Static | ZeroBOX

PE Compile Time

2022-11-01 19:21:30

PDB Path

VBCVCJHFF.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0000e2f4 0x0000e400 5.90892916425
.rsrc 0x00012000 0x00001652 0x00001800 5.00979578314
.reloc 0x00014000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000131c8 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x000131c8 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x00013630 0x00000022 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
Z T4X^a8
\|[!Z
Z o tpa8
H'%&8\
[16*Z i
Z 4zb3a8H
xZ #*:*a8*
q@K%&8
Z mnAVa8
yU+.8&
3/2<Z b
Z +5}ta8
yw:C%&
_bj2
_bY*
Z kxdha8
3B_a8M
G0Z =*
J[Z 0&R/a8
Z_bX
|t\E
K&%&8O
8M%&8;
Y_cX*
>>!*%+
6z^.Z
Z N5a{a8
1 MH>:a%
=Q 47
\Z +xo
GzFa8m
wS[a8)
~'v<+
Yfz38
vRgZa8#
'Z GHx
~8*L%+
S6 #[/
F@Gm8
G7Ca8l
0L[ %+
K&CP%&8
X)&%&8Z
;e5j8
}@auZ
]8,*88
O8xf8
#~wZ 4
s@yZa+
s|QZ =
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
v4.0.30319
#Strings
'WZLA3jz9M%F;BrZiaQu<9>#"
VBCVCJHFF$
UInt32
ToInt32
c00d9a2ae2456b52e9d40d8e138292982
ccbb3937f02f0ca2f7bca210c1f4eaca2
c3dd9c0a477c36808beabec562014a233
c552cd917c580b1405430250845e4a9b3
c680b9036b0a899875a10e922fcfcb244
cd20365536cd185241beeb68ae0d3da54
c66d97aeae628603c8ab3b764b791af57
cf6c8f3b73e72f07162c8fbf9d230fae7
c1616e3a6d40b86a7cf988618c97f8e08
get_UTF8
cdc68d60724033ef318cdc7eed3e56149
c94ce2391c1592bef3cf60d6d1c2105c9
<Module>
VBCVCJHFF
System.IO
set_IV
c243b1773522677ac282548669a1daa8b
ce423cf8319b8069c12cc0f2510e5a1bb
mscorlib
c1ab47fa5f7b7f96b96f54ce5a0b7354c
lpEnumFunc
GetCurrentProcessId
get_CurrentThread
thread
get_IsAttached
Synchronized
ReadToEnd
set_IsBackground
set_Method
GetMethod
distance
CreateInstance
CompressionMode
get_Unicode
cd773b6be1942951c650147138379f0ee
EndInvoke
BeginInvoke
RuntimeFieldHandle
RuntimeTypeHandle
CloseHandle
GetTypeFromHandle
ProcessHandle
get_FullName
GetClassName
ValueType
SecurityProtocolType
GetType
GetElementType
Compare
get_Culture
set_Culture
MethodBase
ApplicationSettingsBase
WebResponse
GetResponse
Reverse
Create
MulticastDelegate
EditorBrowsableState
posState
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
GeneratedCodeAttribute
DebuggerNonUserCodeAttribute
DebuggableAttribute
EditorBrowsableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
SuppressIldasmAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
ConfusedByAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
ReadByte
matchByte
prevByte
get_IsAlive
VBCVCJHFF.exe
get_InputBlockSize
get_OutputBlockSize
inSize
outSize
windowSize
dictionarySize
IndexOf
System.Threading
Encoding
IsLogging
System.Runtime.Versioning
FromBase64String
ToString
GetString
lpOutputString
Substring
get_Length
ProcessInformationLength
ReturnLength
AsyncCallback
callback
TransformFinalBlock
TransformBlock
System.ComponentModel
kernel32.dll
user32.dll
set_SecurityProtocol
GetManifestResourceStream
GetResponseStream
DeflateStream
inStream
outStream
MemoryStream
stream
lParam
System
SymmetricAlgorithm
ICryptoTransform
Boolean
IsLittleEndian
System.IO.Compression
ProcessInformation
System.Configuration
System.Globalization
System.Reflection
get_Position
set_Position
Exception
Intern
MethodInfo
CultureInfo
InvokeMember
StreamReader
TextReader
DESCryptoServiceProvider
StringBuilder
Binder
rangeDecoder
Buffer
get_ResourceManager
ServicePointManager
Debugger
System.CodeDom.Compiler
BitConverter
SetLastError
.cctor
Monitor
CreateDecryptor
IntPtr
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
System.Resources
A.c1ab47fa5f7b7f96b96f54ce5a0b7354c.resources
DebuggingModes
VBCVCJHFF.Properties
properties
NumberStyles
numPosStates
GetBytes
BindingFlags
Settings
Equals
Models
NumBitLevels
numBitLevels
get_Chars
RuntimeHelpers
ProcessInformationClass
hProcess
OpenProcess
GetProcAddress
numTotalBits
numPosBits
numPrevBits
Format
Object
object
System.Net
Default
IAsyncResult
result
Environment
pbDebuggerPresent
ParameterizedThreadStart
Convert
debugPort
FailFast
HttpWebRequest
System.Text
startIndex
InitializeArray
ToArray
set_Key
System.Security.Cryptography
get_Assembly
GetCallingAssembly
GetExecutingAssembly
BlockCopy
LoadLibrary
get_Capacity
set_Capacity
op_Inequality
Confuser.Core 1.6.0+447341964f
VBCVCJHFF
Copyright
2022
1.0.0.0
.NETFramework,Version=v4.5
FrameworkDisplayName
.NET Framework 4.5)
$baca0f24-5b8d-4fcd-aff0-9300be1aa532
WrapNonExceptionThrows
3System.Resources.Tools.StronglyTypedResourceBuilder
4.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
11.0.0.0
VBCVCJHFF.pdb
_CorExeMain
mscoree.dll
New Jersey1
Jersey City1
The USERTRUST Network1.0,
%USERTrust RSA Certification Authority0
190502000000Z
380118235959Z0}1
Greater Manchester1
Salford1
Sectigo Limited1%0#
Sectigo RSA Time Stamping CA0
?http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl0v
3http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt0%
http://ocsp.usertrust.com0
rRj;B7|
[C]e=P
Greater Manchester1
Salford1
Sectigo Limited1%0#
Sectigo RSA Time Stamping CA0
220511000000Z
330810235959Z0j1
Manchester1
Sectigo Limited1,0*
#Sectigo RSA Time Stamping Signer #30
/l}.aQ
https://sectigo.com/CPS0
3http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
3http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
http://ocsp.sectigo.com0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
210812000000Z
230810235959Z0
Private Organization1
91320192MA1YED3N921
#Aicho Software Technology Co., LTD.1,0*
#Aicho Software Technology Co., LTD.0
-91320192MA1YED3N920
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Ed5Zs*
w3hdQ{
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
fS`A4^
Greater Manchester1
Salford1
Sectigo Limited1%0#
Sectigo RSA Time Stamping CA
220803135605Z0?
&GRAPHICRATING-KOLORIA-FILE-PDF-ACROBAT
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Clean
tehtris Clean
MicroWorld-eScan Clean
FireEye Generic.mg.115a918d03c2383d
CAT-QuickHeal Clean
ALYac Clean
Cylance Clean
Zillya Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005944cf1 )
BitDefender Clean
K7GW Trojan ( 005944cf1 )
Cybereason Clean
BitDefenderTheta Gen:NN.ZemsilF.34754.emX@aCkhXid
VirIT Clean
Cyren W32/MSIL_Agent.DSJ.gen!Eldorado
Symantec Clean
Elastic malicious (high confidence)
ESET-NOD32 Clean
Baidu Clean
APEX Clean
Paloalto generic.ml
ClamAV Win.Dropper.LokiBot-9969312-0
Kaspersky HEUR:Trojan-Spy.MSIL.Noon.gen
Alibaba Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Ad-Aware Clean
Sophos Mal/Generic-S
Comodo Clean
F-Secure Clean
DrWeb Trojan.DownLoaderNET.447
VIPRE Clean
Cynet Clean
McAfee-GW-Edition Artemis!Trojan
Trapmine Clean
CMC Clean
Emsisoft Clean
Jiangmin Clean
Webroot Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm Clean
GData Clean
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!115A918D03C2
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
Fortinet MSIL/Agent.NSM!tr.dldr
AVG Win32:SpywareX-gen [Trj]
Avast Win32:SpywareX-gen [Trj]
CrowdStrike win/malicious_confidence_90% (W)
No IRMA results available.