Static | ZeroBOX

PE Compile Time

2095-08-30 05:44:48

PDB Path

C:\Users\User_2\Documents\GitHub\Youtube-Viewers\Youtube-Viewers\obj\Debug\Youtube-Viewers.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00004284 0x00004400 5.15471375135
.rsrc 0x00008000 0x00003b6c 0x00003c00 7.73895972313
.reloc 0x0000c000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00008100 0x000034e9 LANG_NEUTRAL SUBLANG_NEUTRAL PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
RT_GROUP_ICON 0x0000b5fc 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0000b620 0x0000034c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0000b97c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
<>c__DisplayClass14_0
<>9__18_0
<BuildUrl>b__18_0
<SafeUpdate>b__0
IEnumerable`1
ConcurrentQueue`1
Action`1
HashSet`1
List`1
ToInt32
Func`2
KeyValuePair`2
Dictionary`2
Func`3
<Module>
System.IO
System.Web
mscorlib
System.Collections.Generic
Thread
Interlocked
_botted
System.Collections.Specialized
<Type>k__BackingField
Replace
get_Message
Enumerable
IDisposable
Console
set_Title
_title
get_FileName
ReadLine
WriteLine
FormatLine
get_Type
ProxyType
_proxyType
System.Core
Capture
HttpResponse
Dispose
SafeUpdate
Aggregate
DebuggerBrowsableState
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
DebuggableAttribute
DebuggerBrowsableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
ProxyQueue
TryDequeue
get_Value
Youtube-Viewers.exe
UserAgentRandomize
System.Threading
set_AcceptEncoding
System.Runtime.Versioning
ToBase64String
ToString
ParseQueryString
Substring
OpenFileDialog
CommonDialog
ShowDialog
ForEach
Stopwatch
get_WindowWidth
get_Length
BuildUrl
ViewUrl
Program
get_Item
set_Item
System
Random
System.Reflection
NameValueCollection
GroupCollection
SetCursorPosition
HttpException
question
ConsoleKeyInfo
GitRepo
get_CursorTop
System.Linq
get_KeyChar
AddHeader
locker
Worker
_scraper
ProxyUpdater
set_Filter
ToLower
set_ForegroundColor
ConsoleColor
ResetColor
GetEnumerator
.cctor
Monitor
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
MatchAndFormatProxies
GetProxies
proxies
NextBytes
get_ElapsedTicks
RequestParams
System.Windows.Forms
Contains
System.Text.RegularExpressions
StringSplitOptions
RegexOptions
get_Groups
Youtube_Viewers.Helpers
Youtube-Viewers
Youtube_Viewers
_viewers
_errors
Exists
get_AllKeys
Concat
Format
Object
Leaf.xNet
IsDigit
DialogResult
ProxyClient
Increment
get_Current
System.Collections.Concurrent
get_Count
_threadsCount
ThreadStart
Convert
HttpRequest
set_ConnectTimeout
MoveNext
ReadAllText
AppendAllText
MessageBox
ToArray
get_Key
ReadKey
HttpUtility
IsNullOrEmpty
set_Proxy
_updateProxy
WrapNonExceptionThrows
Youtube-Viewers
Copyright
2020
$3030f0fa-3993-4de9-806f-315b92d77762
1.0.0.0
.NETFramework,Version=v4.7.2
FrameworkDisplayName
.NET Framework 4.7.2
C:\Users\User_2\Documents\GitHub\Youtube-Viewers\Youtube-Viewers\obj\Debug\Youtube-Viewers.pdb
_CorExeMain
mscoree.dll
qH Iw:
z]6}EB
v8zcRih
{EJk1|a
Z,_hibJQJ
ZJD7+
61~AD
nG't*5b
vuM=Yj
^D]ir=8
/*ZkLG)
R5gd"t"
0<UV;h
?P_3<F
oz-:n}
hz0i'*
qgg;^.
(0xwg;^tC
=wGJk(
}U:yyR
hs4<"|
QUq`P8
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
proxy_url.txt
YTViewer | https://github.com/xfreed/Youtube-Viewers
Enter Video ID
Enter Threads Count (Comfort 2000)
Select proxy type:
1. Http`s
2. Socks
3. Socks5
Your choice:
Selected {0} proxy
Update proxies by urls?:
1. Yes
Proxy links:
You can set your own links in 'proxy_url.txt' file
Downloading proxies from '
Success
Error:
Couldn't update proxies by url. You will have to do manually
Select proxy list
Proxy list (*.txt)|*.txt
Loaded {0} proxies
$$\ $$\ $$$$$$$$\ $$\ $$\ $$\
\$$\ $$ |\__$$ __|$$ | $$ |\__|
\$$\ $$ / $$ | $$ | $$ |$$\ $$$$$$\ $$\ $$\ $$\ $$$$$$\ $$$$$$\
\$$$$ / $$ | \$$\ $$ |$$ |$$ __$$\ $$ | $$ | $$ |$$ __$$\ $$ __$$\
\$$ / $$ | \$$\$$ / $$ |$$$$$$$$ |$$ | $$ | $$ |$$$$$$$$ |$$ | \__|
$$ | $$ | \$$$ / $$ |$$ ____|$$ | $$ | $$ |$$ ____|$$ |
$$ | $$ | \$ / $$ |\$$$$$$$\ \$$$$$\$$$$ |\$$$$$$$\ $$ |
\__| \__| \_/ \__| \_______| \_____\____/ \_______|\__|
GitHub:
https://github.com/xfreed/Youtube-Viewers
Success connections: {0}
Errors: {0}
Proxies: {0}
Threads: {0}
Title:
Viewers:
https://s.youtube.com/api/stats/watchtime?
https://www.youtube.com/watch?v=
\u0026
detailpage
playing
volume
Firefox
cbrver
cplayer
UNIPLAYER
2.20201210.01.00
Windows
cosver
cplatform
DESKTOP
gzip, deflate
www.youtube.com
Connecting
https://raw.githubusercontent.com/clarketm/proxy-list/master/proxy-list-raw.txt
https://raw.githubusercontent.com/TheSpeedX/PROXY-List/master/socks4.txt
https://api.proxyscrape.com/?request=getproxies&proxytype=socks4&timeout=9000&ssl=yes
https://api.proxyscrape.com/v2/?request=getproxies&protocol=http&timeout=10000&country=all&ssl=all&anonymity=all
viewCount\":{\"videoViewCountRenderer\":{\"viewCount\":{\"runs\":\[{\"text\":\"(.+?)\"}
\"title\":{\"runs\":\[{\"text\":\"(.+?)\"}
videostatsWatchtimeUrl\":{\"baseUrl\":\"(.+?)\"}
[=/\-+]
$$\ $$\ $$$$$$$$\ $$\ $$\ $$\
\$$\ $$ |\__$$ __|$$ | $$ |\__|
\$$\ $$ / $$ | $$ | $$ |$$\ $$$$$$\ $$\ $$\ $$\ $$$$$$\ $$$$$$\
\$$$$ / $$ | \$$\ $$ |$$ |$$ __$$\ $$ | $$ | $$ |$$ __$$\ $$ __$$\
\$$ / $$ | \$$\$$ / $$ |$$$$$$$$ |$$ | $$ | $$ |$$$$$$$$ |$$ | \__|
$$ | $$ | \$$$ / $$ |$$ ____|$$ | $$ | $$ |$$ ____|$$ |
$$ | $$ | \$ / $$ |\$$$$$$$\ \$$$$$\$$$$ |\$$$$$$$\ $$ |
\__| \__| \_/ \__| \_______| \_____\____/ \_______|\__|
https://github.com/xfreed/Youtube-Viewers
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Youtube-Viewers
FileVersion
1.0.0.0
InternalName
Youtube-Viewers.exe
LegalCopyright
Copyright
2020
LegalTrademarks
OriginalFilename
Youtube-Viewers.exe
ProductName
Youtube-Viewers
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Hacktool.Win32.BruteForce.3!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal PUA.BruteforceFC.S20327855
Skyhigh RDN/Generic PUP.z
ALYac Clean
Cylance Unsafe
Zillya Tool.BruteForce.Win32.4860
Sangfor Hacktool.Win32.Bruteforce.V2uj
K7AntiVirus Hacktool ( 005787ef1 )
Alibaba Trojan:MSIL/MalwareX.78afdcb6
K7GW Hacktool ( 005787ef1 )
Cybereason Clean
huorong Trojan/MSIL.Agent.bn
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic malicious (moderate confidence)
ESET-NOD32 a variant of MSIL/HackTool.BruteForce.AGA
APEX Malicious
Avast Win32:MalwareX-gen [Trj]
Cynet Clean
Kaspersky Clean
BitDefender Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Clean
TACHYON Clean
Sophos Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfeeD ti!375552E53A0C
Trapmine Clean
FireEye Clean
Emsisoft Clean
Ikarus Clean
GData Clean
Jiangmin Clean
Webroot Clean
Varist W32/MSIL_Hacktool.F.gen!Eldorado
Avira Clean
Antiy-AVL HackTool/MSIL.BruteForce
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Zpevdo.B
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee RDN/Generic PUP.z
MAX Clean
VBA32 Clean
Malwarebytes HackTool.BruteForce
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising HackTool.BruteForce!8.762 (CLOUD)
Yandex Riskware.BruteForce!0JNUN3a4zb8
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.116369487.susgen
Fortinet MSIL/BruteForce.AGA!tr
BitDefenderTheta Gen:NN.ZemsilCO.36812.cm0@aekFiHj
AVG Win32:MalwareX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud HackTool:MSIL/Bruteforce.AGA
No IRMA results available.