Static | ZeroBOX

PE Compile Time

2024-09-28 03:33:02

PDB Path

c:\rje\tg\krx\obj\Release\ojc.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00062084 0x00062200 7.99603377873
.rsrc 0x00066000 0x000005c8 0x00000600 4.11602213463
.reloc 0x00068000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000660a0 0x00000334 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000663d8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
!N7=5)
HQ@ybS
^/C+r1
C)}hlz
1*)!ti
J;f#V=
<T> k7G7
>+n*7%]
W:Q`"3
";ZeX)
+vjr&9
vF1'i~
8(3+k>
iT6Bu4H
sg5K!8
Ll@/+s
ENrib
\8WnC?
\GR+N2Q
vgJ( |
|PoTs-
QaEz']=r
98|}-l
Wyc 6A
=/][g$
[2G<Li
nlj~}L.
u;FzS>
)0wAIPP
R+~Q'eY(
Z8G{m8
:!n}8^
,ltWtRx
Q\U}yo
z>Ow4zx
C!gPBy@
,pw}ViU
DxcaVX"
HRuT)&
_v0xL]
30*xda"
[y }l>0U
@oE5}Sa-
XeQ[/6
|@_LvYL
R-^zmJ
cVNusy
#6l9e_
JEPyii
S(e|F
R2:+R^
FG7X6`
06t0D)
^eRgCO
/8H&=_B
6ouXnL
tq"'ag<
BVJee1
P)G_<n
"@CPMP
:AL.4b
B;U j>
}D89nw e
kV@gL)
a.b?'Ov
Xd|~vB
lkN+!0
3c`&N:
8:I_}X
t#$Aq}
;l0[b`
5brVV_
5E+`nD
%cz}P
I+y$1]
C}=KT/m
X(@^,\
P.!S68
WqFxsx
yZIj30}\
,h]Uw9
fm;qnI
TcO6P%
CrnlO_7jO
>#!BM/
^>;YwS=
Tj@rx/
B8Tazu(v
)l@*o_C
!tc)n/|
9y=MC"
cn*&b]
B2rkR D
l-x85}
7shv)U$xP
C@MUY>
0|{,L
(Z?z/n
z(g_-K
uT^mmX
 qPze1
,nd"KE
VWwviq
cE{*,-
G!wNiN_
4PTDO-
,I{^[E
wOnF(lv
_3JgZb
S(|6};
aw<'@@
M@"4YN6G
1:%:0A
vNbU=Y0
g/{=qK
ul8#Ai-
P6;>j9E
YF5:Xy
CdlL|!
^r=\fz
oD!i_V#
nWs<lY9L
NcDX/|
gq<wc6
t`wL2$
pJ%Z=/
=t%Gd8
W:V~q1
\\IVW
o'}Sg&
t^ io}z[<
Vjf:W$
+8+ElL
fmti7d
Y'[ u,r
8q[WJ;@
Mug-o'
K]KK<.Vf
_$QjcL
C2`djj
&/i%M^o
<FQX15=Y
FI\LgZ$
;0Ry9,X
E_}x@V
Cb6Q`i
C5VbjT
Ps7&Eg
[QhNW[
=GPE.U
b&vq|)
Xd|~Bn
)I0.j?T
<mpKB:
;a3+d}
X.3iV@<"
xUQ%sZ
Aa(O*7$
YqHu63"F4
zq>SRI
>6s+qQJf
&d~WsKG'
F-ojdhf
[SbLA\Y
~uM+9J<
U@~E^4
\uj7#UD
lM0Y--
hdTGo<
z5wsq
pd&5CP
tB]yNOw]
0=ewM*d
CZO@7@5
9o3C^;
nH_&1F
xXW/OQRk*!=
P6$K{3s
_|Zs\G7:
dJ\0-s
9<v8DEp+>
]FGHD>
m_/zF^
a3d$lb
i9djtY
Gp&%[C
*H%gul
xLs}?K
}T9r+Ge
RHp|1e
ObG`3wFu
u(L?<b
<-k"}p
3>*+.'
[hNzc
LK_rbp
If{ZE5K
a@em{8
oLTqmh
"pxey}*
LFlBQJ
L_|x:Q
^l=$|r(:
wXYz2(
XeWDbi
4K0.*WM`
S72q7Cq
M)h_jp5_
LsQz!:h3
|0YKO|`
Hm''M
Bf1{}V
>l:pi
}<XNeD
ItpXt`
y'bj%ed
{`C#D$kx
WvaIw<
l6^K V
?bpMGp
X!zu>h
_GL8Xir
{UaW=}
g |;JA
1(x(eb
VUM2za
flc*5.
Qw/uO
oEz&j{p
LGkM\o
@{][;!
:%t.%j
sIc)M'
Pf*vI?Y
psmW>|zi
e2FUPlYy
L|o$.%
OKi)8_
zo/sg=#L4j
AHeB#8
R*KBk2.
zIv;L1
n\*1~m
7Fb|CnP
Eco3Ovo0
(^IYGz
>#d7!`S=
*%+>id
}$Eop_
22;,JqV
/gqT/O!
\sZ:We
0wOiQT
[DA]&<
&n;XuJ
^#DMV=
5.=f0
(PB47*
E-ya,_
nf BE5
%p,hA/p
c'[:mc
'%Zs9`
dUYi:u
H!8+:!
$ot8v5S
*?_(v)
PgJD.{
6>b&^.
%0[=|
3-;G#[
*TDW:2
Ep{dN-
FZ(/!WwH=
zz,80i
P]a+Ub
u^B!J$
OR{-p
rn[DA^
9iL]#)
Z;wV]d
'9UZp~p
scPy%p~
BjP8%j
vf|XtuU
Q1OIO\o>0
3*;;U=+
j]VW^w[
JP2$@3l
+$jei]h
~?%[p}
8J:8Q@em
,41CR
nnY\r$
[U2x#Ju
/oT"\;0
J}cWpN0
yPTF`K
z<8lBCE
Y2WWcQgp}k;>
~qPd]S^
-mdt#u
k148I
ZUX8hA
5^R8vq
mE6$CT
${gg#
(FIgQW
}+ 1M;[uU
1m)l;}y
0i[Eq~
Uaj"_c
0Y=(|*
m8jwr4
=b/? !
r5],]+
LOtk)
+0'J\0
W#kc|5
dpWk[0
}.J|le
G8fx+3x
>0%]v\
@n5ew5"
:*"*N"
zp^(+L^
^"=5CJ{-.
@SV:Al#O
5Za}Wk
MH~uDPy
7r8MzS
q)2B E
7<+0x*
=3'5D.C
j]@;*@
:L*-/;
Km^H@W
VNa\a
=M=MEZe
fe{=U?
Mb6[D-
<p+_q1
=K7F'LT
@U-*do6
c{-lq
&FB'>
f`e"5W
`#757
#<VYr
7t8*%"
olXuzL
'pM}Z$
3f:;|_
ogav\>s
P~h>h)
RZl%sB0V
T:e+3%A
_{mV=f
%v7D}hb
\Tj`Xu
zC>m<[V7
}z\wniq
<pO:lS5
PBk<P@
~m&'f}
ItOal_
nzFeL)
;)W}~30
_9ObX%
p.9ps
#w^LeUcU
l}7{Wi
RFX2VWq
7I1=j~
{QAfDCX
oF4q8;-
eqYxR
</Fu6^
5%f0s{
36,cs|Y
yX(j|o
4*N:~
4eN/Lb
X^:p,9
[.O Dn
%q4Z\aK
d|8@/@
/b!'7rM
uoc`hC
LI^Q/eA6
}k|6y>
\DSD9-
P{N|m
+abS-,
i3OzIh
I%LM9
2YC%]py
>"Rk5\
xGAH}E
}vF/e>
4p3%aL
#RP|'ag.
g~/5MH
g7~uw4
=<_*j_
J#T5{7
!8`QW/!OC2wo
TnJ}p#1
'RKY})O
,1WqGj_
)o&b"L2)6M
ofK zq
#rN^(,
i2in{m
{r){bf
[SzTO}v
SJ:53
n:h@IQ
(q`u)W
[4N17[T
Bp\u'A
p)^DB-ZgDQf
oHZ^f
N.@cWT
Ck=8rG%
Db\z/~F
_D'9B9
:.#<bv
SC!x7_
IPst62 C
LWRVM{
KN~ndZj
~O>@f:
fvwpWT
dmDX4ou
o7`4 jC
G<D6.0
lx>.q[
1M3n_aV
o&R,Y5
@mJ=11
`_H3o2:
-Euv6T
<,J9s>
xT!RPBV
Z4/C%b
z@0`Q=R
( Y~<4f
*],}62
qs%mi~t~
uccR|E
_(5e:ea;
@L-X!
eUAD j
,zeJD2
2]#}sy
N!:`DP%
2Y_Bt|
WqN^M(
^k*TSyR
3*~Zy6?
Y1;\88
r+Gp1,
6PjUDg
fs)m7
gm:T*~
&Fock-/3
L&f9Y2
uS>|obA
J_A{4G
#T!i_@
-Q$Pc]q
dN|5YG
!LdU'G
YkhrdK
{mT;d)
9_<jAe
m7][d|=
U4C8Ec
%>#8I )
Dm|ba.
p)la&2C
3B!B#,
a+T*yy
QpN=DZ
2iS<s\9
In&OF
5^"~Wf
bU%`nA
Dz!{B"
jQk`Nx
Uc;\$j
kPs/+[]
?wao!n
B14Fwf~
QI].u-
x:j%|
jyqDa
G!@#/21
1GJ]PoYi
DLd-\9
@)p[p:
j?fX_;~
KAP%\\j
i6hwEH
oN=tq$
'tOd&_
~`A`F
#5D#n9
R-j`^qU'
'=4+ =`
hUXdDY
C2 U!8
6k8[:h
x?Amw2
_,ZGHD
Rhn"|{P
e{S7&W
Yzk3l_
>E0B,z\._
tM0lK
.4%wwy
W+Q$f$
"O6z.A
5bG|P
;C}C4KV
@:3TQ<
P(Kk],[Q
ocLI'
'pH!zq
1I/?[Y
C9ys3h}
`k[7/i
K!X0sC
!LE4Js
f"89{K
u71l4h
=3MBR1
|:nL\W
huBIQ8
ST .Ggk?
?t27|W?
"O>}6I
z5!.&L
xL|aJ
<Os*hJ
Q01It
tq4;n3
[R-RL?>
53zdJ:s
7m `Kb31L$5r
'<U`pX
'SV]?r
wE1=$D
nFhx&M#
X+#;y#i
"bcZ3MB
Zq:jl?%
SH{|Cf
6/"w2s
yzC//J
AkjE/#2
7T5&MM
TJ n;I
)Z\~[Yx&
!0!)wG?
2F|=kS
E"fby^:TI;
vJ8v[N
Sc'l`C}
L;)`9C
ht=YX(#"
1pJiUIq@
u?ncqn@
&l9MF?
'>)m<;
AgxKNN
i8Co&#cjoH
Mlm.&=
u!{RZ
auraoZ"a
%W/q7F
f\nx !
>eT/|h
"E;AH(!
XLi`)8.
_%zBM(
|Rj92_
wh?s`kR
?3+c*3{
m3HZT-
0Z3Yf
gs`\{4
1;Vb5B
1HdsZg
%!]b0G
2i:M8&
s+T0@{s
r}9ub*JW'
C,CI"F
2SF87isL
rzl}xG
U5,iSU
,R]AYq
6|Z=t/
RMzl\V/
sUHj\!p
=@O9pLR
/`Q+1y
sI*rI#D,e
Ux<k^D!u:
b9]3|?
);ZgzC
HWf7;fg0
rxpJ_m
aWz28w
5I[5ux
#.,'#O
kcl{.jm
hPbgW_
K2v:+]0
SZuC!~)k
nR4Che@
PA\)\oh
<eaIlIt
8XKME
,8Lf17
5`l?S[
ICmsJj
L34X^qLZD$]){jhl?_
U@JyT(
5NxD'[J
s8F])
GdJ'dgR
qX+{e'!
RDkiIs
qfnS8l
|2lge
\hrbmE
m$3ZJ<
KG_t&}x
3q_^CXP
=wKU2
LfB%X[^
j^cjad
dXp`j.Z
_=])Wa
"Eg~oC
W{qoAt
A:U]hr
+0qbB2
BgkUV(`iq
h#mIGyA
G!5o)f
L$|]QR
i(ddA3
9'&6P655y
=x6L+<"
{qPH*6
-)87aAinf
B4="}#
}Qim'&
NpFbGD
~0\Lb
qA)hF#
h~akl7
51V>Ge
!V+YR9
7ntB/}
:`F$$
~]=~|iZ
pOw--!ck
p<iNp@~.
Ws *Lw
g#<wC/
*oy@#P
^}dP9@
_g;,mW
KUOVJ-
p`F*<E
wde;]h
e4u'$
o}oI/G
X6,S-#0
1i{S[L)
h~wJ*Y
/Vt]wi
$ <1i;
? M7Zb
I lSI0
K {_}*
?,5U_ki7Z
_Q%VSl
v4.0.30319
#Strings
<Module>
GCM.exe
MoveAngles
Resolver
VirtualEnv
CallPr
Program
mscorlib
System
Object
MulticastDelegate
userBuffer
SetAccess
_founds
isAvailable
Invoke
IAsyncResult
AsyncCallback
BeginInvoke
EndInvoke
FreeConsole
GetProcAddress
LoadLibraryA
System.Collections.Generic
List`1
MemoryUntil
AIOsncoiuuA
founds
access
object
method
hrtgrefer
dwedwe
fgercwe
jytryhtr
frwcwedwe
callback
result
dceafre
jyrgetr
DSfdwertgtr
ASxewqrw
SAWSadew
moduleName
funcName
iuoAhdiu
uiOAshyuxgYUA
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
.cctor
rivateImplementationDetails>{BA0CD557-FF1C-4E21-80F3-CBC47D2DDF7D}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=16
$$method0x6000012-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
__StaticArrayInitTypeSize=394240
$$method0x6000012-2
Convert
ToString
String
Concat
Console
WriteLine
Exception
UnmanagedFunctionPointerAttribute
CallingConvention
DllImportAttribute
KERNEL32.dll
kernel32.dll
TryParse
System.Core
HashSet`1
System.Threading
Thread
Marshal
GetDelegateForFunctionPointer
$$method0x6000013-1
__StaticArrayInitTypeSize=1196
$$method0x6000013-2
.NETFramework,Version=v4.7.2
FrameworkDisplayName
incinerates
becrimes ghettoizes
erodynamicist souari
subpubic suffaris
Copyright 2024
$375c5eff-0650-4301-85ef-382cfefa9adf
1.0.0.0
WrapNonExceptionThrows
c:\rje\tg\krx\obj\Release\ojc.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
230113000000Z
260116235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
Aoi0Ka
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
joS&;J
20231102033749Z0
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA1
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
991224175051Z
290724141512Z0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
Entrust.net1@0>
7www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)1%0#
(c) 1999 Entrust.net Limited1301
*Entrust.net Certification Authority (2048)0
150722190254Z
290622193254Z0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
T=A^C_(F
http://www.entrust.net/rpa03
http://ocsp.entrust.net02
!http://crl.entrust.net/2048ca.crl0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS10
221004172103Z
290101000000Z0u1
Ontario1
Ottawa1
Entrust, Inc.1+0)
"Entrust Timestamp Authority - TSA10
_Xg>gX
http://ocsp.entrust.net03
'http://aia.entrust.net/ts1-chain256.cer01
http://crl.entrust.net/ts1ca.crl0
https://www.entrust.net/rpa0
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
231102033749Z0)
Entrust, Inc.1(0&
See www.entrust.net/legal-terms1907
0(c) 2015 Entrust, Inc. - for authorized use only1&0$
Entrust Timestamping CA - TS1
Available updated:
kernel32.dll
VirtualProtectEx
user32.dll
CallWindowProcW
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
becrimes ghettoizes
CompanyName
erodynamicist souari
FileDescription
incinerates
FileVersion
1.0.0.0
InternalName
VQP.exe
LegalCopyright
Copyright 2024
OriginalFilename
VQP.exe
ProductName
subpubic suffaris
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Msilzilla-10036350-0
CTX exe.trojan.msil
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Gen:Variant.Zusy.562474
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Agent.Vf9o
CrowdStrike win/malicious_confidence_90% (D)
BitDefender Gen:Variant.Ser.Jalapeno.35
K7GW Unwanted-Program ( 700000121 )
K7AntiVirus Unwanted-Program ( 700000121 )
huorong Trojan/MSIL.Agent.li
Baidu Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/GenKryptik.HCCC
APEX Malicious
Paloalto generic.ml
Cynet Clean
Kaspersky Clean
Alibaba TrojanPSW:MSIL/Stealerc.4115f48b
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Ser.Jalapeno.35
Sophos Mal/MSIL-WA
F-Secure Trojan.TR/AD.Stealc.ybkia
DrWeb Clean
VIPRE Gen:Variant.Zusy.562474
McAfeeD ti!13C42C85BBEA
Trapmine suspicious.low.ml.score
CMC Clean
Emsisoft Gen:Variant.Ser.Jalapeno.35 (B)
Ikarus Trojan-Spy.LummaStealer
FireEye Generic.mg.10e555691e5bd860
Jiangmin Clean
Webroot W32.Innfostealer.Vidar
Varist W32/MSIL_Agent.IRB.gen!Eldorado
Avira TR/AD.Stealc.ybkia
Fortinet MSIL/GenKryptik.HCCC!tr
Antiy-AVL Clean
Kingsoft MSIL.Trojan-PSW.Stealerc.gen
Gridinsoft Spy.Win32.Gen.tr
Xcitium Clean
Arcabit Trojan.Ser.Jalapeno.35
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Znyonm
Google Detected
AhnLab-V3 Malware/Win.Generic.C5675682
Acronis Clean
McAfee Artemis!10E555691E5B
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Crypt.MSIL
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.PRIVATELOADER.YXEI2Z
Tencent Win32.Trojan.FalseSign.Jjgl
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Clean
GData Gen:Variant.Ser.Jalapeno.35
DeepInstinct MALICIOUS
alibabacloud Trojan:MSIL/Wacapew.C9nj
No IRMA results available.