Static | ZeroBOX

PE Compile Time

2083-08-20 10:38:26

PDB Path

C:\Users\Test\source\repos\Pastebin Payload\Pastebin Payload\obj\Release\Pastebin Payload.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00001314 0x00001400 5.36070532981
.rsrc 0x00004000 0x000005ec 0x00000600 4.15902229357
.reloc 0x00006000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00004090 0x0000035c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000043fc 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
<>c__DisplayClass1_0
<>9__3_0
<fnGetFriendlyName>b__3_0
<>9__5_0
<RandomString>b__5_0
<Main>b__0
IEnumerable`1
List`1
Microsoft.Win32
Func`2
<Module>
System.IO
DownloadData
mscorlib
System.Collections.Generic
Thread
Pastebin Payload
Pastebin_Payload
IEnumerable
IDisposable
Console
fnGetFriendlyName
ReadLine
WriteLine
OfType
System.Core
Dispose
CompilerGeneratedAttribute
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
SetValue
GetPropertyValue
Pastebin Payload.exe
System.Threading
System.Runtime.Versioning
DownloadString
RandomString
ToString
GetFolderPath
get_Length
length
Program
System
Random
random
pastebin
System.Reflection
ManagementObjectCollection
Exception
RegisterInStartup
System.Linq
StringReader
TextReader
SpecialFolder
ManagementObjectSearcher
CurrentUser
GetEnumerator
.cctor
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
WriteAllBytes
System.Collections
get_Chars
Process
Concat
Repeat
ManagementBaseObject
ManagementObject
Select
System.Net
FirstOrDefault
WebClient
System.Management
Environment
get_Current
ThreadStart
MoveNext
ToArray
OpenSubKey
RegistryKey
Registry
WrapNonExceptionThrows
Pastebin Payload
Copyright
2021
$3e9acb44-42d5-4713-8f24-a723c5d96acb
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
C:\Users\Test\source\repos\Pastebin Payload\Pastebin Payload\obj\Release\Pastebin Payload.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SELECT Caption FROM Win32_OperatingSystem
Unknown
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789
https://pastebin.com/raw/gCyjHCCH
Caption
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Pastebin Payload
FileVersion
1.0.0.0
InternalName
Pastebin Payload.exe
LegalCopyright
Copyright
2021
LegalTrademarks
OriginalFilename
Pastebin Payload.exe
ProductName
Pastebin Payload
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav Clean
Elastic Clean
MicroWorld-eScan Gen:Variant.Bulz.406461
FireEye Generic.mg.6be41709f8bfbf06
CAT-QuickHeal Clean
Qihoo-360 Win32/TrojanSpy.Raccoon.HgIASR0A
McAfee RDN/Generic Downloader.x
Cylance Unsafe
VIPRE Win32.Malware!Drop
AegisLab Trojan.Win32.Bulz.4!c
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan-Downloader ( 004d40511 )
BitDefender Gen:Variant.Bulz.406461
K7GW Trojan-Downloader ( 004d40511 )
Cybereason malicious.9f8bfb
Baidu Clean
Cyren W32/Trojan.MEWZ-9122
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.BCI
APEX Malicious
Avast Win32:DropperX-gen [Drp]
ClamAV Clean
Kaspersky HEUR:Trojan-PSW.MSIL.Racealer.gen
Alibaba TrojanPSW:MSIL/Racealer.d036ce19
NANO-Antivirus Clean
ViRobot Clean
Rising Downloader.Agent!8.B23 (CLOUD)
Ad-Aware Gen:Variant.Bulz.406461
Sophos Mal/Generic-S
Comodo Malware@#3tzfnsb5jcfa5
F-Secure Clean
DrWeb Trojan.Siggen12.62789
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition RDN/Generic Downloader.x
CMC Clean
Emsisoft Trojan.Agent (A)
SentinelOne Static AI - Malicious PE
GData Gen:Variant.Bulz.406461
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira TR/Dldr.Agent.zjrdy
MAX malware (ai score=99)
Antiy-AVL Clean
Kingsoft Win32.PSWTroj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Downloader.vb
Arcabit Trojan.Bulz.D633BD
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Racealer.gen
Microsoft Trojan:Win32/Ymacco.AA00
Cynet Malicious (score: 90)
AhnLab-V3 Trojan/Win.UN.C4401427
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.34670.am0@aaeyfup
ALYac Gen:Variant.Bulz.406461
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Downloader.MSIL.Generic
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H0CCV21
Tencent Clean
Yandex Clean
Ikarus Trojan.MSIL.Tiny
eGambit Clean
Fortinet MSIL/Agent.BCI!tr
AVG Win32:DropperX-gen [Drp]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_100% (W)
MaxSecure Trojan.Malware.74493398.susgen
No IRMA results available.