Static | ZeroBOX

PE Compile Time

2024-09-02 05:34:52

PDB Path

c:\rje\tg\h1n\obj\Re\ease\gqa.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0002c7d4 0x0002c800 7.99115311085
.rsrc 0x00030000 0x000005d8 0x00000600 4.1524146556
.reloc 0x00032000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000300a0 0x00000348 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000303e8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
hKKS(Y
I8;X~<
E7lvW8
3W4L.<^Kbs
>La14U
Y.&Fa[
k?CF#xf
)r?@aN;
n*ogjC
nI-%Tf]G+c
/Nv<7r
MD>}6e
23W;E=
p$D<*/
/ky2[(
?qSHxG
D'4PJx
xq}3>J'E
YY+ZL^v
6A>CLD
cSj8q]
9|0|C_
GLvM*&1U
,]KqM$
Zmc" 6E@
F[?R'vU
u{,H"'k
QLJa%
0{APX
0es5>u
=9Y$~UM#
\W]Y$a
,x)l~Q
t^IR9R
Usd:Jr
'.].Cw
kRw6}l
U]%e*1
/viQ%S
|C*0a%
<(@Sw9~l
Ej{&4#
"<FaD&
y]@Vi5
B/rfXh'
QkV4)Wj
oxm}([
EVV'~&~,pA
Y)U+`Y
"',i,6
&;B]Mz
/0K+|o
joSA//
E{OzfW
;w}m^$2Dj:
\gB,M#
dz:~cD
mY]Og{
QS71cw
YNI75j
x"R}V~
G}O9cn
(axk$+U
SV2#+6q
SJD]cyu
=CEbY]
K4Nx8o0
R>'"/m9E
..xKuMr
KyfHe5e
x4@+xOZ@
p#>|},
`6N(-H8
g\+Rop%r
"=n!:rG
wC!.(9N*(x
+7wz'F]
0HrNM0
LUNtM_
(IBm!?)S
+IBC*B
ED^c]~
0Il2?m
8)aN-H
>Ompbu
y0V'(u
8#&aVY>R
^K0sN(
L#]TA7s
!DbBON
$YHBd
PC0 /Q
6xi]z+;
d8U6L|V
D,{B=%<)
@&F_^3
%A4rL
91mqiQ
{Z5h._
PSbTw4&
4m{JV*
YdjBu#
:'>n{J
EsnYI*n]y
^CK3MA
/@v&(J\
tY5p|O
?ixffLA
'qXXQV
(#1pVb0h
]{,cSP
Ym&U>}
.9)\
sL7x"}
9M#C<_
9igCjp
|}>Zah
K?p|c(n
j:cu^_
=xfsbL
@DBt["b
o l?S%
Ir}J9Rz
p?D5:a
A"pwg
3qsY8
</*|LGt
l8"*8r
sc?3>&
#HnxD/U
#g0^_p
yo^Wm)
%!ij:l
@1XVGeXhT
bE^a(#[\6M
(g2VoO
u_VT,~
b$xM|cR
}XN4sY
0E$4]
-63g9_
I">$oI
D;JVDK.\#O
CoDDiP
%l\a}[
=wu>(G
9Z-`c_
'DV)9WF
%3WUD*
jfV]As
.U@$]Q
nlh)"G
MQ=.%6
AFvkU}M
aMT^R+m;
G1[8Yh
^yWxu^>3
.ZQd$,
\@0:Wg
zB;`rI
}^9?$v7
rl=15<t
$V,wY2(^
zOHmV}
[r(Wae
WBqD#I
SVwN\*
5[p\TI
}+)Nm'
eD|D2~
(=:NC*5T
ahsi's`
j1/)S%
F?L)0u~
b{Z`J*
&$s*'hi
I:h%7U
ksQI|teA
e7%>H@
eg"k%S
O)n.)+S
i,nGHXz
I7/Z,"
Ua6wq7
8XVLY
Yw?1a
#fTsSw
_h$dE~
n.0]RBz
i2]HQLQ$(
'X4"d"
.PwYe(
~@R:YH
*~)>FVO^
<=O`A\C^)
T,]BGc
;NrlZ2f
K4jmIU
dErpv@
o$(_P0
b "*&x
:CCtX_
S'!tyHR
x"'csR
F2Tn.z
1\'<&t
E!HyOz8
_D[3K^o
%UY.I
Ao$V_w
Uc)YO6
HoQ=GT
X5</z;S
)SZ=x$
^F2(0(
&b~k`]
dwB\ hc
j?r>"sw%a
`xe|/s
1w/4(yt
0]XoI5
Hnj)}a
C:&iI
Ni/Sy/k
84bsXZ
)B`o1P
&4b*]n
x$Qjc=
r=*&*SZ
K%w'8W;g
9= p%)
&vT3#W
Gt|AxW
PvUoo^
o;P;(p
4DFFy3s8
bKq&[
n*eg6{
E%M,7F
|q|~my|O
njbg)
o`|`)&
|FH#jwRD
$HwbY"
ZkFY_l
B]^>;A
}w7uU`
-R,#4o
6Q7PSu
/HC3|(c\
6OlX@ gw"
_yI/P.
$),J+Q
:FpT}\
)6Lu2|
ndnRPp
q-.S:e
?KLV)\q
|tzx3S
4X,/y
Sy/j:[6
A?0=:O;L[
tHck\j
#sc`0GR
!i TW5
bU4Q<Rm
uI_+T>
WO|^%HAU
yA SnP[J
'O5g5D\
J!4D'z
xM>vzj5
s.2=<T
5TkMFz
qBt`,ir
1}" L2
#2^)>*-
I\?805D
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
AVP.exe
MoveAngles
ContentJoiner
SDfrghrt
Program
mscorlib
System
Object
userBuffer
MakeSign
FreeConsole
System.Collections.Generic
List`1
VirtualProtectEx
GetProcAddress
CallWindowProcW
GetModuleHandleA
ThrowUpVehicle
AIOsncoiuuA
AUIShsuia
IOAUshiuxA
SADthhjty
uiOAShiuxiA
jikoxzaoiu
zkANsniuw
ASrgrty
jtuygertdr
fwergtrh
verfrew
wedferhyu
moduleName
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{4FB12635-D6F2-4B80-B79F-23012642AF67}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x600000d-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=176128
$$method0x600000d-2
String
get_Chars
Console
get_Length
WriteLine
DllImportAttribute
kernel32.dll
user32.dll
Convert
ToByte
System.Core
System.Linq
Enumerable
IEnumerable`1
ElementAt
Exception
get_Message
$$method0x600000f-1
__StaticArrayInitTypeSize=1196
$$method0x600000f-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Sincerely
Bollix Vivisecting
Production unsolder
Beknights Recommittal Bashings
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
c:\rje\tg\h1n\obj\Re\ease\gqa.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Bollix Vivisecting
CompanyName
Production unsolder
FileDescription
Sincerely
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
Beknights Recommittal Bashings
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Clean
tehtris Clean
MicroWorld-eScan Gen:Variant.Zusy.558292
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
Cylance Unsafe
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
Alibaba Clean
K7GW Clean
Cybereason Clean
huorong Trojan/MSIL.Agent.li
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/GenKryptik.HBDY
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky UDS:Trojan-PSW.MSIL.Stealerc.gen
BitDefender Gen:Variant.Zusy.558292
NANO-Antivirus Clean
ViRobot Clean
Tencent Clean
TACHYON Clean
Sophos Troj/MSILIn-BFQ
F-Secure Clean
DrWeb Clean
VIPRE Gen:Variant.Zusy.558292
TrendMicro Clean
McAfeeD Clean
Trapmine Clean
FireEye Generic.mg.24366096e1851e1b
Emsisoft Gen:Variant.Zusy.558292 (B)
Ikarus Trojan.MSIL.Krypt
GData Gen:Variant.Zusy.558292
Jiangmin Clean
Webroot W32.Trojan.Gen
Varist Clean
Avira Clean
Kingsoft Clean
Gridinsoft Trojan.Win32.Packed.dd!ni
Xcitium Clean
Arcabit Trojan.Zusy.D884D4
SUPERAntiSpyware Clean
ZoneAlarm UDS:Trojan-PSW.MSIL.Stealerc.gen
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Clean
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.36812.lm2@amCKvXc
MAX malware (ai score=87)
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Malware.Obfus/MSIL@AI.89 (RDM.MSIL2:+HSRmCS7V0w+TnHPqLTQtg)
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
Fortinet MSIL/GenKryptik.HBAT!tr
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_90% (D)
alibabacloud Clean
No IRMA results available.