Static | ZeroBOX

PE Compile Time

2024-08-24 05:29:33

PDB Path

c:\56zm\xzd9\obj\Releas\Zaq1.pdbpdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000309a4 0x00030a00 7.99081105334
.rsrc 0x00034000 0x000005c0 0x00000600 4.11162936997
.reloc 0x00036000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000340a0 0x0000032c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000343d0 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
/TPuGs
Mq=e<nR
S)*.sr
w,O@c:n
@9\'od\
/Ld)R7
V*/Ywv
.C,!|?L
mSQnEn~}
ob.AVEr
3*Prl.
b>VGX3Q],
O@cmy
zTrM{,aM
4LwUa8i
Yp$('q
oX2U !
[kG4e[
3.Dt5Sv
hwyy
ZZH:i5\
T<f&E6
u s!1W
|ZC`m'#
i.KJqS
}]"Y3\
aHMD[`<Jc
P,L:WtZ
7>\sk4a
EXON%^3
sSIVFU
U}KURN:
_[Z1>Z
ZhR4O67
&0{SZN
-dS.8&
/G/h+8
r#YG"~\
*=e:-
o&}|'k
W4G6-;
<(Xst<
Z 8JzT
7N^GJp
I9<rUW
{8\6;&
M|2>;,7
=um"O|(
ye@4$5N
RwQTSk
k1e)S
J@qp!U]8Y
Z6.DP9L
Z,d4"~}tI
zIteo`
H`N 2d
*jSIqr
qC0^96
.>+Fn2
48-jlv
jsW=b5
>Q+cx@
XPn&n%M
|O-lM5[;J
o?Ml-o7$
IxOrEL
,A'l>*vJ
^@B'<m
kjOORj:
B*dnSh
^2p-e3
y4odDd
%p,oZ^
GT-u$Y
.TOXi@DHc
2a\Q_6
:xF2U-=
^9'UpSxy
sd@o#huFK
#%`nie
~{60Yyjt@
|*x'p_$d
T=p&1#J
|~`|?9n-
C5{S.t-
twX<bv
pAxu-:
0St>=\!8
hih:1
O~QzPub>
Fa`q}IO]
Go`R&J
~_^!`yy
\^]*>"
%F2SSu
[@JKxI7
+TI1Z%4C
|=6!o+
i2L7Jd
eQx#KF
dS?8'C
U"[&rh
i#J@X`Z
lgx=E"
S.lK_u
3q!)k~X
W]ri4B%
/`ymb
9G5#?s~:
l=657p
sev7}U
v&^nHU
XHaQ?0
cTHB42CRl
d[I}%=Mu
djo=l$
#+SERsX
R(a"P3
F^ksq
@r%Qys
Erl#|_.
Jx<dGS
!6!-4B[
7u* `B
=!xKD0
"^F<>6E
^Cns|Gb
>j?{IY
q k+hMUw
WVXIEB
$IE~^|+
}v}xFO
&2m'Gh
5rlQ5M5
RxNu{/
cT;.4F
&yIPQP|
b#-pbA
X5)0Fuln
$*pLZs
"/h]N?F
M1u|TU{
kl=epqM
+B:!G
C*h{OVl
b`P2)N~
<-Bo$4f
RK60nn
fD^T0g6
>4z:L^wU
DVm ]hc'
Bk49XQZ
`}&yUK
-[yNg(
&K}\5{?
g\2HP0
&&`uJ2
YGmPUq
G15'wx
a'>&PE
Zx,[c/
X@nsF3
,N%aXz
3!]D~{
VS/Q1~x
U\jYS+
F qbOc
v8.I9$
qw7nzV9
^PvcUM1
[1NSf2@
r\TE`~zR
8<z,5]E
VOZ?g
^9|mMS$
Z#dtBR"+J
$iZV4";
r>{3}2
@sk*5D
S{q-xp
'~Dic9
!`F}e:
6@=qi&+X
Q_#!mS
&5N-HH
I\j<fk"T
pw&f1'<.N
^!rnbIU
CSmkM}
,On*2Z
l$qSXj
|]Y!;v
oQ(SkB
'_89#VN
7+utJz
P:"X>[
-SuFp~O
o<?yKa
cs<euo
35&*|za
U_1~Q
8,?*uD,
(5aoGp
3pY+`b
=7t6QE
!QT-Vb
04RW[[
%{&.\s
l(jz~pt
=h^~D*pNb
jXsVu5
Plva*rZ8V
TsUbn:9
^r]0EqW}
TaZ"Hs
84Oz1Z
E'(L~$
MeDe@W{
y/vXP2
:]8W &
W{kn^P~
WFw4d.
2!R!f}
A_W6eq
fRK[W<
Y6uxyVhi
|tR[zp
$bFhMG'
U}1SMU
WQMi5u
^saesx
4AEJXZ
q<p3,euj
,gX"gl
7qP[>d
:'/4~Bq
\b>y)3mK
=EbV%;
N+#@{eM
|/K3W0
>Z'CUQ
Ln97O{x
5B9'7
u}]oBy
Xni:J\
5\n?x{g
7(Y?p7
\IM\EX
*Yg{6z
RE1)u3:
MfV~!X
Z|'D-C
=dzgjh
<.{9i2
`@@K4o
:()Au>a,
}|.]+y
2z?XQQ
sN4RSQ
&DIZb*
n6u2]9
?&#Qg>`5l
|aceb-
Eks$|0
5#}&@`>
P{j@Wf
zhp@}`
]Gx9Xu
=U{V7p
O|t3T[
q5EiBp
[8Z$z?*
5?Dimd
5"'&]#
,c]69Wr
vj|^kq
7vLa1oY
4UshT3
D<1<gP,
}z(VJR
>9zKNw
(wL'Q5`
a7ZT=UrR
)*4AYS
.U8qSh
*Y;Z5>OY
&Km [ew[
ZO[OlAn
*5C9|
},3rhn
@NIe[A
)Q:p)J|
D1Vx#p
;$TkB[
d3d3'0b6P1
qpLgjg
#oak9b
_T9goxA&
}*Ax+wW>z
Ll2ML"
a|4*:&)
nl"'/[R0
Q9-coy
h.uUC7
sv|^JaB
_Pi^0
.`+\I=mJ
Z-r$$%
r(f"q#
S~ddGU
TYl+cQ0
"t8#B5
mgn{3mX
J;It~2,
^ZIMWn4
M4m'tY
L2PNABu^
&{MI})
L+9V<z
QH{j~xi
7_&%,|%/u
*(q;'N
H-o"<U1
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
AVP.exe
MoveAngles
SplitSettings
ExtremeClass
InterfaceLoader
Program
mscorlib
System
Object
userBuffer
Status
DoSplit
System.Collections.Generic
List`1
ParseString
VirtualProtectEx
GetProcAddress
LoadLibraryA
GetConsoleWindow
ShowWindow
uiAHsiuboA
CallWindowProcA
LoadConfigSet
AIOsncoiuuA
splitType
strings
DisosNXoa
IOAUshiuxA
SADthhjty
uiOAShiuxiA
jikoxzaoiu
zkANsniuw
moduleName
iAHSuihxiA
AsinxIZAisq
AIUshuixiA
ZAq1wtrk
DihzxuioAo
ZAsqww
ocxAzhbzAuq
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{B62355A0-EF60-49BF-B815-A02BBFCF3621}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x6000012-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=192000
$$method0x6000012-2
String
Concat
Console
WriteLine
Convert
ToBoolean
get_Chars
get_Length
Enumerator
GetEnumerator
get_Current
MoveNext
IDisposable
Dispose
DllImportAttribute
kernel32.dll
user32.dll
ToByte
Exception
get_Message
$$method0x6000013-1
__StaticArrayInitTypeSize=1196
$$method0x6000013-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Deliberates
Inwrapping
Grounder Outsiders
Soundmen Teachableness
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
c:\56zm\xzd9\obj\Releas\Zaq1.pdbpdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
Splitter:
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Inwrapping
CompanyName
Grounder Outsiders
FileDescription
Deliberates
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
Soundmen Teachableness
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stealer.12!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Gen:Variant.Lazy.587642
Cylance Unsafe
Zillya Clean
Sangfor Infostealer.Msil.Lazy.V40y
K7AntiVirus Unwanted-Program ( 700000121 )
Alibaba Trojan:MSIL/GenKryptik_AGen.5ce25cf7
K7GW Unwanted-Program ( 700000121 )
Cybereason malicious.6ad139
huorong Trojan/MSIL.Agent.li
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/GenKryptik_AGen.AUO
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan-Spy.MSIL.Stealer.gen
BitDefender Gen:Variant.Lazy.587642
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Lazy.587642
Tencent Win32.Trojan.FalseSign.Imnw
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Stealc.fgqfw
DrWeb Clean
VIPRE Gen:Variant.Lazy.587642
TrendMicro Clean
McAfeeD ti!DDB51C81BBEF
Trapmine Clean
FireEye Generic.mg.258229d6ad139e74
Emsisoft Gen:Variant.Lazy.587642 (B)
Ikarus Win32.Outbreak
GData Win32.Trojan.Kryptik.20H8AH
Jiangmin Clean
Webroot W32.Trojan.MSIL.Stealer
Varist Clean
Avira TR/AD.Stealc.fgqfw
Antiy-AVL Trojan[Spy]/MSIL.Stealer
Kingsoft MSIL.Trojan-Spy.Stealer.gen
Gridinsoft Spy.Win32.Gen.tr
Xcitium Clean
Arcabit Trojan.Lazy.D8F77A
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Spy.MSIL.Stealer.gen
Microsoft Trojan:Win32/Sabsik.FL.A!ml
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5661464
Acronis Clean
McAfee Artemis!258229D6AD13
MAX malware (ai score=82)
VBA32 Clean
Malwarebytes Trojan.Downloader
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.PRIVATELOADER.YXEHXZ
Rising Stealer.Agent!8.C2 (CLOUD)
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
Fortinet MSIL/GenKryptik.AUP!tr
BitDefenderTheta Gen:NN.ZemsilCO.36812.mm2@aWVYl1k
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_70% (D)
alibabacloud Trojan:MSIL/Lazy.Gen
No IRMA results available.