Static | ZeroBOX

PE Compile Time

2024-09-11 14:22:48

PDB Path

c:\5xg58iwbujvcav\obj\Release\'	.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0004d364 0x0004d400 7.99628790715
.rsrc 0x00050000 0x000005d8 0x00000600 4.14474020526
.reloc 0x00052000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000500a0 0x00000344 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000503e8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
w?pvvh
H%&@Ys
s1<e:^b
syfwm:
[C:@>z
e-j",W
;;b]>}
"gdha0
hvYsBg
TQG, T-
6}<ZC"
;gh7c&
Z?j4F}
8hRr'y
u#EB2c
`Qpatj
T>{6B[
?fbq$
Z,}(0
den$A=
o5<p[D
t>jU9q
IXaEO!E
2ptdpb
[dr|lol#O(
okuH0E
z%w7%&>
1H&]&>
8|1Ts5
fiA4'T9
)`@3A'
xt_<X'
NDK+vZ{
:66|*A
kD2IM@_
f;9N!IQ46
eNS[NL
F}IV*l
!o?\q_
B`.. ^
I3AXU(
vpyOaS)
e!(D,gZ
>3=c:+>.
e8IFiX
xH|rU6
/*]Qd(%
WwRaP$
rgM*O}IJ
ziP`Hg
"@$>sp
5HB.zr;
X5I%Ht?
m<xbT"
:e?4_$
0(V[n_
91,|:S
b<#1Fq
$-vxz;
dpD<KH
dB-)Whj
U$DNt'
jy}@2y
RKJ!$i
7BJqpwikK#3ac
9<zooDX
>-m#9*
x.|hIq2
TFb='d
H:uvf3W^fR
:C3naw
L{f!/`
@vn.KM
/rTyiu/
"j:wuA
*8jh*:
YRND0W
9`d.p{
7~"h)@
+r5'2
4=,g?P
mHT4]E6i@P
L\yr*}
RNo =j
e<ky5r
8YpF+O
5f,0JD/Z
kIiQTW_q
'nDW.<V
2-npdN
q^f!GF
HQjG.o
XO}:SL
[C,EaQ
"s@Qn"
mw7&93
bW{K.Q
T"!J.j
FIvbuwVG
tp<n%2
$R~<9EN
TRV}~G
{/2xH`S%
+*yTRe
Z?Vf#
/O8Y$Zo
n: :
{$1_m<
l-*&Ft
e7%_$:
Cb>xfm
Al{{axu
^A8v!_Dy>6
AP`88 [
ZnNx@d
C==q:^
QMYnP|
2P``qc
bRWTPt
>W,2c8
z[>=sH
pauw3u
OE|*:Q
NFVJpw
Yjt6r5s^
_[-<J&v
$Qc[{b,
jYGBY~
mx6/9]
20LmV<w&
vYb*%_(
?tJ]h2
=<t_y2
d2b\X9
Y-kRP@'qj
-R-OC1
,h@z{:
|A vK|
({YFRv
+t)eW)
}cfF= du
1IQ}Pm
7LjCLWB
G]Z-]Sa
p\>QXd
q=&]KhL<
_-6v4H!'*
b[+w~i
C[5?1Nr-
M6,`IpA
fH #T6
3&dJG;
<?mm%?
vaw)D`
Y7UKpah
EaPo@e^
8MEuv-
|*N8$)
ES1$17s
@;}Iey
5V79x]
KFQ:>
/:c%\>
x'Q6WN
fJn!a|
"i'\pv
pX#7@i.
GReq@7
!QXM+
6,f8k&l
PUJJXhDV
i~](oG
i!4E-yGO
02MMx0
,e@<DV
z*URf!
X[n>6P
) gTwa
-hU5#C
9mB$u$
\_s+"y
8*nwL0
eo5uH{Tm
+0]*Ic
"M2j5^b
E,S28
\R[y_QP5:
<1/,+x
q^,mHWag<c
w%xO_{
N!fmiO
g3[h/8
/:0Xq'P
S|,|)M&
LHF(\d}
xke5H5~
G~9'AG
K@P2'r
FPIp]j
E)H<[]
}=cWRt
?lGJw.
+(k.9+
!XuBh(1
:zU@M}|
x1UAO`m:w
$8IyG
49A6Z&
PGlf}}-
X:PV)$
&|fLV7
fGowj~
r+6z?Z
0Bw8^$
trTWqzr
+BJYR-
\ <$N^
~J[ a?x
:]+8YC
qeXLn(+
KA}~ng
-7zt)D
mQu4!wA
3?)SMo
%28j(PJ
enX/}S7
y/AJF*Zq
Q!n(~yp
YE2a4|
T5E\%Z
H^51*I9
)GGURy]h
<*:jTK>p
1`!gjB
~3:UBE
<9zYai
}qC7DZ
;c'%C9i
(G)2\b
d 9KQ,;
6]+8Xl
0#iQ9
f7Cu)f
bC1OOg
!rh5lWC
|QInv4&N
n)G=<%z
svPe.x
p3y_1B
v!Nm bu
8@I!G&c/
Co@BF(
C|sB=*A
a`;bjQK
L2I)6@
'<W@[>
^?ept|
XJRZy[
`v?$58\T(
i2:1Yc
wtp yM%
D'PxY/e;
e0GStoY~
L.J.Jc
8?2&Bs-X
e/|];}-
kNB!r
ghZ.dB
lHMBCvq
b#6zS*
ZT\c)h
=qFP-I
od3cQVe
O.fnMg
k{z;4.c
RNT&TB)
[oI]rr
's-'*X@|
w;ILG@
a"/+]}n5
w:]2|'rKv
?6by-*
V!V|_;
lx'N|7
pG<W$~s
l=X?v|
zyROCN
+v'~=z
7R~cVwg
>&Q<Hu
P&RlgP
jk !As
Aq$Rup\<{
%|Dso*!
}JA<sA]
B[3fOq
@v^O!
29)=:5
:Xd!Jv
{ZA_7z]
UL9U^
Q/]wM'b
{mZa-9w
JpEX1tEb
s'cu<N
j1D'PO
V%=04A
jhP3E!
Dx8{5z
m\&;*o
#1}uiF
T~"5&M4
6>gMF4=
([^-N;
XuUY=C
R)x>te
\+9|e_
e=-Ms&D
K.h8X^
A6;@_7
sJ83N7%
FC>Qh)
}:E%;!
Yus@;{
;atuxY
[PVmuv
XQ.@^h
1J!,tD
{7L:=/X!tt
hVT]5)
f|.\~{QvQ&
R#t&]ls
bapUoZF
;8a0Z:
v140_Dl
LFM?EX
Rg5e(S
b[U@|
37RAsr
iPZ]R0
=llk54}
Ss7e>
Y<fQfB_
;WE)mr
imb)(k
b!Ppq@
&"JG|2
/C 8}n
P*)H,Q
\RCIp\
S5N+ZxH
,.1n(<
>U64\p*lT7
G2r0qk
c[K(H{
@7Irh
7S[lw=
;jt(\)U@
;V0)^o
j9O.Mc
HQ2xh
hdpq3bd
#,AF?C
N;3G|{[
\BhL`m
q'@69"$
j+Rj^W
72Zp.z
dS}z4
>Am&HA
'fO!M*2
6 HOst
4{*^2:
ptcxQ*%
!w;Q[!
BJsqAs
pi\WR0
(:/5B<
{Gj(['g5
;FcfhvN#
s:48[t
j0+E Z6@*
0D}h1:Sr
zod<E^
|1Pu~"]
dF[M.oU
wyib;*
^:*V!2'
V51tP,_
a4NTz12~h
HQ)u`f
H}q;{z
r5RvlS
Y-R:2~
>l'vo?
[8:*oO
;R;KS_
!B9f%
\{^%3 Xo
rEl#4S
dxm]lO
bsZ!nR
Qhl}<>
+6xo|;
8R!m^,
<4GA01r
NiECL7b9
F-f6G[
O`;M?D
[y<o$7
=Ta6V|w
cc'A&N<
+KAlHV
HU#YFF
X[!C_2O2
)^vm-O
dZyPi[
*W9*`j
BH`@y1
r{L^*|
U uI!+R
j#JbUo
fU8C|x`
Zs,zuPY
"]lD6=
.hQC^t
DM<iNy
Q%hChK8
]ZhE,2
eB)%CU
/`2v=[yQ
NJq[^m
u'p.WoB
JG_.$Nny:PT>e
nq~S^DF(.4@Y
Lmr,!Gxo
F]I>sb?W
G3y;k9
m&%MG
B3!y,J
4-?aUg
Kilny5
&i0Ym8
-[A36.
:Iv\9*
<+#7eD
Vq*N`O
A2.@w5H
<dMWQyv
t\M/xw
f%AL<;
=;7CYS
F}$w=a
^cY|}K
Rlh(m;
**by|(
H"RL2+
"CxhQ"8Q
_uy>$%u
o*gat6TS
oPv,g;r!@,
4TB`DH
0J2UXD
3^~mp8
XHrd1
{!RmIz
6i\EJ7
iFY$U=`
<Lr8obd
.0jU$g
3S;^fee
UT-.&Y?
GJ/24'5ya>.
><NhzuU'
YurAqdD
b:Ogv,
dDW;'x+
]-QYn4
16;y1l<
"k`a+`
A$4(QZ
Vb5AU;
gZIK-Q
9y:d^AmD
vd&Okqx
/_nUuo
{u\!WcB
FDNUAd`
9@)3<Z
ecz@rJ_
T'4bMj(
gJ;@k7f
GArdpj
;L4C1{
`0tcG#
?^c>I
gm21ext
03V){[
r'~g2g
tdA M]L
;zRm5S
3rIfqz:
W"a~18
C]&l7f
*:v6(t*
z;5-yb~}9
-Qe J~_
GBfj~3
`<e`-5
}mFr3fj
/w7_ie]
,{Cr8a
JA(Zo]
JRQ#8+
2'KqZAs
D>bLCxo"
H]oX}E
bm7/>F
-zJjfc'
>X.jl G
jsqT5QiK
IgdmWC
a.$C-5
v\,B"5Q
c5hi-
t;k5@as
{{J?`n
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
AVP.exe
MoveAngles
KAJSDkjznKLjzsjlkeju
JUOAHsuihgsxujhA
Program
mscorlib
System
Object
userBuffer
System.Collections.Generic
List`1
AcARemote
FreeConsole
VirtualProtectEx
GetProcAddress
FieldAccessException
IEnumerable`1
CallWindowProcW
GetModuleHandleA
IOUAshiuxhAIUshiuasiua
AIOsncoiuuA
fdgfreds
ZAzsaruik
QAwtykuil
DSsdsAsssQ
ASxcgtjy
jikoxzaoiu
zkANsniuw
Fgtjtyu
ASvZAqdr
fwergtrh
verfrew
wedferhyu
moduleName
opAJKSioknzAOJI
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{E0787E87-093F-4AB4-B673-087A837D6927}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x600000a-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=310272
$$method0x600000a-2
DllImportAttribute
kernel32.dll
user32.dll
Console
WriteLine
Convert
ToByte
get_Item
Random
System.Net
SocketAddress
System.Net.Sockets
AddressFamily
$$method0x600000c-1
__StaticArrayInitTypeSize=1196
$$method0x600000c-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
dig twiddlier keeks
diffident kerosines
walkouts dashboard
postfire frolicker
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
RSDS?X
c:\5xg58iwbujvcav\obj\Release\'
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
)uT1uT9uTAuTIuTQuTYuTauTiuTquYyuT
ZAdrfedhytjty
Grg543efrefcer
ASfgrghtrhtr
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
diffident kerosines
CompanyName
walkouts dashboard
FileDescription
dig twiddlier keeks
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
postfire frolicker
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stealerc.1m!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Pwsx-10035189-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Trojan.GenericKD.74098991
Cylance Unsafe
Zillya Trojan.GenKryptik.Win32.953813
Sangfor Infostealer.Msil.Kryptik.Vsgf
CrowdStrike win/malicious_confidence_70% (D)
Alibaba TrojanPSW:MSIL/Lumma.fea26fcb
K7GW Trojan ( 005ba0eb1 )
K7AntiVirus Trojan ( 005ba0eb1 )
Baidu Clean
VirIT Trojan.Win32.GenusT.DZFZ
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/GenKryptik.HBHS
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan-PSW.MSIL.Stealerc.gen
BitDefender Trojan.GenericKD.74098991
NANO-Antivirus Trojan.Win32.Nekark.krpmgo
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.74098991
Tencent Trojan.Msil.Kryptik.16001398
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Nekark.oizny
DrWeb Clean
VIPRE Trojan.GenericKD.74098991
TrendMicro TrojanSpy.Win32.LUMMASTEALER.YXEIKZ
McAfeeD ti!863C177542F9
Trapmine suspicious.low.ml.score
CTX exe.trojan.msil
Emsisoft Trojan.GenericKD.74098991 (B)
huorong Trojan/MSIL.Agent.li
FireEye Generic.mg.94c5abd0eccd7784
Jiangmin Clean
Webroot W32.Trojan.Gen
Varist W32/MSIL_Agent.ILW.gen!Eldorado
Avira TR/AD.Nekark.oizny
Fortinet MSIL/GenKryptik.HBNC!tr
Antiy-AVL Clean
Kingsoft MSIL.Trojan-PSW.Stealerc.gen
Gridinsoft Trojan.Win32.Packed.dd!ni
Xcitium Malware@#3fwfi24l48yv7
Arcabit Trojan.Generic.D46AA92F
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealerc.gen
Microsoft Trojan:MSIL/Lumma.MBXT!MTB
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5669147
Acronis Clean
McAfee Artemis!94C5ABD0ECCD
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Crypt
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.LUMMASTEALER.YXEIKZ
Rising Malware.Obfus/MSIL@AI.98 (RDM.MSIL2:9pOrkwsxDYvGBWBQ9qifiA)
Yandex Clean
Ikarus Trojan.MSIL.Krypt
MaxSecure Clean
GData Trojan.GenericKD.74098991
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.