Static | ZeroBOX

PE Compile Time

2024-09-25 23:50:55

PDB Path

c:\rje\tg\4avm\obj\Release\e.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00061cf4 0x00061e00 7.99607616973
.rsrc 0x00064000 0x000005b8 0x00000600 4.11412643911
.reloc 0x00066000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000640a0 0x00000324 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000643c8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
[=+ jCJ
K{6}jb
*OYox7
kyrRO!XI
Ie@G>K
k-4"`k
%w^q{Pp
COpbgi
n], No
$sSp(F
9)ku!n
rppA6E
{6p&h3P
a3}#)/0
&hRZuy
kR)~%*
tE7]7U
36f75_
Fj t{-
Yv[n'\
"5dHmR
M+a(l]*
e'vwJL
xW{#O?x
?Ghf4)#|
HD1S&%>)
jKIG=~
`qZ ,m:
f"|hJ[
x=GMU.
u/&>IK
3w^+L=i
ekhX{e
zeUK<c
YX 8fXe~
`O2n\4
b;U+Lc
\^A[c1
N&zciDF}1
Xvis0#pY
Zj1E5!
Suw6WA$A
LB7+_
qlA"S0`
N%j+!z
hT{GsX[+
-bX0MC
g\H$1a
6oR\tn
jK3Q.]u
3Owx.=
-]\oTv
b,O4c|
"7y}6.
_{fC"F
1sWx.i9t
<K}MHv'
w2Y=:S
FLi[ea\
Wyx+9A.
-~X8^Utcr\yqIG
^_fuk@
.xb!@%v
#K3]4}
.sL+OY
}2xO*J}!
|FX*kO
ZO,( \8[
<;za;BH
CXpR|s
4%\W\7
\qf<qZ
efe9\HZ
DZMIc9
#D ]aYj
c=^d`[
wu_[xq
jD6f=7
w<Vk\tRE:T
C>3fs8
.vuq@)
e]9!=z
wi~ZMB
B5*qx4[[
H|ZRMF
_!'ffm
UE|rXl<
>.GV,)+
'jO!KM
KSkoxmw,O
JZj>R@3RvQ"A}
aV<xE.
PSRp$,
;PoC<B
.@p3il{6
iye`;#
%O`CniP;
/Y|NQ
RHUZOb
g:sH9)Q
v3)%h+
McY32g
xR$jUu6p'G
}b_J_l
<]#IZP]
)2?1=>i
-%tV"D
yZr81=
<D"Nzg
=NQ[,
/zd^>.
ET.N'xg
/5`n%Q
0/cRT3
t`%D1"v=
dTZo`-
eMZ|A2
}<H7rf
RH.t>_
3[]4E[
p1dGvx{!G
T#+e@!uM
1>cydb
2*/Y<b
e5{v7@'P
3f,A(Q
0zPnzF
ebW`h5`
1K!(w#
}szaki
Z+7";9
mXHM=wV
`DAvJ'M,
y?BPlF
uN9@9o5
A]#\;k
O4WoP*
OX$BZ||:+
`>=NTx
rw>7P
@q-}RW|
_[{das
.|:PG#
^&zD[o@
cce/MZ
<T#[xY
$l0rjx
B@FdKG
J>p!>\7
GB0aK
joO%I7T
V{`3z=x
E`q!X~
G&K8e5
0S;s"EL
jG,G^A
=q]Mft
E$q9HL
2q(M%'?
TSY|L/
ZND4Z[e
"4+IVK-
DZNNU15
si|I\y
t09c^2
F*I 7Y\
F=H^:9A
1n@z%j
)J-qap
IDtlr<{;f
aubj&\
UVmJ&j+q
B.41yn
=3?R5.
3"9-A$
i^B><g6
YC.ah:
=s*9>s
,Kw,iP
F.bfA<
3eim.|
2wCZM`
WT&e+e
vDC2$e=
K**jU/
t)23jL
RH[s,1
hJ;}Y'
6emL'
B+`vMRi
=)[6Ce
7iSvIm}
xK|\<v!
!V}_,U
NQiPccp
$lVd2
k= zn)B
XnH K9
hSj^YxUbs
[9(i(>
)1LkIa
jI:Iw!
f=I!7%
D\'$3C
nFd}:
H/Cav)
x'`4GD
Q6KpvO
9UELma}
ueE'g[C
S2#7c0
qnm+KR
;1^!z8
Pq(utd0
A9x-e+_
q\/0aw
by5wTK
iw/;ix
XhjeUe
h_E<lh
"!|i4*
cR$xJN
Jlhp*yV
ApFe>j
o0irk
+N4r7,
}w>7[{
nYis-L
r&Yxp
q}DL4Pi
cI%g*>
\S|qDD
xd L%f
z+l Jb5PB
N[q6 ek
/^oxq#4
9B527px
1<iKLf-9'
ymv:.bn!]
BxktE#
8A@ay{
D=cPs;
.(|Bz#
(_(>M!
awR_TjLE
$DC }:
.n@ Se
"BU!HUA
gwvnRE
qi*6!5r
#>,!Eo
esoC]+/
TNhOB]
8syU%L
LRA(G)
v.z/Qh
8(OS$y
B\deQZ'
U~NQ;L
'|l3\TA<-
4q,)b{
03Eoem
Ii>hd-
G4Re,O:
9e!=BZZ
~jQVK5
XuJ6)f
slzIAT<&Z|
>BqV|db
:Ex\}`R
dkH"ICq
kjdBLi
F!$`(rj
sKtRD.
IFZ :B
L^-d}Z
b)nrX.
QX.QhK
0x*Z5=
Z&2l%<
GIEK~K
F{&F{F
D\0,j)
;??c`^@
L~0nzm
+v`EsOC
?}[x7o7
^u$<(1Fq
JWWsOG\
<unNg?\R
j%Z]Fk#
79.Wry
)<W0+c
-9yO3uq
eFFL!uxxApM"
:<xOU\"r
ecPt@{6
&RB\6f<:
Y(T<I(6
k~xxFH
(?b/#""Q
f_%r-=
CD_gG3
Y$mGRzasO
uku$',U
TP,|Y`j
*/;sH,
UdzIcV
O}SAgz
*B9OXj
U0{h :
8gQXF
vNWR(S
?H{^i@
VdO_1OW
nPcJc:
aIp#myRe
Yzd*)Aa
[11jnh#
+/>\Hb
#5'yP]
SjW`C_H
&qr{; TA
YZ:cH
xO>{pU(*#W
;\Y8/}
{9%`]b
Srg^>e
`KKIq*
Ior(|?
#@HmKi
5t^F#|/c
Xw?4NAB
Nu6`TS
&5d|g#
>k,>i{
'j6%v]
pM('n.x
|TedAA
i#Lz\C
*3F{zc
kg/shYf9Q
Yb7n`,E
vt\8Za
.gqT"e
/vJ|mMLs
x`;9q%e
A'h[ct;
WXJ888e
@dY_+m
/j>bZ.
6OA>L\
$}}9I5J
;mC<w3
.LPyPd
PwlV7a4
=Ls2bH
9~?R&_
Ab=PMpzu
CF2eLH
ipoj8[
m3`B?8
GQ+%\EV
$L4^<??
OvI!|w~
,905Z-
z<,}?]/f
;OU0vv/aJLY
MO5q{Zk#
qIk$Ry
>v*sld
[TI;[5
p]R>73
%e8.yl
LgC{y#nu
ysGXG+y[
r"/=k%
u?Y.l9}
p%f[Q,
aqr(H
;}/`/sl
4N}HBx=
)z"Sh]GY
u56!*[
BtVx;'d
N4(=7(
N<OZo)7}mn^
(X2e+07
;"M]&
L3dY8
7:{lI8
,(LSqk
4=-q=f
kaI7FS
k-\;&Bg
/D78hf
1}* uE
_oMCY:
vnmu}R'
*xp!`U
V>hWZ
sTX2G
PU8;H@_
jDY*kf
-='DSN
Yp@DZu++]k
SIQ1Ab
uR07ddh
%AdBp?
M#zpID"
%4Z".G
k^'!bq
E]\xe,s{
p~?pTw
apxgVi
?VV;%W
FiXKJOa(
S!xxy@0
_5tG=gQ
@8&/fsk8
HSOs {
V"!sQm
^e#;i|
/vjJ-c
/d $en
[U~Zy9
A~-a=d
,QN>j6
3bie|&C_P_?
\ZL>}U
g#\z=W
kj*lOb
T @=RJ;
dyH;US
i=0*|V
|~Oa1L
xtnZc1
D(r9_>Ty
wru*;l
A}v"3$h
81PV_}
$0An|!
u":A3=
\'p"!g
XO't.-
U">V(s
%T<zh1h
0d."QU
$I3h3Us;
`xgP^x
w`S}I^
ddCl+_
N9g"o
b\oTBS
#jzK<*
K<dCx>F
mnAxGyO
#[LA+Q_
/.@;c[:
OwHK,>
3\;6C[
q<nVN<
I#l("U
Pp)M&;
vj2^g<1
iTc]a*
Qjlq6[
`}? EI
kbM~v0
!a~DW'
erg*S^:
j/7/=S|
u@1HA/
#'SJ;[
#/kFc|#
AP*D6+
{M8oR|N
$(AWPK
/ 6S[a
j</Bg?
JS?GL$RaW
k+P^(g&
Y"j;R\
4X(d7hSH
8vHI?&
`y}+V,
MeiG+T
!0^bk8
O)4h$o
!~s6kkc
2L1c L
m}IaN;
N\=YRz8'
9e+aj*
:O7* :
TEM!/fD
ED_3M6n
8&aJoHE
*~/D2<HS
Tdalu4
AJwY(B$|c
{7Y2v"
1osO{
?ofB a
!('i'i4
haN8P$
HtP,|I
O84 97b5
{QzDz%N>j
'R*-^jW6
G5'*%[W
hcwQ|t
*gqvei
2meVf2
x}VGss
bEeHP7
qib:Li2
,A`<;&~J{
}X{cD)
7-x[TO
sedkDb
4h/R4"Jv
"vxZ~~
"j@]+*
~X&;we
&mGo9T
v)l.#o
.E9oR[+*DT
1Q3>n 8
xv{uR3\5
'iY1H8
e75OYyn
'>~2%i
!79N+6-
T\8{,7
7] ig07L6
vV<4p3f
`:bbr-5>
hQ5f/=
[||!kNf
-A+M3g
1P1Ul#
<\C,Hh3
&h(l[e
CuGT:g*J8
;Z.~RwW
tbmdWC&:
+p,=he
:ndGDzAPkq
3_X:-i
4Q|Ahm
>4l5l(v
BP;r'k
jb3D,:
||rka/
uwX1-UX
01EK:]V
9]&UA&d
X=r_<J
?mf]^jY
9!FtA5
r_5z85y1g
_g5{3O
LVeUCm`
1m7v7n<m$0X
a({34
{O<KdJ
8s#/gP
vbu+U]
Q7ay/<d
:Uvk:A
4$MhS2Vp
;`J(w@
qR=gu8=D
7g[JXc
NRDKH.
A`}ZEN
n5Q2fL
lE|Rx/.
_z{0H2;
PkbGky
](UvV_
WC-u^O=
R~d7g<&
(C7"_B
w[ "]k
c3A?$\
*1:D,u
k:JmT-
%5I(Ts
5BpD@5
Ey+%C
9RB}D4
3SVc&o[Ml
jzOA4]
)Rld3I
K_="Sb
[iP\4>
8m/8&O
?vE`T"
1HM_v
V[\h"L5
i(6Nw
^w83NE
b%o!81z*y
Q;(|tj
HfDju8
&3PfUVF
F|1|d<
lF-wC^
WW7<z?
,>by&b]0
~]B$qk
t+5Ij:
nhKZ$0
_+o-&g)
N?i{4^
stm!|28
(.1%?n
<2&=`V
:H'bMW
b9G(4*
p}Vj&
>/'`ZD
"A~W8I.yJ^
<g2Z6k
J5[\f,d
zn/JF3
5J1SG)k
[v8{1\I
0$[T%k;
N\{[Xw
~kwgDx16
vB\K=F
\hT+lo@
c;&>^{
Wx5\SL
y#_qxq
ms4e{Ui
>oSoj!LC
G$ve)mR
Nlg.Z~H
NFwkB#
bZD~@[vl
j8I1v*
-1Fb0b
:*b!@*
W${(8Vs
&~#cN
u.Cn,~
PZ\p>e
vQ:G6z
(-]2ll
@y2r}D
4u+X:-
OcZ]wKN_"
oxhv_;
Ifi}(*
^}bsWw
o-.0Hq
|lQ[rSYC
,kWd*/
zeW[f-
!HyZ0Y
\f|Kuo
Al`"Z(
lv@R!,V
eJuT1=SL
&Z*3.q
2E3-M#
j'"Df?!
@QvF-V
P~QFdiL
7Bf!cR
)3L/0
$ <1i;
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
GCM.exe
MoveAngles
IaunjsklsnxbNZAiaq
Resolver
SAdrewgrtyjr
Program
mscorlib
System
Object
MulticastDelegate
userBuffer
LaunchDataValidation
returnNumbers
CallWindowProcA
SetAccess
_founds
isAvailable
Invoke
IAsyncResult
AsyncCallback
BeginInvoke
EndInvoke
FreeConsole
GetProcAddress
GetModuleHandleA
System.Collections.Generic
List`1
PersonalActivation
AIOsncoiuuA
GetComponentList
dceafre
jyrgetr
DSfdwertgtr
ASxewqrw
SAWSadew
founds
access
object
method
hrtgrefer
dwedwe
fgercwe
jytryhtr
frwcwedwe
callback
result
moduleName
funcName
uiOAshyuxgYUA
manager
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{C2ED6BF6-AAD6-4AAB-A1D1-7096F8B9B858}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x6000014-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=393216
$$method0x6000014-2
Console
WriteLine
DllImportAttribute
user32.dll
Convert
ToString
String
Concat
Exception
UnmanagedFunctionPointerAttribute
CallingConvention
KERNEL32.dll
kernel32.dll
TryParse
System.Threading
Thread
System.Core
HashSet`1
Contains
Marshal
GetDelegateForFunctionPointer
$$method0x6000015-1
__StaticArrayInitTypeSize=1196
$$method0x6000015-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Sorrowfulness Uncompetitive
Asana Metallize
Technic Griff
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
RSDS6mYk
c:\rje\tg\4avm\obj\Release\e
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
Available updated:
Consulter
kernel32.dll
VirtualProtectEx
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Sorrowfulness Uncompetitive
CompanyName
Asana Metallize
FileDescription
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
Technic Griff
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Clean
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac IL:Trojan.MSILZilla.146906
Cylance Unsafe
Zillya Clean
Sangfor Clean
CrowdStrike win/malicious_confidence_70% (D)
Alibaba Clean
K7GW Clean
K7AntiVirus Clean
huorong Trojan/MSIL.Agent.li
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky Clean
BitDefender IL:Trojan.MSILZilla.146906
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan IL:Trojan.MSILZilla.146906
Tencent Clean
Sophos Mal/MSIL-WA
F-Secure Clean
DrWeb Clean
VIPRE IL:Trojan.MSILZilla.146906
TrendMicro Clean
McAfeeD ti!D1BD0C0A32F1
Trapmine suspicious.low.ml.score
CTX exe.trojan.msilzilla
Emsisoft IL:Trojan.MSILZilla.146906 (B)
Ikarus Trojan-Spy.LummaStealer
FireEye Generic.mg.c7f95fc671d7bf1b
Jiangmin Clean
Webroot Clean
Varist Clean
Avira Clean
Fortinet MSIL/GenKryptik.HAXT!tr
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Trojan.Win32.Packed.dd!ni
Xcitium Clean
Arcabit IL:Trojan.MSILZilla.D23DDA
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Trojan/Win.Injection.C5674188
Acronis Clean
McAfee Clean
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Malware.Obfus/MSIL@AI.88 (RDM.MSIL2:+J4G/rDJf67oO1nEN+s6sg)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
GData IL:Trojan.MSILZilla.146906
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.