Static | ZeroBOX

PE Compile Time

2024-09-15 15:11:07

PDB Path

c:\iua6f\obj\Release\'	.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00043b64 0x00043c00 7.99399216573
.rsrc 0x00046000 0x00000608 0x00000800 3.415678331
.reloc 0x00048000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000460a0 0x00000378 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00046418 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
%z)7|6#
6(+1QK
9z+!Ck
(11KR~
K {H<L
cbEA{\X<J
'@d?Ga
3+~)<:
I^Z\Tm
-r/:B>
2]iQGv=X
=/QWg7
t7{9<v
kQFs=>a
)6$v6A
>1l'2G
3<"pxtU
Qt$c2/
lvW/lA
bucbEo
-#=?b0
8bE8*V
{JD`)9z
}2RjFnF>dfN
G~dC%eKS
Eyr]G>
_mbd&7(_
,^+*'
N{SK2|I
"t7734
"owy\}
3q$CV07ER
X,kVEv:u
PE|5a#
RB=(g1
|"WNuV~
-?[fvP
bzB?hO
D0q[W
Y\R4*41
nt<DQnX
{aa*U~
nVtceru
,B,u0|
Ez.)m/&
*Ud`{u
(=>I_h4
$qA3yRb
WzjH]
'UYO(g
,~xvaz
},oAZ3>
>uE)p7Q
8.Ya`"@
F1j8Bo}
kwB!^{
a`Nt4>
uZq9vN
wB9KkI
E\ZgZdv
dP3>kl
7t8guz
)2VDS#f
SzsXp)0
B,Ts+o"D
4erU%G
n$hhM1
8KML4T
epz^U
8ry'_L
Yb(OpO
YM!DUh
!6MqR1q
6/pZ|F
$?f.LR
'WvBk
8E%w-Kl^
Zctk$v
Xx v!wks
J@{)&l
B5^X*z]o
K'3XM7
I1QJxL
`/AO$Bxyg82
nm-M'[
}\z'D#A-b
R5;}MExan
]fE>gd$G
Gu,T5j
>?Q.n7
yjm*"6?
.%`7f*
8^ii45
i8OK->
h gx0y
r[=ZB]
@6&]]=2H
qJ J`|u
f#E]%
o S413
V0_MT,
OLrR;d{S|
w)p["y
2&jeZ
<L}r."
mg;.z/
wV8\,o
z&IP]8j
Wp6V;_
*%4Fc/5
rR/tQs{
UU"d/
iM}[xE
<;7!N_Q
o+['|3M/
,r<gf
;P5e"<
%}8KaU|
z""lsV
]qq_b/
kV=;"li
/8lj8t
}*i1_EnM
?y/lb!
!&YLAH
\`?MW+&
.e85V<
$O^Rz_8
k?%zX.
${*1jM
C.r}jx
2e6o)22
I+cB'X|
)1ed[a
o{x:6v
TIK<h7
S~2NNC%)Eo
v(+8BRQ
22cs}?
tiyZ.W0
D)V1\PK
fU/#2]
C,'UmR
*@pqou
12@@-O)N#p
&:;Rq8
`c@T\/
An,S+m
3h3DWJ<
%T"n@n
+BRncB
"Z9dI'M>
/e<U)4
|MuxSQ
MJ!;m[
9i=/{G[
7(d8n,/S:
Sk~;e@
i^KF z$
#h6kXn
rVsb~(W6
ZRhu0>CE
e+i'{-
\xzmIue{
)f5#OBPN
L%f?gu
!(0E7\w
fqXx^J
^QcJ6m
l_Kdu
MWRj+0
~e;,K<KK
!(?mI-
QIf+4NF
gb:n5Q
O(Tv]MM
+7#F5;
)?<,h
$bW]"|
6,9ID~
.f Eu~ks
,oqU|'
+D3+1}
IMOAds
k\+/j(
F,y@{
x`dX'Mb
0>\CFUr]
VE[W#U
n&SQf:
$K-pBD
Sr&B|-
kr$%]c
3GYx7'
90F1z|
;}O,y.
.<b=f5
&nRV-.
jsP~:}u
_I!1#SeM^{
3;TM,r
1CqvSZ
m%oS?y
E;&yct
,6l_?z
t8ro{O)zV
)fSVD6
[!B_D\
"6f-DR
/#~*0zC;
Zr$^'<
V $b"'gm
!EAeKr
E_BYz(b
yk@(-
5-M8fi?
j?%Y!:
/3r1tD
/WBIS*
6tary=E
N_9DN[
LZLS!F
3|~+o
pfw'O3z3
]ROP41
2`r_B9
oX7bwo
rRZ) %
~bI5ov
cOO)}r
A09Dj-
RfTB2
:O3hE9X
T k<0mm
ItLW@w
CciS@}
W"dwo3SF
XL-4[!u
IQN`BH
FL$V4v
F1f~s*
nFR_j[
p7f(x)
% s>7
dz[029d
LKM*|p\&
x,f(37
;u~EMZ
D70UX
Z6Lt+5
)/Lk3=N
q-i|2)
;Ek.>Q
g/Rsl3)
Q"l<>Ks
;!8;'
{nXx=N
R8c]>j
=Ma_m]/
~)cQn)
TEO0iU
X 50'
U^z$t7
0|id@9
s`V%8
k9\9>.
3I4=+x
B S)>C
R("!S8
'b#A\K
jX<l=S:
kZdj@`
@pz&xj
;9fd:'
Q]D#A%z
iFZFE|
-kWk5%{
%"JJ'S
%3k40M
'GAw2,s%Ony3
x',Y;,
(DC^55
6+5.=6~
Pt4Ppk
nL+%,&
l(pNKR/<
E&h(vX
#9 JN(
SBl9.,]
oB?|}
Emy!j0
5rgw]f1
eZX[[}
<t^kxE
v* sj\s
{NTy<,
2WiGcv
og6zkFB/
/Bu6o(
cKOuxK
8tWWy:
ffVC>w
b2i[g3
f5_[x9
ZRCuIU
emZ5wa
K7e-KE
W}4"94
afDhMA
5TX\cO7
,T.^5
yo.^|3d.
d0cZ{K#w
#!hwQ\
E^wcjQ
#i?f5GpY1
1fvY9A
8`"y[T
:TN|u?
tB42vi
ezjWsVo
o}tGdQAO&A-f
%T#8Wo
.6Lx:l
FKT[1Cp
Oa_jk`
'6o%I$[
69xY\
t2NC6y
(cE2mt
n~-P;gf
V!sEP6
APB7DX
X#-k;if
BS}:\yKk7
up/Mbo
uON9_8
Q0oTa4
%IH;a,
1)*2Uan
$:vCej
3!WL>F9W
A^@j*K
20!dz/P
Hj1viLf_
bc|p&v
0x(Zw0
n;Q+*"
$r@%DV
t,A_tH
czt'_+0
@AMe.#
@l)MuY
7! rI $[
-[~<tF9Q=S+
ek+\mG
q* Zo8
7'(,W4S7oT
d2ZeD)
!Gx3ss
F;@>y~q~
pB?Qx/
4jlHBU
39Df9I
;?%/t4A
X5`?Z5
!/66u*
2|m07ir
&%Ds|c
S|5C3;
t;#Mwo
Gkpd%e
{=UWY\x
L^'d|n
;NI^X{$
=DUHBe
tWi23z
e{_1&
G#}{@r
gBY)-5_
nH8KB.
QQX'-4S
hbt>ET
QZEpo$R
jI[e`I
:hv2uA
vGyPA
uDYQEJI
M2MMh)
ns^whL[
PZ ()
-@P,hv
\v&)W~
D;f2})]
vj8GL&[i
kx3"wq
@RH|r\n
J?Sam?
E{cVKo
DgAd~
95{"BM
bZJ`Q
tv(7]G
4IEkpG
*+ncst
vF'0rq]u"5[
aJeZ^UXbM
eb`6]7.
z3xcE:
?Cj0Mh#
0%q|]r
+M(pc>
}\Vp_a
)lVUm?Jl
o"ro%V
W(9{wv
5Ek:Gx
*1{=i
Vyj:E=
3I_fOl
]U}7o+
Wkj-4!!
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
AVP.exe
MoveAngles
Person
Program
mscorlib
System
Object
userBuffer
get_Name
set_Name
get_Age
set_Age
<Name>k__BackingField
<Age>k__BackingField
FreeConsole
CreateThread
WaitForSingleObject
VirtualProtectEx
FieldAccessException
System.Collections.Generic
IEnumerable`1
CallWindowProcW
GetModuleHandleA
GetConsoleWindow
ShowWindow
WriteSpecificModules
AIOsncoiuuA
LookXuA
ioAjsio
oAskxnbouiAOis
ioAshibzOAoa
QoewnxZjAbqui
IOAshuiochbiA
Qxzffhykul
fdgfreds
ZAzsaruik
QAwtykuil
DSsdsAsssQ
ASxcgtjy
Fgtjtyu
ASvZAqdr
fwergtrh
verfrew
wedferhyu
moduleName
iAHSuihxiA
AsinxIZAisq
ioAHsiujxhbiAIkao
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{6AC4E21F-E48C-4461-A9D2-36A5FB26CB51}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x6000012-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=270336
$$method0x6000012-2
DllImportAttribute
user32.dll
kernel32.dll
Console
WriteLine
ToString
Exception
Random
List`1
String
Concat
get_Count
get_Item
System.Windows.Forms
MessageBox
DialogResult
MessageBoxButtons
MessageBoxIcon
$$method0x6000013-1
__StaticArrayInitTypeSize=1196
$$method0x6000013-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Gastraea Bouillons Redresses
Treeless Redeeming
Siphonages Apomorphine Paraforms
Horsier Avitaminoses
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
c:\iua6f\obj\Release\'
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
Person
ZAdrfedhytjty
Grg543efrefcer
AsuihxuA
AOishiouxcoIUA
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Treeless Redeeming
CompanyName
Siphonages Apomorphine Paraforms
FileDescription
Gastraea Bouillons Redresses
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
Horsier Avitaminoses
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stealer.12!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Msilheracles-10036160-0
CMC Clean
CAT-QuickHeal TrojanSpy.MSIL
Skyhigh Artemis!Trojan
ALYac Gen:Variant.MSILHeracles.179737
Cylance Unsafe
Zillya Clean
Sangfor Infostealer.Msil.Kryptik.V9wr
CrowdStrike win/malicious_confidence_70% (D)
Alibaba TrojanSpy:MSIL/Stealer.43fce5f5
K7GW Trojan ( 005ba0eb1 )
K7AntiVirus Trojan ( 005ba0eb1 )
huorong Trojan/MSIL.Agent.li
Baidu Clean
VirIT Trojan.Win32.GenusT.DZIS
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/GenKryptik.HBHS
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan-Spy.MSIL.Stealer.gen
BitDefender Gen:Variant.Jalapeno.18333
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Jalapeno.18333
Tencent Win32.Trojan.FalseSign.Psmw
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Stealc.xaclj
DrWeb Clean
VIPRE Gen:Variant.Jalapeno.18333
TrendMicro TrojanSpy.Win32.VIDAR.YXEIOZ
McAfeeD ti!E3B383702D57
Trapmine Clean
CTX exe.trojan.msil
Emsisoft Gen:Variant.Jalapeno.18333 (B)
Ikarus Trojan-Spy.LummaStealer
FireEye Generic.mg.95e56babf9f2cb4e
Jiangmin Clean
Webroot Clean
Varist W32/MSIL_Kryptik.LNK.gen!Eldorado
Avira TR/AD.Stealc.xaclj
Fortinet MSIL/GenKryptik.HBHS!tr
Antiy-AVL Clean
Kingsoft MSIL.Trojan-Spy.Stealer.gen
Gridinsoft Spy.Win32.Vidar.tr
Xcitium Clean
Arcabit Trojan.Jalapeno.D479D
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Spy.MSIL.Stealer.gen
Microsoft Trojan:MSIL/Cerbu.AMA!MTB
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5670639
Acronis Clean
McAfee Artemis!95E56BABF9F2
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.VIDAR.YXEIOZ
Rising Stealer.Agent!8.C2 (CLOUD)
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
GData Gen:Variant.Jalapeno.18333
AVG Win32:PWSX-gen [Trj]
DeepInstinct Clean
alibabacloud Trojan[spy]:MSIL/Stealer.gyf
No IRMA results available.