Static | ZeroBOX

PE Compile Time

2023-08-21 03:00:06

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0003ae34 0x0003b000 5.31602033901
.rsrc 0x0003e000 0x00000546 0x00000600 4.00747116922
.reloc 0x00040000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0003e0a0 0x000002bc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0003e35c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
com.apple.Safari
Unable to resolve HTTP prox
KS6zj4
ghr-%)
8"}uyVttm^KW
br9wBX72!h
4*==+|kbavmB$54544546+kogaC$-4*==>rv$?02|$?02jmS$?4*45$PJ$wsk`jmS,$4*1+ehhm~kI
WKb_2$;61
nSk}boh
<0&943
K,."o;;$#$
;bwbgssb
[SBEOE
;&;p;278~3;*-'-
XVdecyxo\~doxx
IVy}endc]V~leyexicGVoxk}~leYF
9(1&5# 2;'
^yOGEF
6/7<!=3
QrCJKt
t{wg(+\a
}>+(53)($
X^JFf*0d
c2B5A21?C5614*2EE?*AD33*6317*3721F6A5
f(bnSS$U""^^^^VPKSWT'KVW$RK^'Q^K__RS"%%U
S_RZG]VWVAp
WA\D@@Rc
@D\W]Zd$
7GZAVPAZGe
GP^V\e
YT\A[PQPGv
FBZQ[\b$
DIA\FMLMZk
M\IKANA\ZMk
FAIEGl
[_GLFA
=[,.+/[() ]\X4*.![4.\*-4..[(4\[,*\)\*"
?M@HUODEDSb
EDEODUYd
RVNEOHv$
^555555555555(5555(5555(5555(55555555
||Qyu}p{K
M.4?7?6#.3.4?>
gRHCKCJcTIRGEORHCNRSgV
dfeD.DH
;+ubtphuE'DR
X15-&,+
b0-$b+0#$#
0dcy|`>~yqxsiu{Lcus~ubuvub@Lbude`}
S0u|``QL
%bziiz'
v#zstoin!
xceb>-
Ty{54!w7081: <2
XCls~vkqz{zm\Ckyplpm|vRC
&94<!;010'
!3:&:'6<
Lc|qyd~utubSLdv
UWQB_DcTUD@IBS^ulD\EQVUtl
%@ILCJWu
_A&C&-08:+><
Q~hdydychiDQadl@dih
lzykb^
>9#8"..
WBB}3%8 $$6
aTIqfuqfPswnP
)Dk}tq~wjhDvwsty~D
B-<=9/"-
IUCs`bgat:-'<&;
{/-"+9
,:(;!9::(9
;,=:($
t[dubuhstcuhpttfw[
uvrt!uvrtpuvrt'
$=(=8,,=
&n}ps~}v
%(/5.488:
VLWMAAC
}/;m{f~zzhy
Dk`vkswwet
0CVCFRRC
7^HADKB_]q
:/3!K(60
]%0% i,01%
Cf#2)+#4
_MP(gzg,lrTfpmL
WNBLCKJF
NN^GJ]
NFJEYNX~
NFJEkpLEB__NX
+8(1<+r
z9/2*..<
z`80<3
:34))8.rr
ODR[^qZVEPXEg
I}?>";
%?$>220
OeesuuW6bsxdsbx_6sbw`
MM[]]_J[PL[JPW[J_HWLN
%%K^KNZZK
8^/%TU@
KJ]NJ]KLV][]JdYTTQb]TQ~d
Mo,,s9>"
l{mK"
z7=HDXNL
bftW@]q
QRHUWS@JLICJ@\^R
!|a`f||j\S=/_L\afXScv}df}_/af{}nBSJ]NX[I@\
d=5{nk!dlfz~
OCKU{`r
5:+/;5
GTKPfOGVQ[q
rvdVPCOq
w+/=$(,
gwpw0njxAmiBm{jwMBNJXAMIBv}jwimnW
gNYXR]QQS
,armv@iapw}W5
zjfj0jmwrnjXB{fkr{Z>l{zp
ssq]>NJXB7(&f6>m{rwX>s
lyqlNB
WPJOSWe
QFGMBNNL`
NBQDLQs
FQLWpOBVWQJu
=qpe3noxkoxnAoxiixZMI[A
no#4'#4"m
_:tm[varvaw8
te>6:5
)>-)>(g
'|txwFk|jlFk|ok|j%
."yq}rCnyoiCnyjnyo3
SEX@DDVGhERDBhERAERD
;5e4nxe}yykzUxoy
Uxo|xoy6
R[2h~c{
yS~iz~i
>\bLJ_|
a;!: ,,
>=<32107654+*)(/.-,#"! '&%]\SRQPWVUTIO
MXBYCOOm
S%"5&"5
]XXNYOOjGBJf
~&4<:
02665-,
dSWWTLMwdK]TQ^WJhdSWWTLMwd
d][Q^^wdL^WKWJ[Qud]JYOL^Wkz
D ! W$T"&'&&W..T%r'''%'"&PPU#!%/J}yyzbcYJesz
pydFJ{sbeoetcE6qx
qwees[6eayrx
eds@bxsddcUJBX6eayrx
AJbpyeydu
[JsdwabpyEX
DEDD3@0FBCBB3JJ0A
CCCACFB441GEAK.
=.B\DC.
0@0!-)
@w>6$2/733!
Unxe}yykZ*Z^^B
*#A2FCKGo
2BTIQUUGv
YfkqgzbfftE5EAA]
u$3 $3
RVNEOHv,
HQT\Px
I^MI^h
Bi!46,'/'.
'!07-1'
?:2>+<
+<5<!6
6!2$'5<
;%cfnbS(
63;7"5
slb"rz)?63
z7;(=5(
6;/.(3
zr~k|UO:%+k;3`v
zU3~rat|aCOva|g@
rfgazEO
UOTNBB`}RUOTNBB`}
?~humii{J)JUJ
KANXsCFNb
N]J_`sCFNb
N]J_`s
kNR3h{lyfN
aasBB]B
)Maf|g}qqS
^OXIOy
_uvp:qf{`GHqf{`GHpf}vx}uYH
L$PWKl{VARVAw
R1FKSklRYFKSid`WY`ajK7613rjRY@WDRQCJV
)*6GM[F^ZZHy
~I^MI^HXUMgxumWZ^ig~izlo}th
][OYD\XXJ{
ehpJGCt
%+2%6 #18$
EXK(%=
[~F:?)4,((:
P_RJht{uH
\'0#'0
0'4"!3:
|{|;v{ctgay`IV[Ctgay@Itwcw5v{c`I
diqFUSKr
~(;??-<
}kbgHco|ia|^
>9>y49!6%#;"
65!5w49!"
_,?;;)8
ESZ_p[WDQYDf
w`6%!!3"
/tbknAjfu`huW
GJREVPHQxgjrEVPHqx
jpiz~~l}
-jmj-`mubqwov_@MUbqwoV_
-[qpuJ&8$6dsrwyzxayR\G
LXQVKKZlMZSSPMKQP|QPVK^\VKQZWKJ~
QPVK^\VKQZWKJ^
XQVSSPMKQP\
VQ\IQ\m<
m!4!$00!
1Gp=fnbm?
}2iamb#0
@VKSWWET
q2h~c{
KQJP\\~
2lkqjp||^
73t4;3663(.
~obidohaxe]f{ysG(
/8:<3<
}/89<213*2
})83/8)3
=QK@NJq
AWJFVLa
W,iI*co,
$"*hl
CN803qu
8!521
'iataD nigoL\
0N bU\YV_B`
7mi2nfwj
y3)dxv
9szxz.z},|rr~|r+x
C-+a|6*$
7WVPJK\o
bIAGJA
FPMUQQCR
f+76",
q0KP!&&cJ;&$&&cJHM
BpR6bx'/#,0'1
.: ~humii{J$hx&
hhr&'!<)+!$88
v{I\Il
ZM[}tZM[_GZjPMLFIqtPMLFIq
%2$ 8%
w:">3>%
L[MkbV]LQj
`y`A/c``L
.psdOZKCAe
'l.bjd`L
-&)9>8
_H^xq_H^ZB_oYCHn
W@VpyQJA@Mf
YfW6<,+-
kintupS
491<+4
0?8=0%0
($.".."
}h}X<nyoI@nyoksn^@
qdqT0bucELvbeC0@YA
I^HngUTLTTxgUTLTTx
-gqaf`
ZM[}tMEGZ@ktMDOGGo
.)>74#8
m/B~blihJfbT
PCpKWAhKCALb
(\9(=;(92
D}YNGSDCXb}RNHETURYBDQ
%02428
0==8+>
~~\1t}pAMb
~xerdu~cA1u}xyr
^lmecpFgaK^mfmomA^
\I\YMM\
bq%0<#>7q4%8
~)9=%"9
0h3VP]VFBV@
cjmvpwpapgk-
9X@MEXBIHI^o
_[CHBE{
04<>#92
(???r999
Q}(:c`d09"
gfhlNODfLEBEBJCh
K&:) +
V(]JKFY@]
JYF[FBF]
[I@\@]LFb
`{Mdl}zpZ
fEXDDRTXEGh
Ep}F[GGQW[FD$
4#!"#&$ty"pywmt#u"mqrqtm$ppym#vr$wxsx!
}kxv[|jx[F+*wpN
![}zSDCLToM@HSDr$
oe.-e}u(e.uo0/<
024':!
@AG]\Kx
+f-~vndv87>"v%%3:v%?v317$9"
/"$3&9$
23,?:7?$3
v3>"v09v3,?
MZG\{Q\ZMXGZxLMRADIAZM{
w*g,w8#w;6"&2w#89w$>w98>$%2
8l!j1+td}pG
C\OuCSJGp
tQ39rq9!)t9r)3ls`ZldhG
`c.e>${s
3g+a2:g*a:un:v{ok
:nut:is:
rn:|u:
RZVyPY^ECd
DSNUrXUSDQNSqED[HM@HSDr
dsubytuB~q}~q\LusyfuTL-
=b"#%8-!>#*"%l) ("-$l!)8?5?l):)%>8)>l#8l() %-
1SPS*
KDBM(5
v4.0.30319
#Strings
CX{
! ) T w
"$"V"h"l"
F.v.`.S.^
5SJ0FegF30
0WhVT8fGO70
4uBcRomdI0
IrzKjmtI0
p4wIT517cK0
Tr4tDDnP0
HZRUGjafvP0
wSpCf41t2R0
EBfsR0
rDcF0uS0
MYGezZUi0
uFhFlUu0
xV1Z71
HMACSHA1
oTn8B1
1wnPY5jYB1
PCCNPD1
6kwT2GkT1
O24rB5Y1
6ObXmCZ1
IEnumerable`1
ICollection`1
IEnumerator`1
IList`1
CS$<>9__CachedAnonymousMethodDelegate1
get_Item1
pgzdxueXxq1
HMACSHA512
Advapi32
kernel32
Microsoft.Win32
user32
ToUInt32
ReadInt32
ToInt32
yENcNSn9342
BNpQgHbbC62
Z03tfVEtB2
oGUzjD2
AY2CbI2
8nEP6uUthI2
SCmRzsIpR2
BAcvigl1U2
pZlk0W2
KeyValuePair`2
Dictionary`2
y0de89bYh2
get_Item2
Ec1wEn2
RwJJWt2
diont2
eywM7j8u2
rCKdxY60ow2
a4KOb23
gONYyG3
xwY9LxDL3
3GHAO3
eHkrCkdnS3
di0IpDX3
4TVxDZ3
Tuple`3
jNqCXSJa3
yLjA1g7ITe3
uIRXle3
GD5tGThSh3
2LuxKi6k3
get_Item3
mVXORzkNr3
PzRzEHeTe04
ZrXSL34
B7BbEgda54
WEt4ybIUr54
ToUInt64
ReadInt64
ToInt64
FXfjbpDTD4
2i3UsTPtM4
cHD2LoO4
xJHeWJKQ4
bQqQW4
k7aAdknd4
hWiZje4
dnbjYrYh4
4XTej4
qrdRx4
6G8hyVPa75
n5HrfqG8Q5
LsxSmm7m5
Po0LctGCQo5
uFoOgu5
7b7Mz5
SmVnMqe0516
ToUInt16
ReadInt16
ToInt16
J1qxPpUR46
HMACSHA256
AbU5A66
rwiQ86
wQGJE6
XCjtJ6
Tsw3IEO6
25oeQ9P6
gffJFkGJQ6
VcW6TP4DjU6
wV8AEA4V6
Mw5XDc6
outaje6
2DUVo24g6
Crm7U9p6
AjnHXy6
RZ3Nfy6
KBeE47
OPXTLLCJGC7
fFmWO1J7
VQUvAAJ7
VaultGetItem_WIN7
Qrwrw8FZ7
fF35Qd7
GBkN8pdvf7
E3NUjg7
jf9a5phEyp7
SUIZGJ1AJq7
O7r4A4Amy7
get_UTF8
XQWJPsuH8
Qoqg7c7OPK8
VaultGetItem_WIN8
bvWSWX2lO8
sb8PMd9Q8
7t99V8
1THQY8
BHmlMqTj8
lYqC6r8
3qoPu8
utdEWhVhQy8
Fsel4LR509
pdX3b19
ulpMsJuo39
wQOkO7DC9
wluAdeGbmM9
oLwTTN9
02RCmpNhP9
q7so6xe9
67SY9U2mf9
fmkbd8Tfth9
mGgOo9
o3lEvRp3q9
839J5UyBfw9
Y7k8jFz9
HNLnMwLz9
<Module>
dO3XDpBeDA
zrrwe9F5MGA
D0DbCOVSA
TVoOzUTA
XWAbX9i5kcA
kuFvagA
yC8u9I8vhA
ijzRc1jA
2okyCjA
Nn2NtilA
9mgQpQwA
JE6vf110B
q5iP9B
nJtVe9CB
TMUqBSIB
NraqNlUB
LHzaXWB
ZwhXgB
jGhmIVue2C
kb8q33XRk2C
DOIuyj3C
d1NK43B4C
Fn1jRFCC
yW0dig3v9KC
y3dD6U3mcC
O8hXiewcjoC
SpjWZhsC
RYSztlyC
WhC14D
b8zpN6D
qBK9gHD
get_ID
set_ID
fileHandleID
lpdwProcessID
processID
get_FormatID
set_FormatID
BPdJyAND
j5o3RD
QewQquRD
8uAyaD
XvJ0EvI1nD
BIjf5IwWTE
iz25OqjRXE
E4vmKkBYE
1Sp04wfE
Uo9lNLggE
H7H18ehE
FF6AtYjE
IcP0xWnE
TOyBdBF
O2NMxkTKF
BIgUgStPDRF
k5g5VF
FXIgRoo8ZF
3uDKkKhZF
EqJEeWxF
8gwoZBMVyF
GJuYoPwDE2G
MR4MKSyM6G
MOk9Ua8G
eP0V9G
2Prd2OGG
LwciE7f3tHG
kAU5sybKG
V7i8XpmQG
6zDIZHNRG
8kIoG7XbG
TqOScG
eb2kNml0o1H
Zs17Fnb802H
80unPV4H
W1I4qt1a4H
zVYiq4H
jD4Tgrp9y7H
Ka8Khge8H
5TRgMH
my1bOH
hXiY4JCnOH
90kXiRZH
sxeoZH
W1zMaiH
S0rV3RzmH
JSvOonH
IhlIXAtxunH
a8Ce6FrV8I
get_ASCII
VILQKI
4gUXyPI
i7wQWI
M34YHhI
3cKcqI
kXEzTrK0J
MKeE43J
eSWgD73J
ljUTjoQDJ
x8SVqFJ
YgyaQfwIJ
kNN366PJ
ikJDPJ
MErhBKWJ
jcI9dcJ
lsV12XofJ
8wC9FeYFthJ
qEEZnJ
saTqGaEGTzJ
vPlC4K
LIPgCb8K
U7u19K
OS3uCK
3Rk4KDK
GgPZHGK
A5uazjIK
6rrP3djRK
eyYHEUK
iFRMxdK
L2m57V2nK
SU8I0cyyK
eTXk2L
F2e1qHgS4L
vMqhwa9L
z82GxJL
GEG8JBsdUL
3Z7AXDXXL
JDkHKLbXL
1XuoTq8J7aL
61vndL
BOSnZWuL
RoXO3M
AOlXFWqZ5M
K6BU18M
wYRlpJTIGM
2NDQaMM
FnhpUeNM
W0lFgOLMAOM
RcPNsCqbQM
HcKVh5PseM
qrpPgM
kBtySmKEEjM
9IKknjM
79Z9RxxdvsM
CGN8vM
TfM3iYLxM
hw42u3M1tzM
DJTojM5N
zQjP5CIa07N
8pm0StIKN
DloFo2MN
pJp67EdgJSN
5dn0enTN
VnRoJvUzTN
gSzr80SnVN
QAmRvRM6dN
dl3svBOCLhN
rt1PjN
715k0BpN
z2pg1qN
21IMIsN
yqlTVs3ZBO
System.IO
DdVLVz4pMO
vjTBnajcOO
wP28kO
UAoUlO
EAJtOrO
Ri6Mif4UK0P
aNIw2P
qbwrZfZ4P
GZ3isn6P
HW7m5BP
jpRuLVzuEP
HBKnIP
sv2uLgpYP
b4ragwfP
GcxLzgP
uN75hP
2SuzMSarP
1mwOIL7tP
cuooJmO2NQ
CwEu30OdQ
LrSHhQ
QyVmrbglQ
PmCVvcEpQ
gVzTrQ
tcMy1zuQ
rCYn4vQ
7hPU35R
ElZfXJR
6qxRNR
uz8q8txOR
wXu0n9ilQR
DlPirKV0uTR
kLS1HTR5oWR
RtoY2faR
R3nrRcspMbR
adTnFwwfR
aB3T9fmhR
99K2dRxR
rw4eTQW63S
7ucor7xRS
5LD4hZbikWS
jAO8YnFHXS
zUPqHZS
SVkzbS
C5A1EdS
ZOJziS
Kg1ZIaTpMjS
OAC3kS
U7BH7sSqFrS
uw4guS
LDZyET
VfumkHfFT
lQelb1HT
P9gPtaUZoHT
ghAPIT
IGjSgY4UzMT
hsnKtDPT
8f7Dm8RPT
Oqb65yRswPT
fERxzM7HaRT
K0Ex8dnZiT
kz23qT
6x03f1U
HIsA9U
T620aonXAU
4qXY3uEU
b6HN5FU
Wfkh1zWTU
2C7xCCmXU
mEXQJsbU
R1v3tTdU
WrFnURbXmU
7K9dUqAiqU
90o5rU
xPPqJatU
nFtGiS1CzU
Ih7zsdPvizU
gU9DJm4V
yCLP7V
get_IV
set_IV
3Jd7c2R2qLV
aP6AwaFQoV
0RmGQdxV
3yUZba8W
FeNWwpOKCW
9W7aJW
JMSjenFIKTW
uv1zJpDfTW
kwQagHeJpeW
1XDafW
u7645MhiW
euvG3TmwW
MlG2G8NSjxW
F2O8mMWYh4X
wctdXq8X
Vqqwmi9X
EYR0UHaLX
jA21NX
eQYanbX
wL98zJiX
zNFiBP3nljX
DeQ4vmqesX
vuygvftX
PaUgRFw47Y
M77qdVY
1Ji9aY
BDQRcY
zrdAeY
kWeLwPwY
SVejyY
o2RUb7N2Z
k97OWWGZ
62jjEIZ
rac6EVZ
PVdSU6he2fZ
UktkA0MAHfZ
dgwqAlZ
P977JnlLmZ
DK1nNwxHpZ
rkwqsr1yZ
VFv7rsxD7a
2Nli0jIa
dSb6Ja
OO6ytWHCRa
Em0rPr1Ta
Tb3hGVLTa
y4sahTe5aYa
kBBDvqYna
MhSw7sa
get_Data
set_Data
ProtectedData
PropertyData
TK3sJvb1b
TlaKJHhyn1b
huaHakS8Db
OsFOaNb
UZo6bTNOb
tTlDeb
2bX01Rehb
Kdfzhb
mscorlib
nAt2kqcqb
TUVxi7goqb
CIK59GGPub
zKaVyb
hGaHyDCjK0c
xHeKgi2c
V89zmrqY8c
I5EcHcVAc
9aTYFc
FPRzYCwdLc
LWV7vBcdc
31d01816-f932-4378-95c2-38149ac222ec
System.Collections.Generic
Microsoft.VisualBasic
WndProc
HookProc
FromFileTimeUtc
y9gF9zc
o7357d
AfgRCSjBd
get_Id
schemaId
pszAlgId
GetWindowThreadProcessId
processId
qPlcTJixROd
xIGplgguKSd
Z0VvCZTd
OpenRead
gdKOed
lpcbNeeded
SHA1Managed
RijndaelManaged
add_Changed
remove_Changed
get_LastModified
set_LastModified
_lastModified
Interlocked
set_Enabled
get_IsEnabled
set_IsEnabled
_enabled
lpOverlapped
samDesired
add_Elapsed
get_LastAccessed
set_LastAccessed
_lastAccessed
get_Reserved
reserved
pPackageSid
get_IsInvalid
get_Guid
vaultGuid
a2CQld
<ID>k__BackingField
<FormatID>k__BackingField
<Data>k__BackingField
<LastModified>k__BackingField
<IsEnabled>k__BackingField
<LastAccessed>k__BackingField
<Password>k__BackingField
<password>k__BackingField
<PropertyStorage>k__BackingField
<Name>k__BackingField
<FileName>k__BackingField
<ApplicationName>k__BackingField
<Username>k__BackingField
<username>k__BackingField
<Type>k__BackingField
<type>k__BackingField
<TypedPropertyValue>k__BackingField
<Size>k__BackingField
<IsRunning>k__BackingField
<Path>k__BackingField
<hostmask>k__BackingField
<Version>k__BackingField
<Application>k__BackingField
<Description>k__BackingField
<user>k__BackingField
<hoster>k__BackingField
<Tasks>k__BackingField
<objects>k__BackingField
<Accounts>k__BackingField
<Keys>k__BackingField
<Lenght>k__BackingField
<Host>k__BackingField
<GuidMasterKey>k__BackingField
GetField
y02TRmd
6rWbmd
j9lpmd
TrimEnd
ReadToEnd
LBUCSnd
Append
get_Millisecond
GetUpperBound
GetLowerBound
set_Method
method
aTMOpd
XDuVnFspd
Clipboard
get_Password
set_Password
get_password
set_password
lORyqvd
GORjuzd
OetGBNk84e
3qxSF4e
a9LLIMM7mBe
L7bAe2yOdEe
vDLCTTwk9Je
2q4nNe
Jp53ceG5VRe
Replace
QueryDosDevice
hInstance
IdentityReference
wScanCode
keyCode
set_Mode
FileMode
ShareMode
PaddingMode
CryptoStreamMode
CipherMode
SelectSingleNode
XmlNode
get_Unicode
get_BigEndianUnicode
IsTextUnicode
HJlMRNZ2Gee
FromImage
get_PropertyStorage
set_PropertyStorage
SerializedPropertyStorage
SendMessage
MailMessage
AddRange
CompareExchange
CredentialCache
PIBiacVke
EndInvoke
BeginInvoke
GetEnvironmentVariable
SetEnvironmentVariable
IEnumerable
IDisposable
ToDouble
get_Handle
RuntimeFieldHandle
hSourceHandle
SafeHandle
GetModuleHandle
RuntimeTypeHandle
ReleaseHandle
CloseHandle
DuplicateHandle
CreateHandle
GetTypeFromHandle
hSourceProcessHandle
hTargetProcessHandle
lpTargetHandle
bInheritHandle
vaultHandle
handle
Rectangle
ToSingle
CreateFile
hTemplateFile
DeleteFile
WriteFile
MoveFile
MapViewOfFile
UnmapViewOfFile
lphModule
get_MainModule
ProcessModule
get_Name
set_Name
lpDeviceName
get_FileName
set_FileName
GetModuleFileName
lpExistingFileName
lpFileName
GetFileName
lpNewFileName
_fileName
get_ModuleName
lpModuleName
lpBaseName
baseName
lpValueName
rootPathName
get_OSFullName
get_FullName
get_ApplicationName
set_ApplicationName
lpName
lpAppName
get_UserName
get_ComputerName
get_ProcessName
processName
GetProcessesByName
lpKeyName
GetDirectoryName
filename
get_Username
set_Username
get_username
set_username
System.Net.Mime
DateTime
GetLastAccessTime
fompqmUxDne
AppendLine
get_NewLine
Combine
LocalMachine
Escape
Unescape
BzVhpe
DataProtectionScope
get_Type
set_Type
set_MediaType
pszBlobType
GetFileType
ValueType
SecurityProtocolType
GetType
ContentType
get_type
set_type
FileShare
Compare
System.Core
PtrToStructure
get_InvariantCulture
Capture
HttpWebResponse
GetResponse
Dispose
Reverse
X509Certificate
Create
MulticastDelegate
GetKeyboardState
lpKeyState
GetKeyState
Delete
nNumberOfBytesToWrite
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
SecuritySafeCriticalAttribute
ExtensionAttribute
AssemblyFileVersionAttribute
FlagsAttribute
CompilationRelaxationsAttribute
ReliabilityContractAttribute
ParamArrayAttribute
RuntimeCompatibilityAttribute
SuppressUnmanagedCodeSecurityAttribute
set_UseShellExecute
ReadByte
ToByte
MLjSBue
get_Value
TryGetValue
SetValue
get_TypedPropertyValue
set_TypedPropertyValue
GetPropertyValue
set_KeepAlive
Remove
TOteo6uxe
get_Size
set_Size
dataSize
get_StorageSize
lpFileSize
get_NameSize
volumeNameSize
nFileSystemNameSize
get_StoreSize
get_ValueSize
get_HashSize
set_BlockSize
chunkSize
get_KeySize
Serialize
Deserialize
Initialize
Finalize
Resize
C8AtCn5nE2f
nTW15iNs5f
lSwDlU7f
elOLEucr3Cf
2338Jf
jNy88wJf
SizeOf
get_ItemOf
LastIndexOf
ivpapPf
Fw50fjaf
gTXEDzsdf
cchBuff
gSg0gf
SvC7nf
8BZ1fBg
2EYOGg
nGNsiwXVg
lhe7vDNkWWg
nBe7Jm3Xdg
get_Jpeg
Fypakg
E93PvCng
System.Threading
get_Padding
set_Padding
UTF8Encoding
System.Drawing.Imaging
get_IsRunning
set_IsRunning
CreateFileMapping
FromBase64String
ToBase64String
EscapeDataString
UnescapeDataString
lpReturnedString
GetPrivateProfileString
ToString
GetString
Substring
System.Drawing
oU2Rog
get_Msg
9fSmYPJUsvg
BSsVmGnxg
KHJJyg
VuDqr1h
NYG1LU2LIHh
YP4hiJBBkMh
kq2CRh
BntzTqlTh
jlKU7Al8RUh
6mLtdh
dwMaximumSizeHigh
dwFileOffsetHigh
VGTz9Q4qh
ComputeHash
get_Path
set_Path
get_ExecutablePath
GetFullPath
GetTempPath
GetFolderPath
lpTargetPath
get_Width
get_Length
SystemInformationLength
ObjectInformationLength
set_MaxJsonLength
ReturnLength
maximumComponentLength
GetWindowTextLength
EndsWith
StartsWith
jZ0i29a0i
2fYFr5i
3mk9YAi
u7Lf3Fi
FiIi8WFi
FdJYOAyifGi
hcFN7OSjhLi
qmiSmMegi
rCpCwgi
Kr4pjhdTyji
PtrToStringUni
StringToHGlobalUni
UpWNVP5FJqi
c3ki0Fe5nti
ZAU0d3xi
fRbtiyi
dsD6Xp5j
kukwA9j
ghML1Bj
PJwWpeJGj
2vvxJbLJj
Uuqj1wRKj
xSyvrQj
IG3C38Xkcj
44E8ej
PLDA7ij
PFvTMI6pj
0dq85nRALtj
rsxU1k
h2QK9QL2k
L8zi3k
bITUj5k
ICyrgaf4o6k
zr5WrvwXk
AsyncCallback
RemoteCertificateValidationCallback
get_ServerCertificateValidationCallback
set_ServerCertificateValidationCallback
callback
get_CapsLock
TransformFinalBlock
TransformBlock
USpmkk
idHook
get_hostmask
set_hostmask
NWQ2TFc7l
fz7X8Nl
AllocHGlobal
FreeHGlobal
Marshal
NetworkCredential
Decimal
System.Security.Principal
set_Interval
Rijndael
System.Collections.ObjectModel
System.ComponentModel
System.Net.Mail
Kernel32.dll
kernel32.dll
User32.dll
user32.dll
vaultcli.dll
psapi.dll
ntdll.dll
bcrypt.dll
System.Xml
set_IsBodyHtml
set_SecurityProtocol
Control
Ch5npl
set_EnableSsl
hoKbog0cvtl
i66qBCzl
BnUvtw0m
CdTwIwQz0m
6TzmV5zcKBm
mnKoXlwHm
z45g1yMm
HB8iuNm
5xWARazYQm
bAOybRam
FileStream
get_BaseStream
GetResponseStream
CryptoStream
MemoryStream
get_LParam
get_WParam
get_Param
lParam
wParam
get_Item
set_Item
VaultGetItem
vaultItem
OperatingSystem
SymmetricAlgorithm
phAlgorithm
KeyedHashAlgorithm
algorithm
9Uc6g79im
Random
ICryptoTransform
uFT9VIM7sm
uXVZ5n
1zZWAn
tOcpGn
S3Yr5dOooKn
if7izNRn
HxkOtaUn
zxmhWn
ToBoolean
IsLittleEndian
0a3K7bn
CopyFromScreen
get_PrimaryScreen
lpNumberOfBytesWritten
X509Chain
ChangeClipboardChain
get_OSVersion
get_Version
set_Version
get_Application
set_Application
get_Location
GetVolumeInformation
NtQuerySystemInformation
ObjectInformation
pszImplementation
System.Globalization
System.Web.Script.Serialization
System.Reflection
PropertyDataCollection
ValueCollection
MatchCollection
GroupCollection
ManagementObjectCollection
AttachmentCollection
KeyCollection
set_Position
CreationDisposition
get_ContentDisposition
SearchOption
Win32Exception
CryptographicException
ArgumentOutOfRangeException
ArgumentException
get_Description
set_Description
get_StatusDescription
_description
System.Runtime.ConstrainedExecution
StringComparison
Intern
aAktH0un
add_KeyDown
remove_KeyDown
get_CtrlKeyDown
get_ShiftKeyDown
get_AltKeyDown
CompareTo
CopyTo
Ooblfjco
oTXTyLa3Aeo
ImageCodecInfo
FieldInfo
FileInfo
CultureInfo
pPaddingInfo
FileSystemInfo
MemberInfo
ComputerInfo
get_StartInfo
ProcessStartInfo
GetLastInputInfo
DirectoryInfo
kNV89lo
Dbe7x5Rxqo
XTWTTw7oPso
uCpBcZdzo
FTyUx8Sp1p
HOJqXX3p
G5YccZQS4p
AjFYGj7p
BkvVs8p
kjWCSASNp
iwCdqgmNp
add_KeyUp
remove_KeyUp
dwNumberOfBytesToMap
Bitmap
tTwD8jp
arN3mlzlp
kxIHLu7qpp
Lykg7m9tp
htk5Tx9tBxp
yPjL79SOAq
ZAOCreckEq
SqyyXFq
HhCQUTNq
ecrjUq
CsAsIrUq
Jo59KqWq
fSoVMw9hq
CVC9FCS4Inq
System.Linq
fxwR7r
zrLQliLr
IpL7cNr
yfONu6Pr
fLonpf7FPPr
W8xzlSr
taasjTr
ToChar
lpChar
DirectorySeparatorChar
cysJgFD5pdr
volumeSerialNumber
StreamReader
TextReader
BinaryReader
SHA1CryptoServiceProvider
MD5CryptoServiceProvider
RNGCryptoServiceProvider
TripleDESCryptoServiceProvider
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
IFormatProvider
StringBuilder
SpecialFolder
sender
Encoder
volumeNameBuffer
fileSystemNameBuffer
buffer
ServicePointManager
ManagementObjectSearcher
SecurityIdentifier
ElapsedEventHandler
ToUpper
CurrentUser
get_user
set_user
EncoderParameter
BitConverter
get_hoster
set_hoster
BinaryFormatter
SetClipboardViewer
ToLower
JavaScriptSerializer
xEbihr
i7Qj2jr
7yfJlr
0n26d1or
get_Major
get_Minor
GetLastWin32Error
GetLastError
IEnumerator
ManagementObjectEnumerator
GetEnumerator
RandomNumberGenerator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
kmJBEc3Khrr
QcTwhnn3sr
passwordVaultPtr
ReadIntPtr
LL3au0s
qtRSct1s
q0EWcDs
Graphics
System.Diagnostics
Xw4gNLXXGds
get_Bounds
Microsoft.VisualBasic.Devices
System.Runtime.InteropServices
System.Runtime.CompilerServices
GetInstances
get_ChildNodes
QYcWhes
Matches
GetDirectories
get_Properties
ExpandEnvironmentVariables
GetFiles
EnumProcessModules
NumberStyles
GetSubKeyNames
ReadAllLines
GetProcesses
System.Security.Cryptography.X509Certificates
get_Attributes
set_Attributes
FlagsAndAttributes
FileAttributes
lpFileMappingAttributes
SetAttributes
SecurityAttributes
Rfc2898DeriveBytes
ReadAllBytes
GetBytes
get_Values
GetLogicalDrives
fileSystemFlags
dwFlags
ElapsedEventArgs
get_Tasks
set_Tasks
ICredentials
set_Credentials
get_DefaultCredentials
set_UseDefaultCredentials
Equals
CreateParams
VaultEnumerateItems
System.Windows.Forms
Contains
System.Web.Extensions
System.Text.RegularExpressions
iterations
System.Collections
set_MaximumAutomaticRedirections
StringSplitOptions
RegexOptions
options
get_Groups
get_Chars
GetImageEncoders
System.Timers
RuntimeHelpers
EncoderParameters
SslPolicyErrors
5fQPQRss
SystemInformationClass
ObjectInformationClass
ManagementClass
dwDesiredAccess
FileAccess
processAccess
get_Success
hProcess
OpenProcess
GetCurrentProcess
lpBaseAddress
MailAddress
get_objects
set_objects
VaultEnumerateVaults
get_Attachments
set_Arguments
get_Accounts
set_Accounts
get_Exists
V8Li46vs
get_Keys
set_Keys
get_ModifierKeys
8onBscs3t
fhDr7t
WmEnDFSCt
nyPElLt
fVolE7Ut
Sw45KQKWt
Concat
AppendFormat
ImageFormat
Subtract
ManagementBaseObject
hFileMappingObject
hObject
ManagementObject
cbKeyObject
pbKeyObject
NtQueryObject
object
set_Subject
Collect
set_AllowAutoRedirect
flProtect
Unprotect
System.Net
offset
get_Height
get_Lenght
set_Lenght
nVpQ74Oit
op_Explicit
WaitForExit
Jk2bXlt
cbSalt
VaultOpenVault
get_Default
lpDefault
pcbResult
IAsyncResult
phkResult
result
Ygz5rklmt
ULT5Rnt
set_UserAgent
SmtpClient
System.Management
pResourceElement
XmlElement
pIdentityElement
Attachment
Environment
XmlDocument
get_Parent
GetParent
get_Current
get_Count
get_HandleCount
get_TickCount
vaultItemCount
set_IterationCount
vaultCount
CSFi2Nu4upt
BCryptDecrypt
BCryptEncrypt
FZdvKrt
TrimStart
Convert
set_Port
HttpWebRequest
XmlNodeList
ToList
get_Host
set_Host
ICredentialsByHost
SdO5CxIM1tt
LyvgM9ut
set_Timeout
GetKeyboardLayout
dwLayout
cbInput
pbInput
cbOutput
pbOutput
get_StandardOutput
set_RedirectStandardOutput
MoveNext
System.Text
ReadAllText
AppendAllText
get_InnerText
GetText
GetWindowText
JhrqC0u
YRhReS6dAFu
JWHQ6x4qQu
sXPwqfSu
w01nNQTu
FIIrnu
JViBZ3uu
CK9dRwu
EZZQuTSoEyu
5bcl4rf5v
XsH1pBTEv
hWlaEmq9CIv
myqoJ8WRyav
GbkFw3kObv
BkeTUnZt7sv
kmdmaGuv
6s8QqJC4w
baxyqDGkzBw
PKRtFw
Lwas6NWiNw
s6Zuc7dDAew
vPWhApVfw
AAFZjw
dwMaximumSizeLow
dwFileOffsetLow
get_Now
GetForegroundWindow
NativeWindow
set_CreateNoWindow
DXM4hmECrw
XB2glaTHXtw
cPiQFUX80xw
SnZeC5x
FH3SAx
lNM34GCx
WqbEDx
ToUnicodeEx
GetModuleFileNameEx
RegQueryValueEx
GetFileSizeEx
UnhookWindowsHookEx
SetWindowsHookEx
CallNextHookEx
RegOpenKeyEx
TGTVCiIx
DZvsNx
4Pel6uPx
ucchMax
mYZChx
9l5lxsmICkx
KKbp8Dtyx
cy30USVjzx
vop62BCy
wyKNmLWFy
UV2cJy
CuLak4HQy
WXqT45QkQy
zDmZB5OSy
V5r5vAYkUy
Sqt0E4qXy
ToByteArray
InitializeArray
ToArray
ToCharArray
xr9KQcy
Consistency
set_Body
get_Key
set_Key
OpenSubKey
subKey
RegCloseKey
get_GuidMasterKey
set_GuidMasterKey
_guidMasterKey
ContainsKey
wVirtKey
hImportKey
BCryptImportKey
BCryptDestroyKey
RegistryKey
P2GSOaC4gy
System.Security.Cryptography
GetExecutingAssembly
Multiply
4VU6BQrny
HIG8MUJHjoy
BlockCopy
System.Runtime.Serialization.Formatters.Binary
get_TotalPhysicalMemory
CreateDirectory
Registry
get_Capacity
Quality
op_Equality
op_Inequality
System.Security
System.Net.Security
IsNullOrEmpty
BCryptSetAlgorithmProperty
BCryptGetProperty
BCryptSetProperty
pszProperty
hIywnKMJ2z
MXqg3z
Tu9LFHjK5z
pWAYZz8Dz
w678Ez
5MIY3Fz
SQerRRiSFz
TkifoJz
eE8GURz
ZoJfRC6Baz
V2qleVJgz
Hhbmmi4iz
LGxY81qz
3qnb0vAGBtz
vOIXTUuz
XUAnUnguz
WrapNonExceptionThrows
1.0.0.0
$421c88a3-7168-404f-b239-5bdc8c078b7d
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
pp p!p"p#p$p%p&p'p(p)p*p+p,p-p.p/p0p1p2p3p4p5p6p7p8p9p:p;p<p=p>p?p@pApDpEpFpGpHpKpfy|y
k#n+n9
45 6!7"8#9$:%;&<'=(>)?*@+A,B-C0D4E5F6G7H8I9K:N;O=QATD]FcJuPvTwVxYy]z`
BACAIHJHQPVUWUXU\[cbedfdgdhdidjdml
Accounts
logins
sha512
credential
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
31d01816-f932-4378-95c2-38149ac222ec.exe
LegalCopyright
OriginalFilename
31d01816-f932-4378-95c2-38149ac222ec.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.Common.8B1344E1
Lionic Trojan.Win32.Stealer.12!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.MSIL.Basic.8.Gen
ClamAV Win.Packed.Generic-10003641-0
CMC Clean
CAT-QuickHeal Clean
McAfee Artemis!5B3C222B7554
Malwarebytes Spyware.AgentTesla.Generic
Zillya Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Spyware ( 0059d6731 )
BitDefender Trojan.MSIL.Basic.8.Gen
K7GW Spyware ( 0059d6731 )
Cybereason malicious.9fa129
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.A
Cyren W32/MSIL_Kryptik.JRO.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Spy.AgentTesla.F
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.MSIL.Stealer.gen
Alibaba TrojanPSW:MSIL/Stealer.8b6b42d3
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Agent.244224.CV
Rising Spyware.AgentTesla!8.10E35 (CLOUD)
TACHYON Clean
Sophos Troj/Tesla-CNT
F-Secure Trojan.TR/Spy.Gen8
DrWeb BackDoor.SpyBotNET.62
VIPRE Trojan.MSIL.Basic.8.Gen
TrendMicro TrojanSpy.Win32.NEGASTEAL.YXDIZZ
McAfee-GW-Edition BehavesLike.Win32.Generic.dm
Trapmine suspicious.low.ml.score
FireEye Generic.mg.5b3c222b7554df5d
Emsisoft Trojan.MSIL.Basic.8.Gen (B)
Ikarus Win32.Outbreak
GData Trojan.MSIL.Basic.8.Gen
Jiangmin Clean
Webroot W32.Trojan.MSIL.Basic.8
Avira TR/Spy.Gen8
Antiy-AVL Trojan[Spy]/MSIL.AgentTesla
Kingsoft malware.kb.c.996
Gridinsoft Trojan.Win32.Agent.sa
Xcitium Clean
Arcabit Trojan.MSIL.Basic.8.Gen
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealer.gen
Microsoft Trojan:MSIL/AgentTesla.ASDH!MTB
Google Detected
AhnLab-V3 Malware/Win.Generic.C5459834
Acronis Clean
VBA32 Clean
ALYac Trojan.MSIL.Basic.8.Gen
MAX malware (ai score=89)
DeepInstinct MALICIOUS
Cylance unsafe
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.NEGASTEAL.YXDIZZ
Tencent Malware.Win32.Gencirc.13f07685
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
Fortinet MSIL/Agent.F!tr.spy
BitDefenderTheta Gen:NN.ZemsilF.36722.om0@ayhatop
AVG Win32:PWSX-gen [Trj]
Avast Win32:PWSX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.