Static | ZeroBOX

PE Compile Time

2024-08-25 06:50:29

PDB Path

c:\braudao\obj\Release\doX.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00030b34 0x00030c00 7.98945500516
.rsrc 0x00034000 0x0000062e 0x00000800 3.58691674104
.reloc 0x00036000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000340a0 0x000003a4 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x00034444 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
@:CO/
6K"qkZ
^H+\e"}7
>I'JSYL
+;|Jzn
l`o7aE
iW=sGa
%1e<^B
aHV`@
QS!G\Ls
!cN$4U
Dlzl9=0!
g~])
8Ic,|o
\9G;Y!
k3zk\G
3q>BW
ay9FrNh
>QEa}H
CG]*Bu
jCB7wO
-8"ALRwCO
o+?6h#
D)| M(
irGhA-
&yU%L\
(NTIap
h&Yej[
X-:#MC
z6_t25
AEqGvm
g"8s'k
U9~Mz=
S5keUI
d5)s=$
Y<%*ds>\
tYLv?u
I/}"7O
u1+vK"%
QB#'!E
+}v[7!p
qNg0<w
wo"pLG
zrRsCF
:rm*]F
@"4!S
OK:7\
]?X+6]w
2NE\\aT
_Q*i+UE
^`Wc]>
0\JApzH
R='ugF<
G-;X3QmD]
w2wFMSJ
X)Rw+v
7ujKdN
B0"eqa
tfJ/Zs
^.J=Hr
R@ *p(
g`VY^]u
Zw\WZ^
"9!<[E2
L|&C>
3t0;I8x
(vLgW5
ARYYiI
A>HS C<
cd1$G}
Ft'z~4
U>RFHX
1K@Dg=X
Djs$Jm
wvldb,
X&!^'R
-|`:ki
D&|ts}r
3[5nX)
i1:Ih/q
X VHfm
K2krE=
Ty(c85
V&'TN$
P_<9w(
d5A"Xi
hG>Gd*
.oP/X3
_hui&F
a;?Umj}
5g87?,
Hc^2fF
gLhb=N
|*KerX
W?:xe`
7/>teP
hBM,;
7FR7F.
a!X`gT
{F'`0T
p||_J%5
oOPK.{
/g>uBeJ
}WYne:>
0_z&RxE
]Hc >X
7kleV~H
%hn`UI
"Wp\Ry
:X@x_
u:m]Gt
G+}mcY
{U<+E
?*8e?+0"
Olm,O7
:qt}QN0
29`OV<
iI``oZ{
'9?` RQ
=.QSrd
} B>J6
EreVYR
~yV.K_
mgh8N"
|)vsrP
4^[L\:.m
gQ%FK#
H=i 3<
M==s:s
GL -4w>Z
"U!/x|$~
:L:s??,X
shw?B23
mNRoH9_XOD
%X84gti
dM>Y!r,J
T;9K@V
<|#$PB
U2J1;E
Zjh244
GyxYN{_
xs\"LN8
WPlg'}7.
4S8BY#
,9*u"o
W'Od(?[:
lcTGw%
3zgp+M$
d;T-m,`
6RSs)k
Y2w(:tK
bNIp8y
zRa;>*
a.A=h>9g
h"Mpf-
LRpJkw
AJyjnK
i@dPIa
,mvAL=
nvCu"w
|Aw.'+
~YQ+F#P
+;tKYO&
/8`3\tj
p9@9$~z
}qvm+0
oCxv_v
>UVMH~u
SkbmOc
(4h<U\
fG0boiy
!2Ua~N
qeW3oIQ:
JRX^v.
[_?9?n
MQONJ1
TBF%!/ei
hKa] m
V`8H{?
YHCuN
).hK#`
:-:H]i
+K7G!H{
"{I0K_
c.TDW!
{'x^$+
21~[bm
u2sS`e
?~3gyR
#;8iC5
R^#/HY:H_
vH*Y)3
EV/q$iM
Ez5=0So
oZBQi{
>|D"kGyU
@$r\u9
}%`<CK
&la\uV
uHa\[)
k)/Ddm
m1937-;
,[Z<A)AY
:;0%L=
E$|Rd@`vh6
D'26+B
56WH=x
#k9B]=(
\[`7B'"
x+e+@/
J'6G j$Q=
_=ZoJQC
22=rR
NW]6_c
O3C!SS
<kl N0/Xnw
/JhY^l
*)Qhx-
7>@J}wFq
1n/k;M[
s6xU;Z
Q+|UqV
j*:z1R
CxzLF]
j<nZ~A
k#@0PJP
w;a@u6V4x
%g)$d7
nj--EU,
`eJs?\
6KY=d9
}>Q(WV
,MkN{c
tcwXAMo
L5w5H-
`2a)TO
dv:mP1
Z%J-Dr1
f(sK>$
)W{]%{
"G"l=r
c4P6oi
@<pToX
e!f&Yp
Y$5}E"
'yImB'
g3GdiK
3.a{q=
.['Maq
E:iG%<
/&[i"TTXT
icw{*&*,9
$"3>lN
*eI=Kj
v|~+k
rz&Oe7
8e67N
.8g)+}
0![rDh
g6\sU:
SG&z0j@{
'][g "f
1KQ`#u
L[#ZmWe
(mW@q&
{js0`Fh
>O8'OwH
,w_KGr=>c
?>jQDx
K+(Oo%
Udlf<{
j+'&+]
*'}N9e
4IVW^.
Tm(DN2
5`!T2|:
Hx):|%2
=prro.
=X[=4G7
_Das<`n
6aGL?:0dJ
T"!#'5
mLNc`a
Xn2w8I
9A"n-#^
t1O0ikM
f|TbWT
fp~h_}
lT&!sOM
u7$K~5
vDqy!I
(lBuCG+! Q/H?'f
/*e^8c.
L'q3Vq
G*}EY&/
gA7ah3
q>6r&A
t9mrxR[
;LKKEc
/BlXla-
8~yE|uu
^:G}z-*
"_\ Fi`2
JEFXQJ6cf6<
GM]s|gT{
Rs<tIM
wp[$c4a<
>;Y\LV
)|}&$
6G{an~d
ZP8lFi
U0DWC
.5yp9
"n/Ga;
%}mpQN{*
ssNg2d7X
0hP#xW
7nsE*1
>,YNYh
^TPn\C
=vNIdC
7VFyv<%
uoU3{L
Sx~3-|h
v=Vbnn]
%c$*|q\
`[Vz~W
2MB-tz
StaT&d
.:_u~2X
'pX5I~0~
XDmIl8iSy
U?$w>@,
Xa+!7UA.
l1V4B}z
EHS2Qv
~g[uCrlc
Zb7`<m
ogQ{yU
C$?m~0
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
AVP.exe
MoveAngles
SplitSettings
ExtremeClass
InterfaceLoader
Program
CallProc
mscorlib
System
Object
MulticastDelegate
userBuffer
Status
DoSplit
System.Collections.Generic
List`1
ParseString
VirtualProtectEx
GetProcAddress
LoadLibraryA
FreeConsole
EnableDataValidation
AIOsncoiuuA
Invoke
IAsyncResult
AsyncCallback
BeginInvoke
EndInvoke
splitType
strings
DisosNXoa
IOAUshiuxA
SADthhjty
uiOAShiuxiA
jikoxzaoiu
zkANsniuw
moduleName
object
method
UOIAshuixciua
ASwerthy
ujizahuiiio
cxjaugsuyqa
callback
result
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{26BDEAAE-A2E2-4CB5-AD7C-D18F28DE2D5A}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x6000013-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=192000
$$method0x6000013-2
String
Concat
Console
WriteLine
Convert
ToBoolean
get_Chars
get_Length
Enumerator
GetEnumerator
get_Current
MoveNext
IDisposable
Dispose
DllImportAttribute
kernel32.dll
ToByte
Marshal
GetDelegateForFunctionPointer
Exception
get_Message
$$method0x6000014-1
__StaticArrayInitTypeSize=1196
$$method0x6000014-2
UnmanagedFunctionPointerAttribute
CallingConvention
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Tricker
Dauntless Lanthorn Sittings
LovingDev
Lilly Hyperextended
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
c:\braudao\obj\Release\doX.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
Splitter:
user32.dll
CallWindowProcA
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Auto File System Format Utility
FileVersion
10.0.19041.3636 (WinBuild.160101.0800)
InternalName
autofmt
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
AUTOFMT.EXE
ProductName
Microsoft
Windows
Operating System
ProductVersion
10.0.19041.3636
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stealer.12!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Infostealer.Msil.Agent.Vjh9
K7AntiVirus Clean
Alibaba Trojan:MSIL/GenKryptik.6b10eb54
K7GW Clean
Cybereason Clean
huorong Trojan/MSIL.Agent.li
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/GenKryptik.HATX
APEX Clean
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan-Spy.MSIL.Stealer.gen
BitDefender Trojan.PasswordStealer.GenericKD.1205
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Win32.Trojan.FalseSign.Xwhl
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Stealc.usimn
DrWeb Clean
VIPRE Clean
TrendMicro Trojan.Win32.PRIVATELOADER.YXEHYZ
McAfeeD ti!57716A4B2BCA
Trapmine Clean
FireEye Generic.mg.ec11395a4f9b3067
Emsisoft Clean
Ikarus Win32.Outbreak
GData Win32.Trojan.Kryptik.HLHH0I
Jiangmin Clean
Webroot Clean
Varist W32/ABRisk.LGRQ-6885
Avira TR/AD.Stealc.usimn
Antiy-AVL Clean
Kingsoft MSIL.Trojan-Spy.Stealer.gen
Gridinsoft Malware.Win32.Stealc.tr
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Spy.MSIL.Stealer.gen
Microsoft Trojan:Win32/Stealerc.GAB!MTB
Google Detected
AhnLab-V3 Infostealer/Win.ApplicationInfo.C5661876
Acronis Clean
McAfee Artemis!EC11395A4F9B
MAX Clean
VBA32 Clean
Malwarebytes Spyware.RedLineStealer.MSIL
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.PRIVATELOADER.YXEHYZ
Rising Stealer.Agent!8.C2 (CLOUD)
Yandex Clean
SentinelOne Clean
MaxSecure Clean
Fortinet MSIL/GenKryptik.HATX!tr
BitDefenderTheta Gen:NN.ZemsilF.36812.mm2@a0JA45hi
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (D)
alibabacloud Trojan:MSIL/GenKryptik.HMB#
No IRMA results available.