Static | ZeroBOX

PE Compile Time

2024-09-10 00:34:37

PDB Path

c:\3vjguhrz8e9\obj\Release\'	.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000304c4 0x00030600 7.99066795516
.rsrc 0x00034000 0x000005f0 0x00000600 4.18710431177
.reloc 0x00036000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000340a0 0x00000360 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00034400 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
UfTIs/N
n$3*7j7
Kcg}y;kq
qpsVz0 8
Ie\vARo
:UzM@Rhy
((cv$4J
W[9lrS0
k>roe[
EDS{5|
yz+0~;
5D{pQW
U8j5gA
4!E*9EY
;Xn:vSL
'#EiEUwR
uMho(^M/
a#zO;W
L:yo&Z
mxFOfBo
~{|yk|
$;@^pK
_![I*
E!o*YLn
s3y+ `NO
60=(;u
yMtYm|
2X$?X:
IIs/z}
V:"B+}
5Xq6:C
5ae}r--
S|:7hp
k:0'"v
eip~l#
R]v>#[D
9Q[8r(i
mGM`+0
YE8:|H#
;p&xZx9
v9z#X
N$QH}'
:S@Dwz
5j;MmP
ks@$F:B4d
si%BAZ
`4%D,I
ZBE x>;y;
Cg2Ek1
VS>C)qpJ
17-=&\(
B&-rwIW
:OENt@_
+:w:O4!
|`a\6oAJ
0M58Q1
`N<fSpc\q/
/q/#Ff
_e|![k
@7[i~k
(A9a@}
eP#sLI:u
k#<PSo
J7Z|SLG
nm)<3P]S5
mSj?Za
ZZ.l$Y
g#`B>e
&}Lgf@
f5)6cFQc
TV4@_;Y
RPU3_>
6#Cd9\
r(EI2n>9
GuuDKU
R!n-W|
O2mo
*k36}0j
p1oI?+
mYauPRv
5`v9\e_
*2[:iU
FuYt`X
SSbR:D
t|^b6.
i$vZY7
u9ug'C
\G}dc4
)b8#@Pe
_b"E;:Y
j7;'K&
%ml_N_1B2
(dLkvk
&{NNIm
dm2Zpmz
J`|:d)
dmQZ#h
5s`k,Cy
wekJuO
K9tTi~
*"<X5H*
R'h?G6
Tam{k4fM
Ay^i`C
LkG8_7+
Omhj)3DJU
hZMFPR
+H'EwI
>uX4h2(
85;|]$O
s=Mex))
rIpUlg
f^} g%
>w&f|X
NN4H@V
EP,t48|
yzJ3[qr\}
sJm|"M
W6gO.8
3k;^F+>
#D9hx<
U$evL;
K1<F'G
rkpYkV
InNfgt
`px:7'gA
&YCJM}
9'7A$7
*Tk#{;
ce*3&t
2'[uhD!/
8(u;03
JFj0E<
/<.Pee
z<7$B"
y{i5=*h\
$7VU*Q
LAzHZ?
@fjSM4
/D ]AfhQ
#m!Nwp
j%"N,GD&
u/{)@D
"Qh>$;
d4,+<w
K%~#'bo
,5MjDt
!#QWv"~
c$mJG1]
,@5*&0
ykem!A
h1+Y+'
w:<`~/
&,Bt.3
&uO5.
'yM_?0
!dOhbm"
jDX5_We(
=p0TT$
3RfpNy
F6E51s
b}KQ+a'2
C+zk#.1v1
:m(0@:
5v]u9m$+
_D==%
3SxDBc
}$[?Ao
{,M]`
C!o"u)
Z`9}E6
u*oe<Nh
:sH6Pp
D2us'A
U2#aD9^,Y
ER1h&l
x'S]N3
0Q!o^U
9+6X8b
r.G4p"
H~D[("W
{.T]OR
w"pe")
]0YX^HaDl^
4 vv5
N!^adM
;DGXx
:A./sL
sf:416
(t6KE.
juTt=a%^
>ZeZ;S-lGx
4$T4WTd
bW=%=l
F1O`K\
EYP"IK
ABx<C
}Zk'}j
L"?'Tx_*
HGvK_$$,p
aBX/%
:uA-Wo
m(vt0i
mz1yw7
s~Y?*y
lnD'&"Q
djNeOI
~f0]D
~6'CoJ
JVV<L6
GN_k`a
?H$Or=
(My^Bj
C^| 6sK
eFCt~hs
|JtH9[
G\JKH@1z.
zN}J,~
CqqUnZ
lG+{*V
noLg?'9
5&3>r{T
oZ*8b8
pj^iUPD
@i\}(a
c1un6d
)&t0k?IF
)cpk]?
wt,0 `
JHGk>iCWC
}.zzw~
2Y~K(p
W;8%b_
voIE.0mQ1S~
TrE]>d
gRE0\R
R^3n6F
7meIIcJ
YtlrXBa N
%.Mttp,:
7z"6,y
5RD,@A
=QUY;n
/9dRK>
wpd6,V
g t1?+9
\QjAFo
apCbwy
@F9V0
a(G'FX0o?
_#pFe6um
t66-8GK
LZu0F}
3vcdfue
jinN6K}&VR
/[eeza
XB&Ik"
Qga4[Qq
K_q`qn
3e8a?!
<,nXFG
|eN|=
|~oiV=#
jdYiyp
GF.BJ$fO
~8t6)<
vGED.oE
P7N4S,w
u_&Ldr
76Qe4k
`m=dzE_
G4y{.&
=O1~ZO
FERer;z
Bc+41n
(fhdNd
5vR[YPg (
*/N76MH
2?SzXg
^#7h*`
HMQ3(5
Bc.%I
-7!zL4
n).+pZ
~!l|#b
=}C9u
9r@g"W
g=QJ%QO
UmY8@?YF
,M}DHx
Fexm,>
"&D{Wt
=L6~Rl
YZSsU:
.BOTvR
es"}r7
u@-OEU
[JEES2f4
Z[=+$`
sJ:<)ub
}pK?~S
K_-p%3
Dh0I\f*
[\)7s3
BskVYK
kr"TZ+
<k]uxsd
jZku 4
:zI[lV
5xJh/y
Q&in(b
~T!-W2
j#.bxE
)L q,]
9ph21^
45hTcQm
XIja&5N
DUHIJ2Z
@q{5R
B7JZ~!
+\jDtd
vQJ;QV|Yg
WIWL,U
srq5dM
Eb <;0O
S:th\,
Hndw*e
DV1-RY
t_6%g]
Zj5IQs
J)&jpS
v\.JE&
0XuM<+O^
Tb>&*l@
]pq_QH
unj.(b
g{u>okN
moDBm1O
I";-gZ
6IV}ql
qq7"US&
J;CBx3
C(AZ)xO
'nhTdK2
%R:@$/
d3Qz>)_)
vPx':_C
:x#[S&
DQI_s]q8
9D_aB]
gIed{`
wH8+yD
&1Zrid
J(C:K'
{`("M{p
J1G|{,
@is3t*
K'l_~$
aaPJ[#
BH4'L
UZMop8 *
q;aC7V3
zU9~`r
9wxh0/;
R,*E-0Mc
es20!y
{aS4uIm
%OelfY
LBY^,!0
*.W5"{
wB{$Bjo
otf8l(
<(WJ8@
='EtH{
$0%X]@
Bc|L{3
t\4,1!~
"dgIQw
G ?%b{@
v&({K^
X$LarQ
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
AVP.exe
MoveAngles
KAJSDkjznKLjzsjlkeju
JUOAHsuihgsxujhA
Program
mscorlib
System
Object
userBuffer
System.Collections.Generic
List`1
AcARemote
FreeConsole
VirtualProtect
FieldAccessException
IEnumerable`1
CallWindowProcW
CreateDataCollector
AIOsncoiuuA
ZAzsaruik
QAwtykuil
DSsdsAsssQ
ASxcgtjy
Fgtjtyu
ASvZAqdr
fwergtrh
verfrew
wedferhyu
opAJKSioknzAOJI
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{D166493E-D6DF-4378-A94E-282A27186C0E}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x6000008-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=192000
$$method0x6000008-2
DllImportAttribute
kernel32.dll
user32.dll
Console
WriteLine
Convert
ToByte
get_Item
Random
System.Net
SocketAddress
System.Net.Sockets
AddressFamily
$$method0x600000a-1
__StaticArrayInitTypeSize=1196
$$method0x600000a-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Algicides
Acclaim Crookbacked
"Jollification Angiograms Unelected
Plerocercoids Transferable
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
RSDS3y
c:\3vjguhrz8e9\obj\Release\'
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
)uH1uH9uHAuHIuHQuHYuHauHiuHquMyuH
OauncxAr
@4587jbdc
ASfgrghtrhtr
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Acclaim Crookbacked
CompanyName
Jollification Angiograms Unelected
FileDescription
Algicides
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
Plerocercoids Transferable
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Generic.4!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Infostealer.Win32.Agent.Vsn3
K7AntiVirus Clean
BitDefender Gen:Variant.Jalapeno.18255
K7GW Clean
Cybereason Clean
huorong Trojan/MSIL.Agent.li
Baidu Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/GenKryptik.HBLE
APEX Malicious
Paloalto generic.ml
Cynet Clean
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Jalapeno.18255
Tencent Clean
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Trojan.PWS.StealC.4
VIPRE Clean
McAfeeD ti!00C66EDC8B41
Trapmine Clean
FireEye Generic.mg.46a221059a8fae9b
Emsisoft Gen:Variant.MSILHeracles.179021 (B)
Ikarus Trojan.MSIL.Krypt
Jiangmin Clean
Webroot W32.Infostealer.Vidar
Varist Clean
Avira Clean
Antiy-AVL Clean
Kingsoft MSIL.Trojan-Spy.Stealer.gen
Gridinsoft Malware.Win32.Stealc.tr
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/Stealerc.GAB!MTB
Google Detected
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
MAX malware (ai score=84)
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.VIDAR.YXEIJZ
Rising Malware.Obfus/MSIL@AI.88 (RDM.MSIL2:u84r2qf3g1hC1l4C+uia6Q)
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
Fortinet MSIL/Kryptik.MQ!tr
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_90% (D)
alibabacloud Clean
No IRMA results available.