Static | ZeroBOX

PE Compile Time

2024-09-11 02:07:50

PDB Path

c:\huvo4\obj\Release\'	.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00043b64 0x00043c00 7.99531589767
.rsrc 0x00046000 0x000005d8 0x00000600 4.14619693541
.reloc 0x00048000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000460a0 0x00000344 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000463e8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
q+Nk$f
(U>O^&1
XL./o0!
qL+5y1b
8p B&Q
^cv(\U
Z59Xkmw
KJWM0s,G
x6*:!tQ
y&CmdN
$A8G<k2
h 15mZ
)<xe*u
Rm6p"$
ZN?8~b
.XS~A/
o>,Q&*
"|*0`
+EcRJa}
nT>{AI
2T/tmz*I
&yi*~y
DdOgd>=
z|G<bZ<H;
xN;I1M
k>I,A [
n+6"hP
PFaw<-
Kx,XC:
.)<}6pF"lQ
D1Xr1h7Q
~icH-6
2lQ_@.
sWS}P_
=['Oz.
U oP?/
#Hj_$C
Xp[.>2
^!d}_pv
R.G4M\
U[p&>oQ
>&Ynkm.j
{bF>Vz
7B``7%
Ppej~;A!
Z+X4'|
8U(Ro)U
uP{sq3
p>T1:i
.i_cKg
Z-tgi{
gwJ}Jo
CtxM8Uu
IZ'.z{
EF[1
!IFFd/
x{$9Q*L
2%&ug>
D/r}hE
,D]+,*
\"uM@I
fiW$ib
eJ ZM$
1/Hl*&
Md#[5N'wT3
*_=/UTD
oOmgMNIiM
hP9S6`
n,~'D
f8WP0Z
Mmsl7~
A{g|x^
2|ZigL
3E`sKj
fPli4X|g
q^Y?:0{
TSo0$w
prxR.I
@]V3 2
\mOm@q
6,mE=;
X|IGCY
LV9fVWo
}fmd43k5WA
j':[4|
[h ~ZI
^-w?G`Egt
RM#<?bHd
bH2zut
G)cr+
4",`M:+
1;/_5`l
9]oKR'
#B!8\B
X[}Af;AN
lhtHB=
rT*TBg'.V
'.&#`{
v%xct'
^x6tN0
y<USeC:
:ghZgQ
SWd^@g
GaX)X+
>vszjS
-1vDR4}
#Pp#'Y
]D!lgi7l
WIDF'E
~'$,Bt
?]>M5Ugr=
*?lS#E
wrq~Xl
bN5Lq=
"_vd;k
]*ar03e
au`tl7
|6Kkc
hZey@~
(N'X/Gf}
|"NwZN
Na]l#u
Rw1d"#
a4\JD|
Rw'~HL
]6|a9\
[i<1K#
*lBpL5
v?[ bX
^cGC0Y
$-qeUb
2E!n9G
`P,0;X_eh
EbQi@G
braX0=w
eD!N(z;
NtO:v$
XT=nGb
;;.RW;/s[
"m95Il
jf?upJD
6x\#Gmm
QJ,O~%
Auk5f0
`9foTe
]ED$M"
TDi.}ey
n'4^+
v01mnD;G
XmaT%m
W<;jB<S
R}*VL+
?C:`h9
,WyFV
*a57F>_
'YHk|A
A[S\{
T*,q,B}l
v#{CpP
dR2QF%b,
TtA16z
\=oMGa
iy}LVy
<12OzJ!-
%lD8[
l)Z3W>=
iZLRdWG_J
/A?\TdI
zq|P"E+
KKu ;F
C F_6z
G!7FMT
C1Byv*
\Ok+rb
"Xr-+8
%.!HW{
5Js`hq
[oH/IH
'#?C,2
ErvD4z
Oly83cB5&
TdI|Q;
rm{;8O
=e[?qI
0?-W|`
x)dw:~k}
@rhLKQ
."";uf
@D&iTJ
:= <,a
EwX?ez
!rF)\1
I2OiYF
@2'w?F
\8^w%h
d{:P5Nq
2.)%WA
_I?-B>
*@G#@J
Zj=~qb
Uzs([{(s%
c&%E=J
qUs@_e/
1t!ZzF
4pS&jGf< .
X!@RD9
oO|blyir
7J}q6U
7yx{O3og
B%dH%[vV
uIE^/P
I0u*Zq
b05,{{
JNdrqP
'8&L|
>%^yYq
Q9P5X3
o4$]WAW
m0I80!U
FZN)#}<
y+\Z7p
.6j6UQ
ztUz6
um>[8k
xt?Bo>
>I_$g=?
H=|~wn
b+)jZ9k
DOy]Jvi
4~Skf1
urE503V
Ads"h&
nR [_>
;JA/Ye>
4(Zfbhgx
.K*nQ"<
Y7}\<]
v2bfR'
Ir5oq(,
lf!x2
%'`K*]61Q\)
M}cyu2
|Vp?43
K>tKLbt
oM(ji5g
ht)KzU
*UC bgEE
H$zzrq
-~&;{)SOf
Vd!fLB
yS$}!S
UzUv_J|
L<F1YP
BT+p3'
0<XFbA
prDP]fb
i?N1{h"s
~eGLE/
B#F9V
vQ&~m1R@P
.jbuqgrv
<Ey6G s
.?.S|
(f;F>P
To<4bx
VNpDl>
T??([&
sDCm94
6xh=P<
d}H:JC
i$@ @-
?Y~Q\N
W,.1PE
jchaeI
z(-5rZ(*/
/_$~^
zC2'Dn
6)'V*K
#quj 5D'
bskC%X
&A;pF{
N!5GGj{
s`7=gIg
bOkMG{e]~
JBh{p;w
fc}|'.
[$3v.j
<|$?=r
zH4TgE
agt=.=
.QV96T
%g"X96
J}t?w;$
L:'"c*v
3QNlqh
rE*dB'
P4(6]R
v3ZJ]
BAO1>c'
zP-c'U"
`[KPkWW
M,K!g@*(b
l/@~B|
cqqoY19z
GCFAT!
olcp-s
5Z)P)$
C$iAI!]
^C1bO|
ABsAY0\1{
0I3Y}>
p:tr_x
5tu`M?
Gr:FvZ
Y=/(qJ1
mU0@c7
X&Pkbl
;1Df\u
Wm#ii:i
G<F{.V
ZY Z9E
8kZdr-bO
W@(gn
<rlhB#M
;G4<Kr7
wn5KK>
h=Eq)*N
qZ51c)
G0jcqs#H
tDy^PY
rgQY"%y
P6s@m([}x
SJv>QZ
$9lSmt
WY#($}
50.J5{x
+^tF1d,
rp@HXJ
{03.6]4
6[(9\0W
``BT@q
)(k L(+
QS>hH#U~(
a:Dsw
,M>c7\
bsL~g
$mm@a.6R
*mtj0Xo
}|.5rS
V.jChb
LO:0/>
UVU\Bk
cZI+M,b
ie)6>0S
G!JVKL
Vy`FyD
y(El-D
0\$w0B=}H
R^o89e&
'88hfu
a\5*PK<
B-\:%25
^L;1y~F,V
w=fZw`
Eo!F8-
nj]5x9
jI^xB_7
DkwaH[
QByS.t|WU
~"WGY^
q1B6dT
-g&,#9Xu
FkZ-vn
wg@c\T
(w#4_.
G2=:RnG
#P8$ *
G5z9:H
3|K3=?Q
^P0/Lu4
H~A5*^
6E5r3~%|
O@PuJ0T
ScK#~(
*H a4f
V_8oY$
Ol4*~6
>/5m3Y
aQnXry
35*[*N
95u~ V
Hpp]I,.
*okQVj
Vqba>N#
do^1U
OQ?I|6
,s>w^d
FL$R7E?TE
}96xU+jN
d>hBtk
}rH11
VG:`l{
{G0hg
1RV>Z[
?dga6Z
3 W^U}}
g/rg>b
"Mso<;
Z^aB+b
fW~Ha%0
DpCbt1*/
XW2i4V
?zfN~oS
SDUPFa
&T.RnY\
=nA9qx
\2X}f
C""<f}
ktS.1D1
wOVdSb
`,{sd9U
) TI1H
})600~[
KF6),f-
BOTd>
@Ue%u=
iN>OWdUd
__`R$W
s/NKSaQ
6Z-B0^U
FzF\B^
RC(~d4~
lgLr_F
h{wzQB
KE74+Y
E&6J'u
;Hk}M:
BX1l(wL
(9MZB&n
lu8>"'
l*$kllV#iD<
H:XT:C
d^,hmp_
=+uym2
|N^}mR
.R^O w
[PClLg
4@Qn/
9-kMFj
tg}Q:I
{0aH^6>4
GLEM{2g
$6cwXh
fTi.x
qLC=OOH"
RtP@ c
T*,PV
HI@I]p
)! s(*G
D{? |
uxZkh9
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
AVP.exe
MoveAngles
KAJSDkjznKLjzsjlkeju
JUOAHsuihgsxujhA
Program
mscorlib
System
Object
userBuffer
System.Collections.Generic
List`1
AcARemote
FreeConsole
VirtualProtectEx
GetProcAddress
FieldAccessException
IEnumerable`1
CallWindowProcW
GetModuleHandleA
IOUAshiuxhAIUshiuasiua
AIOsncoiuuA
fdgfreds
ZAzsaruik
QAwtykuil
DSsdsAsssQ
ASxcgtjy
jikoxzaoiu
zkANsniuw
Fgtjtyu
ASvZAqdr
fwergtrh
verfrew
wedferhyu
moduleName
opAJKSioknzAOJI
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{42A2AB16-CFC8-4E43-A583-B397894929F1}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x600000a-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=271360
$$method0x600000a-2
DllImportAttribute
kernel32.dll
user32.dll
Console
WriteLine
Convert
ToByte
get_Item
Random
System.Net
SocketAddress
System.Net.Sockets
AddressFamily
$$method0x600000c-1
__StaticArrayInitTypeSize=1196
$$method0x600000c-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
dig twiddlier keeks
diffident kerosines
walkouts dashboard
postfire frolicker
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
c:\huvo4\obj\Release\'
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
)uT1uT9uTAuTIuTQuTYuTauTiuTquYyuT
ZAdrfedhytjty
Grg543efrefcer
ASfgrghtrhtr
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
diffident kerosines
CompanyName
walkouts dashboard
FileDescription
dig twiddlier keeks
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
postfire frolicker
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stealerc.1m!c
tehtris Clean
ClamAV Win.Packed.Pwsx-10035189-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Infostealer.Msil.Kryptik.Vj96
K7AntiVirus Clean
Alibaba Trojan:MSIL/GenKryptik.16f7b71f
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/GenKryptik.HBHS
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky UDS:Trojan-PSW.MSIL.Stealerc.gen
BitDefender Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Win32.Trojan.FalseSign.Xdkl
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Trojan.Win32.PRIVATELOADER.YXEIKZ
McAfeeD ti!8EB8822FCFF0
Trapmine suspicious.low.ml.score
FireEye Generic.mg.fa3494703899cbfa
Emsisoft Clean
huorong Trojan/MSIL.Agent.li
GData Clean
Jiangmin Clean
Webroot Clean
Varist W32/MSIL_Agent.ILW.gen!Eldorado
Avira Clean
Antiy-AVL Clean
Kingsoft Win32.Trojan-PSW.Convagent.gen
Gridinsoft Spy.Win32.Vidar.tr
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:Trojan-PSW.MSIL.Stealerc.gen
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!FA3494703899
MAX Clean
VBA32 Clean
Malwarebytes Clean
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:SY/p+tD3ScjSTXSaasCM8w)
Yandex Clean
Ikarus Win32.Outbreak
MaxSecure Clean
Fortinet MSIL/Kryptik.MQ!tr
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_70% (D)
alibabacloud Trojan[stealer]:MSIL/Wacatac.B9nj
No IRMA results available.