Static | ZeroBOX

PE Compile Time

2021-08-18 17:26:26

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00009804 0x00009a00 7.25269192468
.rsrc 0x0000c000 0x00010eb8 0x00011000 1.39200473706
.reloc 0x0001e000 0x0000000c 0x00000200 0.0611628522412

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000c184 0x00010828 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40
RT_GROUP_ICON 0x0001c9ac 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0001c9c0 0x0000030c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0001cccc 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
LCscHPY
Y/B>gqA9D
IL"SCb
9[}+0!
2AO<F[
$yH%cg
ie}g`|u+'
,%Db0YX#
f#"KFU
em+tXH
11o}2k
uPKWOVD
<xTVX4
hm@z*QtEB
zUf}Ik
S0q6&
"CY;yT
&s^U%t]]
U+^N8Y
/(1sYC;
Q9vau
&+7G6|
i,UR_Y
KXC7oo
Olsq00
803}o?
ifgusJV
MrgG%We
od$fYD
VMDj^m
5aIa8Z
)sAa8H
,A[%&8
uLR|%&8
Z =F)Va8O
FH%&8'
Z?_b`
!}1a8d
cZ @ZM
NtCoT
=ZZ z
NtCoT
X ntinT
XGR oc
X ntinT
\W+Z d
ntdlT
X l.dlT
Bu(Z ~
ls?/%+
Z */$pa8
_fKa8E
ntdlT
X l.dlT
_bj2
_bY*
2^,%&81
i67YZ
h&"%&8
`Z pB;
*`Za8I
{Z .[}}a8
LlZ <
"_.a8q
uIE^Z
d&b9%&
O.h
Z_bX
Z GK>1a8f
cZ IZE
48s3%+
g-%&83
Vj79%+
Y_cX*
{&%&8/
eT^;Z
v4.0.30319
#Strings
#Strings
#Schema
<Module>
DataField
Decrypt
mscorlib
GCHandle
System.Runtime.InteropServices
Resolve
Assembly
System.Reflection
ResolveEventArgs
System
Decompress
.cctor
caneyYsTOwbYXFeBjKgSzjBnbLojA7`{u-wf`Ul|+c%&{t> xQ2wt!
VirtualProtect
kernel32.dll
WUafLZRRWSaNnPXpydOabfNpxVFBxYO;:`JxXqTX+=o$bQY%wWnL
DataType
ValueType
BitDecoder
Decode
BitTreeDecoder
Models
NumBitLevels
ReverseDecode
Decoder
Object
Stream
System.IO
ReleaseStream
Normalize
DecodeDirectBits
LzmaDecoder
m_IsMatchDecoders
m_IsRep0LongDecoders
m_IsRepDecoders
m_IsRepG0Decoders
m_IsRepG1Decoders
m_IsRepG2Decoders
m_LenDecoder
m_LiteralDecoder
m_OutWindow
m_PosDecoders
m_PosSlotDecoder
m_RangeDecoder
m_RepLenDecoder
_solid
m_DictionarySize
m_DictionarySizeCheck
m_PosAlignDecoder
m_PosStateMask
SetDictionarySize
SetLiteralProperties
SetPosBitsProperties
SetDecoderProperties
GetLenToPosState
LenDecoder
m_LowCoder
m_MidCoder
m_Choice
m_Choice2
m_HighCoder
m_NumPosStates
Create
LiteralDecoder
m_Coders
m_NumPosBits
m_NumPrevBits
m_PosMask
GetState
DecodeNormal
DecodeWithMatchByte
Decoder2
m_Decoders
OutWindow
_buffer
_stream
_streamPos
_windowSize
CopyBlock
PutByte
GetByte
UpdateChar
UpdateMatch
UpdateRep
UpdateShortRep
IsCharState
MIMECONTF_SAVABLE_BROWSER
SystemString
AssemblyTrademarkAttribute
AssemblyCopyrightAttribute
AssemblyProductAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
AssemblyFileVersionAttribute
ComVisibleAttribute
AssemblyCompanyAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
RuntimeCompatibilityAttribute
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
AssemblyTitleAttribute
STAThreadAttribute
UInt32
GCHandleType
Module
RuntimeHelpers
InitializeArray
RuntimeFieldHandle
GetExecutingAssembly
get_ManifestModule
get_Target
LoadModule
ResolveSignature
AppDomain
get_CurrentDomain
ResolveEventHandler
add_AssemblyResolve
GetTypes
ResolveMethod
MethodBase
GetParameters
ParameterInfo
Invoke
Encoding
System.Text
get_UTF8
get_Name
AssemblyName
get_FullName
String
ToUpperInvariant
GetBytes
GetEntryAssembly
GetManifestResourceStream
get_Length
Buffer
BlockCopy
Convert
ToBase64String
MemoryStream
ReadByte
GetTypeFromHandle
RuntimeTypeHandle
get_Module
Marshal
GetHINSTANCE
IntPtr
op_Explicit
get_FullyQualifiedName
get_Chars
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
1.2.1.1
bvsdvdssd
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
&&&)&&&%%%
&&&*&&&
&&&7'''
&&&;&&&
&&&;&&&
&&&[&&&
&&&=&&&
&&&F%%%
&&&A&&&
&&&,&&&
&&&X&&&
&&&=&&&
&&&E&&&
&&&A&&&
&&&p&&&
&&&<&&&
&&&r&&&
&&&=&&&
&&&F&&&
&&&<&&&
&&&r&&&
&&&<&&&
&&&r&&&
&&&>&&&
&&&E&&&
&&&<&&&
&&&r&&&
&&&m&&&
&&&<&&&
&&&r&&&
&&&B&&&
&&&<&&&
&&&r&&&
&&&<&&&
&&&r&&&
&&&B&&&
&&&<&&&
&&&r&&&
&&&<&&&
&&&r&&&
&&&L&&&
&&&?'''
'''<&&&
&&&r&&&
&&&I&&&
&&&}&&&
&&&e'''
&&&P'''
'''<&&&
&&&r&&&
&&&q&&&
&&&'&&&
&&&)&&&
&&&&&&
&&&4&&&
&&&<&&&
&&&r&&&
&&&(%%%
&&&)&&&
&&&L&&&
&&&;&&&
&&&r&&&
&&&(&&&
&&&)&&&
&&&$&&&
&&&h&&&
&&&M&&&
&&&;&&&
&&&r&&&
%%%(%%%
&&&)&&&
&&&p&&&
&&&?&&&
&&&;&&&
&&&r&&&
&&&(&&&
&&&(&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&)&&&
%%%(&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&)&&&
%%%(&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
'''+&&&
&&&*&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&N&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
%%% &&&
&&&"&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
%%%'&&&
&&&)&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
%%%'&&&
&&&)&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
%%%'&&&
&&&)&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&'&&&
&&&;&&&
&&&)&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&'&&&
&&& &&&
&&&)&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&'&&&
&&&)&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&'&&&
&&&)&&&
&&&p&&&
&&&>&&&
&&&;&&&
&&&r&&&
&&&'&&&
&&&&&&&
&&&o&&&
&&&@&&&
&&&;&&&
&&&r&&&
&&&^&&&
&&&`&&&
&&&;&&&
&&&r&&&
&&&k&&&
&&&9&&&
&&&;&&&
&&&r&&&
&&&z&&&
&&&;&&&
&&&r&&&
&&&-&&&
&&&d&&&
&&&J&&&+&&&+&&&+&&&+&&&+&&&+&&&+&&&+&&&+&&&+&&&+&&&+&&&+&&&*&&&,&&&
&&&:&&&
&&&r&&&
&&&M&&&
&&&j&&&
&&&9&&&
&&& &&&
&&&:&&&
&&&r&&&
&&&e&&&
&&&U&&&
&&&:&&&
&&&r&&&
&&&:&&&
&&&r&&&
&&&h&&&
&&&V&&&
&&&:&&&
&&&r&&&
&&&$&&&
&&&:&&&
&&&r&&&
&&&M&&&v&&&
&&&X%%%
%%%:&&&
&&&r&&&
&&&|&&&
%%%:&&&
&&&r&&&
&&&/&&&
&&&Z(((
%%%:&&&
&&&r&&&
&&&{&&&
%%%;&&&
&&&r&&&
&&&,&&&
&&&Z(((
%%%<&&&
&&&r&&&
&&&z&&&
&&&O&&&
&&&j&&&
&&&-&&&
&&&[&&&
&&&I&&&
&&&y&&&
&&&,&&&
&&& &&&
%%%-&&&
&&&x&&&
&&&*&&&
&&&,&&&
&&&e&&&
&&&u&&&
&&&m&&&
&&&+&&&
&&&8&&&
&&&/&&&x&&&
&&&~&&&7(((
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
(SOUND_SPEAKER_MUTE_SOUND_OFF_ICON_191602
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
bvsdvdssd
CompanyName
bvsdvdssd
FileDescription
bvsdvdssd
FileVersion
1.2.1.1
InternalName
bvsdvdssd.exe
LegalCopyright
LegalTrademarks
OriginalFilename
bvsdvdssd.exe
ProductName
ProductVersion
1.2.1.1
Assembly Version
1.2.1.1
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Clean
FireEye Generic.mg.e001b45815b1982e
CAT-QuickHeal Clean
McAfee Artemis!E001B45815B1
Cylance Unsafe
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike win/malicious_confidence_90% (W)
BitDefenderTheta Gen:NN.ZemsilF.34088.gm0@a42aBNm
Cyren Clean
Symantec ML.Attribute.HighConfidence
ESET-NOD32 Clean
Baidu Clean
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky HEUR:Trojan.MSIL.Crypt.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Ad-Aware Clean
TACHYON Clean
Sophos Generic ML PUA (PUA)
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.ct
CMC Clean
Emsisoft Clean
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
MaxSecure Clean
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Trojan.Win32.Kryptik.dd!n
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.MSIL.Crypt.gen
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
VBA32 CIL.HeapOverride.Heur
ALYac Clean
MAX Clean
Malwarebytes Trojan.Crypt
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Trojan.MSIL.Confuser
eGambit Clean
Fortinet MSIL/Confuser.DX!tr
Webroot Clean
Cybereason malicious.c6dcad
Avast Clean
Qihoo-360 HEUR/QVM03.0.58AA.Malware.Gen
No IRMA results available.