Static | ZeroBOX

PE Compile Time

2072-10-26 09:51:02

PDB Path

C:\Users\black\Desktop\Forensic\project\updated\poly\poly\obj\Debug\poly.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0000185c 0x00001a00 5.33662634695
.rsrc 0x00004000 0x0000058c 0x00000600 4.00575885886
.reloc 0x00006000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00004090 0x000002fc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0000439c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
IEnumerator`1
GetLocalIPv4
get_UTF8
<Module>
get_ASCII
System.IO
exdata
mscorlib
System.Collections.Generic
ReadToEnd
NetworkInterface
Replace
CryptoStreamMode
get_Message
IDisposable
Console
set_FileName
WriteLine
get_NetworkInterfaceType
Dispose
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
set_UseShellExecute
poly.exe
Encoding
System.Runtime.Versioning
FromBase64String
ToBase64String
ToString
GetString
get_Length
FlushFinalBlock
NetworkStream
CryptoStream
GetStream
MemoryStream
Program
System
SymmetricAlgorithm
ICryptoTransform
System.Net.NetworkInformation
UnicastIPAddressInformation
System.Reflection
UnicastIPAddressInformationCollection
get_InnerException
SocketException
get_StartInfo
ProcessStartInfo
StreamReader
TextReader
DESCryptoServiceProvider
TcpListener
ToUpper
StreamWriter
TextWriter
IEnumerator
GetEnumerator
CreateDecryptor
CreateEncryptor
System.Diagnostics
GetAllNetworkInterfaces
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
GetIPProperties
IPInterfaceProperties
get_UnicastAddresses
GetBytes
Contains
System.Collections
get_Chars
Process
IPAddress
get_Address
System.Net.Sockets
get_OperationalStatus
Concat
Object
System.Net
WaitForExit
AcceptTcpClient
get_Current
textToDecrypt
textToEncrypt
Convert
get_StandardInput
set_RedirectStandardInput
get_StandardOutput
set_RedirectStandardOutput
MoveNext
System.Text
set_CreateNoWindow
ToArray
publickey
System.Security.Cryptography
get_AddressFamily
op_Equality
WrapNonExceptionThrows
Copyright
2021
$5c6643ac-420d-4b11-a2ff-65888c82729d
1.0.0.0
.NETFramework,Version=v4.7.2
FrameworkDisplayName
.NET Framework 4.7.2
C:\Users\black\Desktop\Forensic\project\updated\poly\poly\obj\Debug\poly.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
87654321
Waiting for a connection...
Connected!
Received: {0}
Decrypting...
Finding key...
Key Found:
Data Found:
12345678
cmd.exe
Executed.
Sent: {0}
SocketException: {0}
Hit enter to continue...
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
FileVersion
1.0.0.0
InternalName
poly.exe
LegalCopyright
Copyright
2021
LegalTrademarks
OriginalFilename
poly.exe
ProductName
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Bulz.4!c
Elastic Clean
MicroWorld-eScan Gen:Variant.Bulz.589878
FireEye Gen:Variant.Bulz.589878
CAT-QuickHeal Clean
McAfee Artemis!39991C5E94A8
Malwarebytes Clean
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Gen:Variant.Bulz.589878
K7GW Clean
Cybereason Clean
Baidu Clean
Cyren Clean
Symantec Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Tencent Clean
Ad-Aware Gen:Variant.Bulz.589878
Sophos Clean
Comodo Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
CMC Clean
Emsisoft Gen:Variant.Bulz.589878 (B)
SentinelOne Clean
GData Gen:Variant.Bulz.589878
Jiangmin Clean
Webroot Clean
Avira Clean
MAX malware (ai score=83)
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Cynet Clean
AhnLab-V3 Clean
Acronis Clean
BitDefenderTheta Clean
TACHYON Clean
VBA32 Clean
Cylance Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H09H621
Rising Clean
Yandex Clean
Ikarus Clean
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
Avast Clean
CrowdStrike Clean
Qihoo-360 Win32/Trojan.Generic.HgIASZ0A
No IRMA results available.