Static | ZeroBOX

PE Compile Time

2099-09-04 05:29:45

PDB Path

C:\Users\1234\Desktop\?????????????? ?????? ????????????\?????????? ??????????\bin\Release\Secured\Microsoft_Edge.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0003288c 0x00032a00 7.59598353802
.rsrc 0x00036000 0x000003d0 0x00000400 3.14651816197
.reloc 0x00038000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00036058 0x00000378 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
Microsoft_Edge.exe
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
AssemblyTitleAttribute
System.Reflection
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
SecurityAction
System.Security.Permissions
SecurityPermissionAttribute
UnverifiableCodeAttribute
System.Security
Object
System
RegistryKey
Microsoft.Win32
X509Certificate
System.Security.Cryptography.X509Certificates
DateTime
StringBuilder
System.Text
Random
System.Threading
StreamWriter
System.IO
Registry
String
IDisposable
Convert
Thread
FileAttributes
Delegate
Encoding
Environment
SpecialFolder
RegistryKeyPermissionCheck
IntPtr
OperatingSystem
DriveInfo
MD5CryptoServiceProvider
System.Security.Cryptography
HashAlgorithm
Directory
DirectoryInfo
Assembly
FileSystemInfo
RuntimeTypeHandle
ThreadStart
TextWriter
SecuritySafeCriticalAttribute
ValueType
CompilerGeneratedAttribute
RuntimeFieldHandle
RuntimeHelpers
Hashtable
System.Collections
Monitor
AppDomain
ResolveEventHandler
ObfuscationAttribute
ResolveEventArgs
Stream
Version
PropertyInfo
ICryptoTransform
MemoryStream
BinaryReader
DESCryptoServiceProvider
SymmetricAlgorithm
CryptoStream
CryptoStreamMode
MulticastDelegate
IAsyncResult
AsyncCallback
FileStream
FileSystemAccessRule
System.Security.AccessControl
FileSecurity
WindowsImpersonationContext
System.Security.Principal
IdentityReference
FileSystemRights
AccessControlType
SecurityIdentifier
FileSystemSecurity
WindowsIdentity
Marshal
EventArgs
EventHandler
StackTrace
StackFrame
MethodBase
RuntimeMethodHandle
Module
ModuleHandle
FieldInfo
MethodInfo
ParameterInfo
DynamicMethod
System.Reflection.Emit
ILGenerator
BindingFlags
MemberInfo
BitConverter
OpCodes
OpCode
Exception
ManagementObjectSearcher
System.Management
ManagementObjectCollection
ManagementObjectEnumerator
ManagementObject
ObjectQuery
ManagementBaseObject
ManagementScope
ManagementClass
Rectangle
System.Drawing
Bitmap
Graphics
ImageFormat
System.Drawing.Imaging
Process
X509Chain
SslPolicyErrors
System.Net.Security
SslProtocols
System.Security.Authentication
SecurityProtocolType
System.Net
WebClient
ProcessStartInfo
ServicePointManager
RemoteCertificateValidationCallback
IWebProxy
WebHeaderCollection
NameValueCollection
System.Collections.Specialized
ProcessWindowStyle
GZipStream
System.IO.Compression
CompressionMode
ComputerInfo
Microsoft.VisualBasic.Devices
Screen
System.Windows.Forms
<Module>
SslProtocolsExtensions
SecurityProtocolTypeExtensions
Config
Microsoft_Edge
EXECUTION_STATE
<AgileDotNetRT>
InitializeDelegate
ExitDelegate
{FE3C441D-DF9D-407b-917D-0B4471A8296C}
SystemDefault
xmlName
fileName
dirPath
filePath
phoenixName
phoenixLink
phoenixLink2
ethPool
etcWallet
GetEtcWallet
xmrigName
xmrigLink
value__
ES_CONTINUOUS
ES_DISPLAY_REQUIRED
ES_SYSTEM_REQUIRED
inited
runtimeAssembly
EwAAAA==%
FAAAAA==%
fwAAAA==%
FQAAAA==%
1AAAAA==%
zgAAAA==%
zgAAAA==
0AAAAA==%
0QAAAA==%
EQAAAA==%
KAAAAA==%
5QAAAA==%
YAAAAA==%
DAAAAA==%
JgAAAA==
MwAAAA==%
5gAAAA==%
OgAAAA==
hAAAAA==%
jAAAAA==%
NAAAAA==
KQAAAA==
+wAAAA==
/AAAAA==%
4QAAAA==
OAAAAA==
KgAAAA==
OwAAAA==
6QAAAA==
+AAAAA==%
PAAAAA==
4wAAAA==%
7gAAAA==%
7wAAAA==%
KwAAAA==
8AAAAA==%
8QAAAA==%
awAAAA==%
5AAAAA==%
9AAAAA==
QwAAAA==
9QAAAA==
9gAAAA==
GQAAAA==
6wAAAA==%
7AAAAA==%
RAAAAA==%
LAAAAA==
RQAAAA==%
lQAAAA==%
7QAAAA==%
bAAAAA==
IAAAAA==%
SAAAAA==
FgAAAA==%
FwAAAA==%
GAAAAA==%
IQAAAA==%
SQAAAA==
SgAAAA==
TgAAAA==
VgAAAA==
VwAAAA==
UQAAAA==
UgAAAA==
TAAAAA==
VAAAAA==
TQAAAA==
VQAAAA==
RgAAAA==
RwAAAA==
lAAAAA==
XQAAAA==
XwAAAA==
fAAAAA==
PQAAAA==
ZgAAAA==%
3AAAAA==
3gAAAA==%
3QAAAA==%
4AAAAA==
3wAAAA==%
PgAAAA==
PwAAAA==
aAAAAA==
hwAAAA==
YQAAAA==%
aQAAAA==%
8wAAAA==%
dAAAAA==
dQAAAA==
igAAAA==
iwAAAA==
cQAAAA==%
cgAAAA==%
NQAAAA==
HAAAAA==%
cwAAAA==%
kgAAAA==%
hgAAAA==%
kQAAAA==%
MQAAAA==
QAAAAA==
gwAAAA==%
QQAAAA==
nQAAAA==%
QgAAAA==
nwAAAA==
owAAAA==%
pAAAAA==%
pQAAAA==%
dwAAAA==
eQAAAA==%
eAAAAA==%
hQAAAA==
iAAAAA==
iQAAAA==%
fQAAAA==%
fgAAAA==
jQAAAA==
gQAAAA==%
ggAAAA==%
.cctor
LoadLibraryA
GetProcAddress
_Initialize
_Initialize64
_AtExit
_AtExit64
InitializeThroughDelegate
InitializeThroughDelegate64
ExitThroughDelegate
ExitThroughDelegate64
DomainUnload
Initialize
PostInitialize
BeginInvoke
EndInvoke
Invoke
Echelon_Dir
sender
filename
contentType
uFormat
format
hWndNewOwner
lpModuleName
hProcess
isDebuggerPresent
esFlags
wParam
lParam
className
caption
parent
startChild
lpClassName
lpWindowName
ZeroOnly
strToHash
object_0
x509Certificate_0
x509Chain_0
sslPolicyErrors_0
resourceStream
proxyDelegateTypeToken
get_Value
ToString
OpenSubKey
GetSubKeyNames
GetValue
CreateSubKey
SetValue
get_Now
get_Ticks
Append
LocalMachine
Concat
IsNullOrEmpty
Format
get_Length
get_Chars
Substring
ToUpper
Equals
Dispose
ToInt64
ToChar
Exists
SetAttributes
ReadAllBytes
Delete
OpenWrite
GetAccessControl
SetAccessControl
Combine
GetString
GetBytes
get_ASCII
get_Default
GetFolderPath
get_MachineName
get_UserName
get_ProcessorCount
get_OSVersion
get_SystemDirectory
op_Equality
op_Inequality
get_Size
GetPathRoot
GetTempFileName
GetTempPath
get_TotalSize
ComputeHash
CreateDirectory
GetExecutingAssembly
get_Location
GetCustomAttributes
GetManifestResourceStream
LoadFile
get_Attributes
set_Attributes
Refresh
GetTypeFromHandle
WriteLine
InitializeArray
ContainsKey
get_Item
set_Item
get_CurrentDomain
add_ResourceResolve
add_DomainUnload
GetManifestResourceNames
get_Name
get_Position
get_Version
get_Major
GetProperty
ReadString
ReadBytes
ReadInt32
set_Key
set_IV
CreateDecryptor
AddAccessRule
Impersonate
GetDelegateForFunctionPointer
get_FrameCount
GetFrame
GetMethod
get_MethodHandle
GetFunctionPointer
GetModules
get_ModuleHandle
ResolveTypeHandle
ResolveMethodHandle
GetFields
get_FieldType
get_ReturnType
CreateDelegate
get_ParameterType
GetILGenerator
EndsWith
TrimEnd
FromBase64String
ToUInt32
GetMethodFromHandle
get_IsStatic
GetParameters
Ldarg_0
Ldarg_1
Ldarg_2
Ldarg_3
Ldarg_S
Callvirt
GetEnumerator
get_Current
MoveNext
GetInstances
get_Width
get_Height
FromImage
CopyFromScreen
get_Png
GetProcessesByName
get_StartInfo
get_MainWindowTitle
set_StartInfo
DownloadFile
set_Proxy
get_Headers
get_Encoding
UploadData
set_CreateNoWindow
set_UseShellExecute
set_Arguments
set_FileName
set_WindowStyle
get_ServerCertificateValidationCallback
set_ServerCertificateValidationCallback
set_SecurityProtocol
get_PrimaryScreen
get_Bounds
user32.dll
kernel32.dll
ntdll.dll
user32
User32.dll
AgileDotNetRT.dll
AgileDotNetRT64.dll
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
CloseClipboard
EmptyClipboard
GlobalLock
GlobalUnlock
GetForegroundWindow
GetWindowText
GetModuleHandle
CheckRemoteDebuggerPresent
SetThreadExecutionState
RtlSetProcessIsCritical
PostMessage
FindWindow
FindWindowEx
SendMessage
IsIconic
IsZoomed
mscorlib
Microsoft.VisualBasic
{FEA94A50-E5C8-4edd-BE62-F738BC8C043E}
7e66981e-79fa-492c-a68d-61bb099432b8
30687496-fd03-4bab-bf93-0daea739d067
WrapNonExceptionThrows
Microsoft_Edge
Microsoft
Copyright
2021
$4e08aa1d-b8ae-40f2-84da-3d8fa08bcb6c
1.3.1.5
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
/?gg,B
(.gw,B
1?????S?
xc(fw<
?NF~!b
wUP|%*>QS
5-1i]c
,JT4234
5]7]$j
/"~a`d
R06a)'a
Ct_A(m
t"Vc:b
J`;y4{
%HLA8eo
8938l?M
(f"U0F
uj;P4?,e\
dJ BQ,N6"=
GxKdtAJZrc
w-7s~]
Gb;%L|
,kU2zB
M_GF]?
3ot?8j
?\7yCt
J-#)Tb
IS 8#e
BH|]}K
QMZh/Z
-XisB%
^|Z9US
:`IyX]
L#I2;b
L0q;~}
6$q$cF
jGmn^+
cF/vj
70#]`v
c-K#O0EN
>T/z W>
KHd5<P
tI-JuM
P8Z|w
\Wfx*3
1k9(#Y>"
h<9mnBvfB
wzbbNf
cjZnBJr
mbzJNj
o=0$-`
X2P}X2m
StmWU^
#.&*c&e
5&0yvfBf
,m@BZR
L]zfjBZ
6![K/#
UxrfvNB
P7#=)'
CfbzjFB
X8EWDw#C
k+_7#k
)5913=+]
5&!kjZn
,p)v)w9
^.sMr-s;
q5le$Wia
6\RY9<!]_c
d#pvK?Q
Tr?Nr.
wi>m8r
:4rF<sF
Z>]zt
3,v&w{
E@/ImR
Qz#l.8
@:LM|F
'Wp/my
AT0yH(p
'M={Jx
nVof
K|v4Xy
 @0}lv
toSyC7
zZ%z;9
C~TSx?
Xanv8I
{7NrTC
Zr'NbT
;T{d/F
L0Jv;z
j``aTJ4Q
hyUw^/
HYtHK
DXF|H?
m"zI[aW
B.6^]Ak
oCh'2+
sgSX]?
.64|t1j6
m}t5J]
t5j~XF
uRT0B
+ue*mG
4GUd]n
,?>Z4_cz
q'Bj9@c
tSZ=z[oy
C*c03^
7W"/{O
1T^SjY
\bctM9
M1vS@w$
4:+U;%
8{;6?|
bt`HS0?
xNlhtO
)uN;kV
*Q'b_I5
;[O%}j
-x.Tx^
|{FM#&hPw6
C}j#H<
=0Rz]b
@9j2|D
`m)L3s&
V%Q\`b
BBb#j#*/^
*-)Jn1
+<V[tc
zR'@N|
']{_@=}
9@~Eq+
'RC"SXL
El2Y?~
u#YtWY
n\{,RbBBs~U
T!4?-Ju
XZ--UZ
TSpI(x
LTCZg_
"I4;LA
lZTiOb
t6ok"Q_2
Fb+1v+
:bNTdB
0S9,=
r;NC}q
dxVD~g
\k3#cx
CJYL\np
AJGF5|
:iRV|7
*_kU;*q
-dpWn4
(9F~KL+
rP],Nz#
!~,Ng?
raY/sR)(5
+g>s%z
g.qcdq7
;`!3hU
{!~_9>
8B/F'Z
dtV:q j
J~L)#)
H1C|d1
,&8And1
4Ts&/{
Go*oY$
XD8YAR
*sf{Gd
a5$_T7
Tv@LG:
}Fy=]FM]Yw
Y+AERbN
Hs`TX4]
\thhBl
V>^m}<<
>^w1h.
59<6:*
\bHHx<
0\FG"I!
u7,g#l\
G9,'"\
;9#`f*
-9fc4;
wr*5kJs
*/Be$/
;EL9(_
\009+(9
VNq>WN
Pr,!8ea
[h`f]E
SGI?aL&
ECxQRj
R/g{WI
Ua$a'C1
fdjGb YV}}
i@R9cy
k7I5Se#6
ygA1$
c8Ds]H
O/*EI
N95wI`
l|*M2zz
nu4e>$bSI
8~fNCcR
eTw<~#^x
w'CK@R
yzBwe0Q
X36${Xp
iN|TK&
s!O.yf
{ao":`
S,`/Wh
?,x *TW
pG:-`t&
"7zvUYiBl
HK$b}ZQ_
'\G`Ja
|W2Crd
=6,cM
Y,IWIf
OlVCIC
tH!kRB
uBwwF-
v=d+:h
gGuf?p
&*Hox`
G[v_r~u
[?MXUs
LBC>9?^
5LlQE~
lIb3jO
"aQ!~i)
j`_@TM
plpB2J
mU!gVM
_:6z*}
'hvOwB
@j6U{[v
AiY"oWAV,
s;S7b<
ctHpoe
>db4(j
~7[l[X0m
%4#i\@T
{Cxp^5c
_Ef?Tu
+vx,>'S
Ws) }<
SU2$zR"
Kl8^Z{
dC}Rt+
2V|n?)
*#w[PE
ex~]?W
/oTkT)
0}>Kf;e
P\Z)_qn
7*tX(|
NOg"|8
1n6xOF
Q%xkVj
}nzcv
s8tOm[
k 8m5]
>G@=!
~}-/.
\d$H9%
`t<g\H
AVISZ
'rA*w/
_CorExeMain
mscoree.dll
C:\Users\1234\Desktop\?????????????? ?????? ????????????\?????????? ??????????\bin\Release\Secured\Microsoft_Edge.pdb
RequestingAssembly
{FEA94A50-E5C8-4edd-BE62-F738BC8C043E}
7e66981e-79fa-492c-a68d-61bb099432b8
AgileDotNetRT
30687496-fd03-4bab-bf93-0daea739d067
AgileDotNetRT64
{0}{1}\
S-1-1-0
_Initialize
_Initialize64
_AtExit
_AtExit64
{FE3C441D-DF9D-407b-917D-0B4471A8296C}
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Microsoft_Edge
CompanyName
Microsoft
FileDescription
Microsoft_Edge
FileVersion
1.3.1.5
InternalName
Microsoft_Edge.exe
LegalCopyright
Copyright
2021
LegalTrademarks
OriginalFilename
Microsoft_Edge.exe
ProductName
Microsoft_Edge
ProductVersion
1.3.1.5
Assembly Version
1.5.6.7
Antivirus Signature
Bkav Clean
Lionic Trojan.Multi.Generic.4!c
Elastic Clean
Cynet Malicious (score: 100)
FireEye Generic.mg.c25eeafa69c9b7e5
CAT-QuickHeal Clean
McAfee Artemis!C25EEAFA69C9
Cylance Unsafe
Zillya Clean
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Clean
K7GW Clean
K7AntiVirus Clean
Baidu Clean
Cyren Clean
Symantec Clean
ESET-NOD32 a variant of MSIL/Agent.UUO
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Rising Clean
Ad-Aware Clean
Sophos Generic Reputation PUA (PUA)
Comodo Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
CMC Clean
Emsisoft Clean
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
Webroot Clean
Avira HEUR/AGEN.1126748
MAX Clean
Antiy-AVL Clean
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Wacatac.B!ml
AhnLab-V3 Clean
Acronis Clean
VBA32 Clean
ALYac Clean
TACHYON Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Trojan.Diztakun
eGambit Unsafe.AI_Score_70%
Fortinet Clean
BitDefenderTheta Clean
Cybereason malicious.12a9b9
Avast Clean
MaxSecure Trojan.Malware.300983.susgen
No IRMA results available.