gfoKS8ZC
rpYSHoPRZ8msKgcasn
c89Hv8Rbbh2Koic5Kv
ToArray
MPkUDHQFgOBcYPaJs0
qLZ2YHefpC
aO3m48RCk
SetLastError
kernel32.dll
f69U5nHQy
CloseHandle
N00iTKOHu
OpenProcess
Ns0rFFLn8
GetCurrentProcessId
dad03bhvQ
LoadLibrary
UW01yn8ed
XlPqA9TXD
Sh5OONKU1
yvcz8YZRN
p972ZBrYHB
TSZ22ZovJD
ujy2I3FUZ5
tCK2gcntTG
StringBuilder
GetClassName
user32.dll
YSd2om6m1P
ToString
Fdt2n1BVGH
Vp92VfxAi7
VU55TZCFgZ4UWKgYy2d
l1809VCC2c1AaCbNUta
Compare
diWpYly2Hx7jHSeNs2
Ng5pslznDGyL8cSlYh
KHVJGyCW4ikrrCqaF15
get_Capacity
TCP0TWCo4b70ge5AGWM
Format
edH7OqCvaNJXPpqPlMf
Debugger
get_IsAttached
Pqk6LgCfvraM6x0s7eB
uqN2QM8gSM
bku2CgS1eB
GGU2SJom5F
vdM2awi20Q
sGZ2bqP4qu
ott2JV3IAS
ProcessHandle
ProcessInformationClass
ProcessInformation
ProcessInformationLength
ReturnLength
debugPort
lpOutputString
hProcess
pbDebuggerPresent
lParam
lpEnumFunc
qJe2sfV4Mv
LLl2ENcNx9
mwN2AdxQYq
ulI2pkFwpa
CoC2fhBvBy
KBl2yXPZsj
PD82jrrLQe
op_Inequality
RNUrgDCjpgeVlVxcpgJ
PBbgsFCIlxxncV25HRd
fhf26uI9PR
xgr2c3vBjf
xSO2LGw5rL
QQu2DURX3j
FAP2BrZKhi
e8y2lW3jMQ
Y5q2Ku1Awn
ApM29975de
op_Equality
oNuyXPCY3O4pgMrsH04
aCD6fOCrRbtrB4RpP8C
yGD27Tsr0L
a5t2tnfWyd
tDQ2GNqwGU
gqq2xk7cYV
Concat
uEHb9bCxoNYLQZD1m2q
xASh90CDmNOaOu0wRla
QQBVBZCHGJHSF&&
GeneratedCodeAttribute
System.CodeDom.Compiler
CompilerGeneratedAttribute
DebuggerNonUserCodeAttribute
EditorBrowsableAttribute
EditorBrowsableState
Copyright
2022
QQBVBZCHGJHSF
.NETFramework,Version=v4.5.2
FrameworkDisplayName
.NET Framework 4.5.2
1.0.0.0
$f4279b33-13ef-4627-865a-d42b0a511305
WrapNonExceptionThrows
3System.Resources.Tools.StronglyTypedResourceBuilder
4.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
11.0.0.0
UYYkeET
m2kq.s_
^Gf/vrU
8uUiT~
yO7d|Y
?I)@pq*MT9
Z/ruZ+V#
K&h'+GU:
9~Bvbw%iW
iN.o5#
"v{/'
E)Idee
@Y|(\1
!uxmM`
t jldE
~~*KU^
U-*,Sj
*9$8&%
F4t|3'
fkJhPx
^HX`OT
=;v,>G
{80dY.b
>z2-gH0t
#xaALh
74[j]-
B=HB7?
)`1b'=
|sV3cNy
\Jk}0l
6nv3*F
}%"(V7
Ke]=pA
iB`&.3
fqf4L;
ood',!
_.])p"
}]C*&HD*t
9]:mz:
:x3W|^
6(b.C?t]
yw@gzY
*NG+JcSN_/
7lyP `
dopTKO
oE^]9o
fD~.NQQ
6_^`=^
*o[Wo
6w"'i]
U*-2uC
I^ug({rX
#*Fci]
X:L_vg
DAHn!kNJ
L=q(yj
D;C<bN
=lp<[E
pI"@~:
o2"t%t
VjEg61
R=?[ %.]
ACqAoT
DU(^KT+
1]g]pKwgc
bAt.;L$
.1);-@
Qb6h@[
Kgb:YM|
Y.o!o{
92IZK5I0
-|!K Po
/J?c:P
RK&"Ez
#epf!+8
9k{.<)
eRc1V'G
afSM:=v
S'D-+
Of!~'.W
b8yj+2
yiI5@jj
b$]T3!
n?J*!4j
1F2uE
fPWe/dN-
;p51|j
@lGTN#
Mh,},yb
6y2^X(
OZ\d4K
M>M5qp(
Q3KJJ.?@i:
&loqPJ
czNYBw
?JNg-V^
%-E]4l
3g|{&Umj=fk@
-w8rS`
0*Tcz8Y
n4D`L]
H`Yvk~jj
14.P.7>
^,R`M#
e.> PN
4V[hz0u!
40et3.Z
,_eck U
4WakJR
yyHS $
ZzF>`0
YI$qo~Z}
jKZ!Wl
S"*Mh`0`
Dw.Af_
>bUS2X6
@+;?nF
u@m<!Z
mgW)}P&
1oEgf[
q+)TYZ
7mo+ p
:|x!-B
L$3l`p
RY!|)E7^
C~D^T
j$"w?V
7kXPT%dX
~8%VSG>
TSN}9i
<gFHdq
PkOsI%<
$gR$!l
ZxMd^[
B#S<)]
AXA>ak
IZGhJ,
O_( #-~?/B
?\r|7;}tqB
d|?{KX
4SLBrOy
9oD{5b
`xQ/g!W
r:^{{>
4.mSw`
[owWfj
'PS0?gR
A`A1]i
V#q(\p
4vz[;gr
>^,R'g
;q+xo
9+VD|
Zj+NXz
ydt|xwDQt
fs85G:
N$bSOb
$\Mbd`
gV"s-*
@8d{9Be%
A>Q[mP
}]qlK[
'Sv2z!
/=#5|N??
xNRNd_
=$rm+m
KImT.]
*-GX<tg
9]Fg{j
[2/ey
1v''#Q
nyB\EZ
!IZydv
gi*0<h
Noij\<
"BA($Z
(FE:WF
E-"2sU
,3l+$Vci
y9j%Rw
Jt411Z
)Xm[fW
>V,E&F
%FY%$[R^V
q(+Y$h
Ax_mrX
A{KzyE
r`):wm
-" +VZ
-<MI7TZf
A8'm?wk
&8Vyyw
2*IF($cdY=
wVk7,|^
\nS&|`
g1O~'D
\15t^*
X7GSI3g
Q7iE-[(2
[L1KbC
0~n7gE
*O%8kxS
]\V7VF
P9NlKm
6I`MN;;
|03]fW
FTbLB
*14c:po
=5hF>QM^
iK*0YG$
m,o)a!h~
>gDoH%
_\.=L$
Tk+S5o
NOesS-L
vfp!9g[
HmWd\^
V(~6(r
D:Y<3h$
_V/xMT*
%mb('*
KLNTMl
d([?ejw
c\H#Sl
G7zT|
>q\e@4
3?NNAIDw
1QKqn+'|g
;n5:1e
-`[m8l5
1:Bxdd
P~nst;
Mzm-r#
! ^Q4(
,O*6.}
+3HeJh
Ofe$ M
T:;[T
TKM5I_
N_"O,8
U$&gj%.
`I0R@0
GLRnLa
hxTLU:
bc>TCKG
D}~"<a
oHwD{Z
vwF:p
~udmZp
1xk{d"
[eN?US
QRab_Q
>N!CNV
Zz+I\Y
u+Bds[E$
_?tB]V6
Mgw)OvWtA
;=Y~go
~3u>i>'8
$ou,m
]461x(b
"~UOL.X
InL4nY
&UT0mN
RKA66E7
]Um{v~
Vlt_uY\q'
"[[)De
yc W4L
=-(U-~T
yz}H<|
>sdX'!C
w"1zfU<
Tu-;(z&
c+Tdw3#>P
;by!kYY
WS'#V&n1
!kJ|lyI}
.tn`N
GaF* B
Ty`HIb
0,YWNbqr
u[[m9F
L[d}<D
sOTgT7
#=wm^>
cAEf\cRx(_
o^bp?
?oV(#'
&e6T9V
_n54PP[
v%MNjqi
4B6,,Z
e>NW{l
.XR}1S2
2on|A}
d\jRv$
5#?Uc^
>y8>4(
M<petC3
!|by*P
[!*@,\
q0cjzl
Pt(ls1
>h*0z_d
=|\;]v
>sx1Gn
e0dR2;
`5C}n.i
QQBVBZCHGJHSF.pdb
_CorExeMain
mscoree.dll
h9|k\h
kC1\95
e~9y)a
JdG=g.*
<W_J"cr?|[o
\1:$!:$
]m:;;]
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1+0)
"DigiCert High Assurance EV Root CA0
120418120000Z
270418120000Z0l1
DigiCert Inc1
www.digicert.com1+0)
"DigiCert EV Code Signing CA (SHA2)0
+.+1Xf
http://ocsp.digicert.com0I
=http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
:http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0@
:http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
.http://www.digicert.com/ssl-cps-repository.htm0
DigiCert Inc1
www.digicert.com1+0)
"DigiCert EV Code Signing CA (SHA2)0
200526000000Z
230531120000Z0
Massachusetts1
Private Organization1
2080968201
Washington1
Seattle1
The Tor Project, Inc.1
The Tor Project, Inc.0
.b1g2Z
US-MASSACHUSETTS-2080968200
1http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
1http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
https://www.digicert.com/CPS0
http://ocsp.digicert.com0H
<http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
v}WqAU
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
220329000000Z
330314235959Z0L1
DigiCert, Inc.1$0"
DigiCert Timestamp 2022 - 20
AjEB#AZ
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
2xJK7*L
DigiCert Inc1
www.digicert.com1+0)
"DigiCert EV Code Signing CA (SHA2)
220826012122Z0
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
220825224957Z0/
E"!E")E"1E"9E"AE"IE"QE
aE"iE"qE
.+'.3@I
UVFCVkJaQ0hHSkhTRiQ=
PublicKeyToken=
publickeytoken=
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
QQBVBZCHGJHSF
FileVersion
1.0.0.0
InternalName
QQBVBZCHGJHSF.exe
LegalCopyright
Copyright
2022
LegalTrademarks
OriginalFilename
QQBVBZCHGJHSF.exe
ProductName
QQBVBZCHGJHSF
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
<<<Obsolete>>
RAny use of this Certificate constitutes acceptance of the DigiCert CP/CPS and the Relying Party Agreement which limit liability and are incorporated herein by reference
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.61653474
ClamAV Clean
FireEye Generic.mg.9e22324dca3d7fa3
CAT-QuickHeal Clean
ALYac Clean
Cylance Unsafe
VIPRE Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Clean
BitDefender Trojan.GenericKD.61653474
K7GW Clean
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Trojan.Win32.PSWStealer.EHP
Cyren W32/MSIL_Kryptik.HRZ.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Generik.KZCFDYK
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.MSIL.Agensla.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Ransom.Blocker!8.12A (CLOUD)
Ad-Aware Trojan.GenericKD.61653474
TACHYON Clean
Sophos ML/PE-A
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
Trapmine Clean
Emsisoft Trojan.GenericKD.61653474 (B)
Ikarus Trojan-Spy.BluStealer
GData Trojan.GenericKD.61653474
Jiangmin Clean
Webroot Clean
Avira HEUR/AGEN.1251318
Antiy-AVL Clean
Kingsoft Win32.PSWTroj.Undef.(kcloud)
Gridinsoft Ransom.Win32.Blocker.sa
Arcabit Trojan.Generic.D3ACC61B
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:MSIL/Formbook.AMUI
Google Detected
AhnLab-V3 Trojan/Win.MSILKrypt.C5230939
Acronis suspicious
McAfee RDN/AgentTesla
MAX Clean
VBA32 Clean
Malwarebytes Trojan.MalPack.MSIL
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H0CI122
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
BitDefenderTheta Gen:NN.ZemsilF.34606.wm2@airAyBo
AVG Win32:PWSX-gen [Trj]
Cybereason malicious.58286b
Avast Win32:PWSX-gen [Trj]
No IRMA results available.