Static | ZeroBOX

PE Compile Time

2024-03-28 20:29:44

PDB Path

c:\ew2maqa3\obj\Release\Friendly.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0004c614 0x0004c800 7.98636046757
.rsrc 0x00050000 0x00000548 0x00000600 3.93556865067
.reloc 0x00052000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000500a0 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00050358 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
p{{.J{{{{{{@
o{{{{{{{{{{{{{{{{{{{{{{{{{{
UKU*K*L$7)
{.J{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{
{{**{{
{{KKLKLKLKLLKLLLKLKLKLKKLKLLKLKLKLK{
1{1{1o1{1{1{1{
|{{1o3{k{{1o1{
7|{{1{1o
|{{1;3{K{{
;CZ9+
~I!8li
)Pugk:
jI/fw#
z2<|4[
S}f_DN
F}8.;q
Pb%+.w
S%Y= P
ah6snEU
,f7DA&#
&{s7kS
6o8o{/r
GZDd;mX
*tAfM@
n\(:D9
)K}q<74
sLn_IA
r@fzL`
{R-XQ\
8]tp|vt
aAhG'I
Y=.y9d|
~ZHtj
(ld/H[sY
;kGT>|
e)RYYS
VmLy<?
^V?xuE
$zM>{&o}
f/WSY
k1!{))U
x%-!.J
:YS;!1
L}:H?
#oE p
t"or`A
7dR{Li[F
zc9O-x
wQ&R{z
)gp;?u
)<aJE^
Fm+tt#p
'm<)h>
+0dc^4
GLSkH0
$3D*iO
8\z?t~
P<_Lr
b3N/ln
%Zy.,g
/r>#MX
gzb$+~
=ub%$
!629}["*U
4U|Xj)
KCJL4j
lMqb0\
,v=_ k
3P&X6
$+DLu~
_/&K @
gp_) 0
')#V(CV
viG`~9
V04sQo
rwo;3H
L6WZpS/
Pw)rJ2\U
h!"_y5Se
)t$82/
=F6-.h
B*n#8Mq
z7R`3OA@
M1pDO>
POo}-`e
5bm_JV
E^>99CQl
k2P&@B
6rK?Rww/
8Mce4pEMG
]b|ys\)
q1<RH+
-1pZ v2
ec\ULI@}
=H41.
cOh2\]t
(,G+<
)z;KPB
Z/wu#Y
ozva8 V
*j`^Oz
]]"R>):
l_0 n},
zpK9'R
j H(VJ
K`k`d3
(,6K,<
Ne%&IC
Mc[F3c
.X{bKA
0R7xK7t
)(w,+fZ
#<*_%H
BXL`>@
Y%YIr0j
D2$WH>
7?p;Ik^h0i1
Vf#1m'
J|.S50Y
>2,N:;
~@o:9{H
GjaWC7D
GF;L@-
~ r.:>
KXo-58
;xbV-N
?Tol<P
>.p-:Cr
~"yAZ1
d$Ev.SX;z
,9Xc$6
9B}XOW
'_hT4
}stRZ+(
Ahpx=(
-vTGV{
[[~{ZC:l
iT>EK-.
5KbfP!
@/+"&R
`W|BWj>
hU5`vW1
}DJ/um
K+yAC|y
|Kp+|
FIpS3d
.Fj:hEL
"8xfw<
OrS"Zr
J!20?f
,:lr**
d0^=GMNR
1\N6HR
qQ#[9\u
>53S.}8
:J.=Na
_61$R+
<!{gLF
__|'v]
78j&T7
+n(*sH6
Us\!Jp
y<`5u]D
`s6 mW
8_OK#w\
0B8 '6
T_d(d~
h Ow$
8u2xeI
0<_;[Z
xTYN9nP
n@*[YCF
e&:a2&Y
~lGvn'
i\ywQo
\D)N+h
=kO{5v
8!:d*6_hd9
5Q]MVA
d:.5]E
oKW3QZ
(PTPpB
I/+|9pb
$-iP+O
TR{Sl'D
>>(yjc
EJ?q+#lG
Ac&|M`
BKqk=>
N8Q?gv:
<:%!1~
;uf|Iy
dZ%BvCdf
VY~s&,
b,Y+&?
Q\xo0|
&12U3)
}vvJH=N
R8IxG=
"~x(#v
AS5Ee9~ch
lr1Qfai
q`T#nC
"7)&/oI
4:ESH(8
*i9]NAr
%Av#0W
=bj#eK
/\[$Q*
+MAN>U
M^h@QG
W$c484W
X9a_[v
xc+tyV
bv%Dth
$zGvaZ
h,pDLG
zmgr4vB
U/@Qv|io
#HyfY;
*[CBR]
.2Z)Z1
Yi(IX]
Ir{-nS
C~He;q
C!`BtS^Pz
MXjl^H
kwpsM1
iei<^*
oI|9>p
awv(U"
#g0<YD
YMBFY*qZ$.
j1Hh_\
T!3^9B
Z`f6!x
dq'18L
AaQ|cn
YlMO,3
>iDNzp
?vA$0y
*X]WYlO
}4rr_I
@D zqD
OGa j.
b'mN
ZkVojrH
Cl$R;l
Q{mU!
K9*HHfRl
9`^g>t@
}<^~[)0
[(EqkS
pb#}d"
uf2fde##
fJlkjr
r,U^6NJ
f1O)<l
mfQ*hu
GtNH*m
[#=u4z
AJC$lNl
rjs_0A
|(8kO1
mw2nX[
yWk{Fz
?D*+rV
bRLo[J
(c0maLy
P;XNVL(m
c\3j(Yt~
_`,d=^E
wls~qU
,7c+!Y
MI"MJ,
e7}b
GnDy@Q&
Ngs)L>
L^8a=uB
ZK"}&[
oeV36N
$#T>5C#
GSUuH}v
h-Rpz:
zxL=gE
4}ORl_u
B4RX<Z
vtvlVv
dX>/5a
KAM%1mQ
/^&oLPhSv
9p8@Tg7
@a]xz5
I"ZO2{
.k9f^$.
Xa'DTK
ZYh}a&
KUdQg5j
7n 6zG\
`2aPJ;6
a.Z Te4
hp_M6$
NIn2+,
/LN{A<
#$}Iei~MH
=^-6vR
}Zv+Z5sj
,R eje9
RpT8t=@1
k!b4sI
Xyjzg*
eNoMSet
w3`{xl*
j.c|51I
VEA,IXQQ
"oU{_!
5{$i96
w39]E^1
"7#-K,
&~g|o`&
y.,pW
}5NGW+
Da+rvRwZ
dscgF@
|vV^f4
b5nVf *
y^/6/?<#vz
l!c(0ySU
PC,2~eR
cDSS.4
#z9qjcKW
'ZY[}?W
ZMxl:[
ZWQISE
}`Ur9
9i]z{&
Yovs'r
FR7dJ9
"@z^~O
XfnVU`.
:IbD;,
J0v\9!/
j%7T'Y
)+?_i)
D_$Aq}
;2!b&fS!F
70Z~TO
/GZ?~=
*vDr'<
w(9dyk5
|r"ajY
V@5fF}\
n\@f9+Ox
Qjb)52
skEkFy}
q:vWX1w
j&!sxd
aI9%d^kg
F!j+<"
v\3bxZ
>1=hdf
&^pY[7M;
wjcK-C_y"
rZwv7s
+zJo*P#
~|5Z;}
2v\aaIp}i
74'VhWB`
de[b[w
Zn6~]Jl9
:$915
|D(nYc
Dr$[esk
4olxS
4^]:/4
*+m}d.
id&[!P'2I
XND~nk
&#<mZ_\
BZ?J<
Or*.\j
Y6Q#PJ
<7(KWvd
)\6C&-f
~^luBL8
!jE1Gaq
>!E@zLP
H@x!oL99
fHf15&"*
c7fa$~k
I)<aI
Ww/Poh
m=A9G{
Pk|,^(
47~KdQp
;|$xp"
f99g1y
P3ndL8y6
7+)gU9~
PkRYZs
>\f3%}
AJB@31L
wTutG*
71Y-.{q
'("*(_
;"YFU0,r
j+S".A
NI'UZlu
|-=PT
5:%A/
>=16#l
VtF!.E
{1sB:&_
cEZC^0
9@=5G<
qASxr_
3s!bp|
Rh&#/]_1
6z`vsj
[kb8QE
=/ce$9
FSNT^8
6fQ-q0w=
:HW\K
)CYY6`
II6(A:
CL,~U./{
$sN<lt2
<qI%ts
Nlz|e
V{Uw8_
iL,G\}
"yG*W9$I{-^
}T O82
*=7]5D
-]o?^M
K%,MMe
(V1'A
E&U&q^
kJcm!{>
DeYIu
vxNBStA
"*!9f;
`%$;g$a
#3$^5-
<dGRk"
(.|<=:
E|"8
cuP gI
3*'<v_`
HGqfp2
l!oUFy
WT"QA
en^a4,p
@Q8pX&
&'!gsc
97B\,!
A!]YRk
DOn#4n
nDGX.$
\Ny1?D7
VU,eX{?
A0~sYl
yPVG}R
MJ;<o1
.xy/_j
o|/++E
V6 F1G_
A5h3dj
F<z`c>
e#7VF<C
<OQn+^
V:[h1$8*
*Yz'iG
-sw,}_
2weeVI
"7hL]:
*KA:W
g1 }$?
y=' "{
~.*>'B
biV>$"
lsTdD|
%XYI
dihjvPy
Oaq\T<
4\ZTi1
#\`2c%X
VMVK>%
OduM. aK98X
&}cyOTyJ
8eV,+W
w_2m'@
,rmSAp
Ew}f7@
xJ`(TN
8"JENJY
.qjKeJLJ
C!ML_T
8X~vvr
C"#jv4
C;d;YU
zpoN4Z
B``:Y5
]ZSHv~X
2H&pGApg
=l,(S#
ch*!#%FV
R R+">Y
[_'G<v;
c2JCh0x
?Ldas[
.c&^~2
[i/f_I
}s0mt4
%]8i^ZO
m(EUZ'
Abx{q
D%2GE
Eh<`|-[X
jfAXwu-
v4.0.30319
#Strings
<Module>
Friendly.exe
KtzxiuAsYTtuASYlKMOKYesttJARXxBsLBtEZRqaRvbbvovERMZDnlIgBGDZtiUaSBjzYTLtVotdCRxFOwALYxFZsNCT
MSG_NET
gvyUCRJDmjsZubgYjBaRvTp
BDuYAygbBZGIucrnDWaDUfFFiEEslusdKSqeeKDWKCNWAyHUPALdyKYVyoqwuopHhdxbmNItTEtRSiFkxjcliOfAuUgqTHcW
RNvrhJLUJtKGmryBDdkvAlUgKbmWPOvpQOheRcVweo
hRKPfunOmQWIIQNNfXEQoqhlrshIakAUfAAiNsmpIMJaScEDXOFkYcqqjYYnMe
OCMeYnEgEwQtRzmslPsUIwIzoYRMafBjTuOQgZIcRvoleenbJjwdKan
hpzGKJASQpewxZdWTyzvZtWwIiUcjpzK
jsaRUnblvjfzgfRNlOqgfkbtRMsVEcDwJqNS
kZzuPUJgHQDohvZkarjUUwWmbGXdaTHGd
CpnwhdYnjiBkROtrvTpOInmCWOpDZRJDopZEhepPmDDFDuRsizqwlscPDlaTnUNSZxvcooKQeabEkhycwwUabMSwMKAvDW
EHmKCOXnAbvhjdXPkUzJwumhBRBjjMYcydUUNABXsHlRdGAFXuzGYgwJVEJlNoDnCSjGICBjTcQpIUEvRvL
ZJHTQnhZhAifgNFdmkqKYtbDZJYdSxywNEVRZLyFbQidzZEOKWZtisvfhEtGPDGkClRbr
ObLKBMxmrcjnfZOuRvvGcDZKZuJZkHXVxbiOymViXiKpDjASjNEelBzLCBlHDYCkEOqDqAweZMittjGqtqqXCtjvbXMxBOfzg
jGSLKYOlVlPrfSdUEdycpHReSMQsypoHkkfWrkJpSGpTHLZS
EKuFFflVnJfYhUZQyFLnGhZHNLFddqYtWLydRhPKESTrFgGCLWTaXyOWkmruaIswllCWW
CwDfBcpihNtLUrFaITtpOJeCzVLLXmfigHOcsDVBOkjlyFvuGsezvSftRAffReLviLfMcchExsadasDuaQEfHfmN
uTBdRHHhzbyXVjQkCuCvKDuoqlDogKHdpOavWfGeIoYANhSyhGRzYaFrZNmfES
RksuEncmeATFrqwTHyCgOWsAYnKUqhJxcaurFsGzGPoOtGKKowMqfT
mTPwJVMkGOiSitDpYhNRlfLjUefprZcRhCDLGmssgIkPlSuGOXfPWL
nJTeZOrXClaojsbgjiLoPLqmUWdEsDOEjjVav
Correct
Program
Angelo
DgasyudguygiuxHIA
fJhisuAIUO
ThrSgtrjyt
VProtectEx
RemoteObjects
mscorlib
System
Object
MulticastDelegate
NRgibAJuEwfxBgizrfdkJxKxhJCUwJHLQsfEHLBCIDBSQDJsPGiMjSJPGjARypyupUgJAdrgdbbFwsgezKEpbubyiQ
nqHhzZvWSchneGMGwiiyePaBaLLatjzoNGKdukJdqMawMoCRXudiNULYPGGnNUcjdtaYwjMMZEIRodomJuDzFQasvlNndVQV
NGpWAfiCrSKuRGDPiGyKMEYSyxhRhSZLbXEMtijRBatQEkinRQHNISKJhWYDyQUZtySuCqWzWhIlLIONOtAQLM
ANSHIZBKhPWtzfsPgFXoFuxVqYKUkaHoQLlHNDTMVEgfTXOBlBwPZpiFP
oCPBdIQezmlOIcgHSPoekLePwDKJzoUzddYHLRzwmsPTzJUOKcGIziucYzFayHfLRllfDZvBPrrrwKQm
StNqAVrFZvhZXkVMMHPCMIXUKkpDriXYtGwXSjHGaqOpwE
ZSQzAMdXCrjRBIimfesOodtnTDxboYiapTWeJeVHUcthKFuAAiwFxkWwZcgxOBieJIch
QtqaYhtiucVAOKyvIQZzRgAIuFgSfiqqRywsXPI
ByZtuuinMIHTGVSJuaucbBoDNTIwfFnIwLgxzrfwAgInOSUlFUftNeBzJWfbmlIGUzWvpUJDvxb
bSpkfFzpDupZSLQXfWmyWrAnrNfyQeoOMIyJPzBtdHsalBtGfofdJFzkRCsRaAYZGaMKMGIfUtUPyZBpTYSczKEHINrMGjSciT
pMRERgKzIrQJEDxOKXtwUsPnwPGBAANTRcOalNRZyDsrCSMlKFtYXzrwxeHCZIyIdwrcpWdwFTxRAXkeDVqvGpwSl
nDblljILyEAFKTwXENUIqkVSrpXJyaNIcWWTyIxJnTjAtBFkKMyXxSBDiJtvLyNXqsdnwcZvQKVWAVYqknymcpKJ
ZlpswciRaFZTGSSuvNNhehLfubSoycLhiNTxRxxNHGcnJcVFtCGARRCsaJyVJuSxurksyVcyQzaYEXVRF
HAHDiMZcpotxIWmgwIGunHcTTJJjRyWGnxlyilY
vyRqBioOiCgFCRGXxVYxctepVjvaXFUekgPXCkWPZHCkKpXqlYoPeYtCUbVRmNqdiCUWCjVNzIXUquegLF
bVKrXqjjZoDnZjReKZCDsBSZwlFAafnCZSkHSphHIqEmoQUqyZUidjVZCkumkjIuABNHyKLUs
BpTViGJVNWoXmVetaJTEHZsIE
rvrsWRcHwwqWcQwENPsDayieGRcAftVTSJjyANWoWzTrXXetNjixyb
vGIfbfpXshlRlfqrilpUkcvwyBjZaUtMuVHwDbKNDJPDdUgPQXotaBaTLLgawQxYnYWQYtnHbbRbMsSeUUICfzmsunkrvkQnL
MKvyDvMqNOcmbiulsScTgKCkneyXWEAXBlXXPqMQevHIBRRUTSrQsHOBHLLYwoUINFlqLXVBGMokDuiVM
SuperBook
GetRemains
EternanExplicit
GetProcAddress
LoadLibraryA
LearnProcessManager
ReturnSpecialList
Invoke
IAsyncResult
AsyncCallback
BeginInvoke
EndInvoke
userBuffer
target
dataBoost
xnbcoiAi
fwerdwef
gwserdeaww
DiugcAoi
cmnzIAow
object
method
cbjxBAuiw
zokpcihUw
callback
result
cnxnUIAuwBuwwqq
sjinxnSCe
kmvoSnci
cniuABiuw
vpja2bx
kjcbkjiw
protectonType
oldProtect
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Security.Permissions
SecurityPermissionAttribute
SecurityAction
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
Friendly
System.Collections.Generic
List`1
ToArray
Convert
ToString
TryParse
get_Count
get_Item
SetValue
String
get_Length
GetValue
Exception
.cctor
rivateImplementationDetails>{68A63205-9FF4-4A61-AE67-5F3F9E140B9B}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=1196
$$method0x6000044-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
DllImportAttribute
kernel32.dll
Concat
IntPtr
ToLower
Marshal
GetDelegateForFunctionPointer
UnmanagedFunctionPointerAttribute
CallingConvention
__StaticArrayInitTypeSize=16
$$method0x6000045-1
__StaticArrayInitTypeSize=300032
$$method0x6000045-2
System.Security
UnverifiableCodeAttribute
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Spokeswomen
Appestats
Copyright
2023
$d17b41c9-3955-4890-95b8-887aac006e01
1.0.0.3
WrapNonExceptionThrows
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
c:\ew2maqa3\obj\Release\Friendly.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
221018000000Z
251015235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
L/I=Ht
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
;h0al\
20240207171407Z
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
230714000000Z
341013235959Z0H1
DigiCert, Inc.1 0
DigiCert Timestamp 20230
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
l2|X/gGe
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
240207171407Z0+
/1(0&0$0"
@WhA6o
xR}JlW
ztJVdNS
Washington1
Redmond1
Microsoft Corporation1806
/Microsoft Windows Third Party Component CA 20120
230914191423Z
240904191423Z0
Washington1
Redmond1
Microsoft Corporation1;09
2Microsoft Windows Hardware Compatibility Publisher0
'V:VAP
Microsoft Corporation1
232825+5014930
chttp://www.microsoft.com/pkiops/crl/Microsoft%20Windows%20Third%20Party%20Component%20CA%202012.crl0
ehttp://www.microsoft.com/pkiops/certs/Microsoft%20Windows%20Third%20Party%20Component%20CA%202012.crt0
ItEPxe
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
120418234838Z
270418235838Z0
Washington1
Redmond1
Microsoft Corporation1806
/Microsoft Windows Third Party Component CA 20120
-g<'<V
}PH.=C
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
p%|Yi1$
Washington1
Redmond1
Microsoft Corporation1806
/Microsoft Windows Third Party Component CA 2012
(https://www.microsoft.com/en-us/windows 0
aOC,3
20240208082516.974Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
231206184534Z
250305184534Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service0
~|,sZb
PwO?8:
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20240207215120Z
20240208215120Z0w0=
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
TkDZysPPtydOdTIwAMbHyaSkytLGBBNsBVTMuHdQLoJ
lFMfBECITOwQUucyXzDouLmlMcOPGBMTVmXIblMWqLRJIzNicWyzUXBaTbSZpnCSCcuiWTWmmgyitdcMOgm
DhpYlCUTwWDaddxaReuXRVbilkMkWluZQFv
rWTpUIrYjkSzZXNnDciGPoPTYBzjHaHfICvjrVtpXwTFpwmQTjLjWuiCHARSIHRJdmqXbdvijsiTVJdbPjQYPXJN
KeRNel32.DlL
FreeConsole
VirtualProtectEx
WaitForSingleObject
CreateThread
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
Spokeswomen
FileVersion
1.0.0.3
InternalName
Friendly.exe
LegalCopyright
Copyright
2023
OriginalFilename
Friendly.exe
ProductName
Appestats
ProductVersion
1.0.0.3
Assembly Version
1.0.0.3
$NVIDIA Corporatio
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stealer.12!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Gen:Variant.Ser.Zusy.4964
Cylance unsafe
Zillya Clean
Sangfor Infostealer.Msil.Kryptik.Vvnz
K7AntiVirus Clean
Alibaba Trojan:MSIL/LummaC.7408c6cd
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/GenKryptik.GVQY
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan-Spy.MSIL.Stealer.gen
BitDefender Gen:Variant.Ser.Zusy.4964
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Ser.Zusy.4964
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Trojan.PWS.Stealer.38659
VIPRE Clean
TrendMicro Clean
Trapmine Clean
FireEye Generic.mg.5870ef4ab0d94609
Emsisoft Gen:Variant.Ser.Zusy.4964 (B)
SentinelOne Clean
GData Gen:Variant.Ser.Zusy.4964
Jiangmin Clean
Varist Clean
Avira Clean
Antiy-AVL Clean
Kingsoft MSIL.Trojan-Spy.Stealer.gen
Gridinsoft Trojan.Win32.LummaStealer.mz!ni
Xcitium Clean
Arcabit Trojan.Ser.Zusy.D1364
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Spy.MSIL.Stealer.gen
Microsoft Trojan:MSIL/LummaC.MBZU!MTB
Google Detected
AhnLab-V3 Trojan/Win.Injection.C5606080
Acronis Clean
McAfee Clean
MAX malware (ai score=88)
VBA32 Clean
Malwarebytes Trojan.Crypt.MSIL
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Stealer.Agent!8.C2 (CLOUD)
Yandex Clean
Ikarus Trojan.MSIL.Krypt
MaxSecure Clean
Fortinet MSIL/GenKryptik.GVHR!tr
BitDefenderTheta Gen:NN.ZemsilF.36802.um2@ayZgU7o
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (D)
alibabacloud Trojan[spy]:MSIL/Stealer.gen
No IRMA results available.