Static | ZeroBOX

PE Compile Time

2021-08-21 22:56:20

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
2#"u!JwP 0x00002000 0x00003f7c 0x00004000 7.98694625318
.text 0x00006000 0x0002a6a4 0x0002a800 7.82531098275
.rsrc 0x00032000 0x00000474 0x00000600 3.36908282569

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000320a0 0x0000023c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000322dc 0x00000198 LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text

!This program cannot be run in DOS mode.
2#"u!JwP|?
`.rsrc
-5QICb
9+de"-.
^~D=Db
3IbM T
UbeeJf
ZiN#_Q
_$\m78
^"JOGB
HkN,93
3@&q7A
MF> Z[
g+VFQn2
N;oV&7
>U0tH5
$ezg28
8)Q;Eq
-">yH<
s^"m@r
_%!Vmo
="~] M
fM:<,}
{vUT>b
V7h_"L
t`Z.r=|
9'Fs1"
r6]23T
tH%V=3
cp\,\GN
/\\a aQ
79<schH
$:2?D
~2473F
~{|Oy7AO
G@]5)#p?
]7ygIU
5(fy>
:9<CFc
^}iL3^
}ia&Tk-
CTQ7[`T
}*Y%Hm
NtCoT
W%fZ 6
X l.dlT
b>1Z |
TO?a8n
Z 03LHa8H
".`3%&
Z*Za8]
5Z s7'
B+Z 2l
jANZa8
X ntinT
NtCoT
Z XFWza87
o8Z ;[
}2$K%+
ntdlT
X l.dlT
9 tsQzZ
ntdlT
9 R~kVZ SW
X ntinT
9 -/qYZ
:l%;Z gx
Nc1!Z
31Za8-
v4.0.30319
#Strings
UInt32
get_UTF8
<Module>
GetHINSTANCE
get_ASCII
System.IO
mscorlib
get_CurrentThread
RijndaelManaged
get_IsAttached
set_IsBackground
GetMethod
CreateInstance
set_Mode
CryptoStreamMode
CipherMode
Invoke
IDisposable
RuntimeFieldHandle
RuntimeTypeHandle
GetTypeFromHandle
get_Module
set_WindowStyle
ProcessWindowStyle
get_FullyQualifiedName
set_FileName
Combine
ValueType
GetElementType
MethodBase
Dispose
GuidAttribute
SuppressIldasmAttribute
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
set_UseShellExecute
ReadByte
get_IsAlive
crock.exe
set_KeySize
System.Threading
Encoding
IsLogging
FromBase64String
GetString
GetTempPath
get_Length
Marshal
kernel32.dll
CryptoStream
MemoryStream
System
SymmetricAlgorithm
ICryptoTransform
get_Location
System.Reflection
Exception
Intern
MethodInfo
ProcessStartInfo
Buffer
ResourceManager
Debugger
.cctor
CreateDecryptor
IntPtr
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
znjurimppretwwfytdnstqjudjjeuuxshema.Resources
System.Resources
Rfc2898DeriveBytes
WriteAllBytes
GetBytes
Equals
get_Chars
RuntimeHelpers
Process
set_Arguments
Concat
GetObject
VirtualProtect
op_Explicit
Environment
ParameterizedThreadStart
Convert
FailFast
set_RedirectStandardOutput
System.Text
set_CreateNoWindow
InitializeArray
ToArray
System.Security.Cryptography
GetCallingAssembly
GetExecutingAssembly
GetEntryAssembly
BlockCopy
set_WorkingDirectory
$27dda0a2-17df-4172-ae90-f2dfa1e107b2
WrapNonExceptionThrows
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADPC
7>_$It
oA@:oRl
/HeCLa
dK+>r*>C
^U3ThIHE
Jqk95m
_aN`~>
;o\]*o
T4t{ZpH
7"OO?
mwvLQw
+NGu)_
n`L5t!O
GB+GY2
]0VVE'
.2+5%]F
VzNx5Nt
?,%W\{$
b~j$8n%[y
|95PQc
Spmw_V
s/|8op{S
~o,0d9
atXHi%m
tThm+X&
[h16*D
Fi<[]n
oRDeQc
I#_rJn
nT"/=9k
A)ET.g
S$LR6_J
I~Oef)
5"C6h1w
fs8^z&
~OyYyA
{^bC:2
&@u#Mq
Rr`x:%
&?{X)f
?q5fGke
)V5r@
3o!+kD
6`1+k!9vs
_K87b
;ijKgQe
AE-=v3g
CaEd $
7Q!o23
*G+L +
g!]jk
sEAJcq
!qzhA
Kn:AZs
[]{3y-
%u/xer
%XuqM
<?'N>C
)e/T6fwR
c(d%(e11
`,I)#I
H__]a=Q1
H7%>st
-&}E|7
)sX-eF
M1}l_{P
~Ojx1
P^~+K)
Fs}6QL
"rupkH
&EsAf"
Bm%%v
-lve2r
KWHj;<~
UNh[in
2^/Tvw]
"=gHa*g
WYI'.A
t/J"KJz,
P8P(u<;
W0^Qsl>
WE8#JgDB
SF7%Q
EpgBJc
3f78yjc[E
JY*g7'x|0+
FVZqr?
8JLe5/ KS
}iL$.D>
2'&wUw
]z($0S])L\
xWe0iO
eX?kT"?OQ[
zH^9#`
{kJj2
wOWJ(6
Zrh Xk
8YnpeC
m6j/2k
7&&u!%
27=/9E
hpx N\
9p_ZmMQw
cXXe5w7
op~>_
@.<Gx
>,k3a)
mNN64(a
X1<"T8-+
.Xs)7i
lV21H\+Ft]Z
q)2-s0
tS4un
r<X<u2
2'Rc;`'
[.C/*K
4Vm7#9
mC^lX3h
`grko}
owYGZ4
$S2@NRS
8?6X!ye
S3Ot?~
+@O@>7C
!o4'9-
3-zI0-?Y
RIAt|$
#2EPWv
nqd@3=
i\NUEb
yFwG~h~3
3>(5p)
/VNOd}
79dapg
,DL$$j
Z+fOR~}
mSd`}s|c
!l,@%JR
^y4NN=qX
C49s5HI
84P%B@
vb2AXJ
#A8!;
e+.0]-
'!6_Y
K(ZuYz
1jpz3j
YA5)*
g$cwa<
.( AQJl
6!:F?g
-o)r]$%
HE8~_4+
:7{wl]
H]k[4]O
F<*gtWV
n2prqowb
QH6J89
#5#rJ&
u!!"~
/QA1ia7
FH3$b8
XAm1sqZ
/s0Yr,=
L*Wqw@NL
uop,)/
xd\m1_
^*6g>b
jajCQy!
zGK^pd
q5hnF{
3KTum'z
"IteJh
"u9uS
f,R`Dm
v25.4'>_U
aO}Vh:
:ihuS0s
:4OZ0#
pE3$tQ
0[xVvrL|
M.#BW"0d
,)eejE
,% ,1
T_37*?
Q=PD+L1z
[{\R<f
-HiC^x
-wAk 2V
AXZudj
}J?%#AM
k]V@X'
gA.G4
TKW*4k
On,/1f
L@!F/O
FHy3O"M
cFl5XV
68GxQV!
TkW7m#
sTIU(~
"dWc9]
=1^pRf
B'L"6j
D4,a!gp=
<KamUN,.
:J}@,*g
-$P2NV
:,X*Aj
5}]L3)DbY
-+6GXU
&cT{N{1C
d*LmXE
Yn2?Rg
cQFXZ(
JMAl5Qb
l4`ep$^
zxnENY
~^M]fVU(]
NN*^d{v,
H,!j7k
3fbMEQ
0q2.N.0
^U6s T
SXz) n
C)~3tH
&\v?i1A=/
2F0(@W
E9OH.]1
(aOh&2
-9]"o{
V]gVBQ
0(ujwL
}nD3,3!
N6OYcs
1zcE(b
0Aktdx
I\j,,s
aO%y
TwCBjE
ha4oREn3z
-&}d?\q|5
8=>-Eg
/GUdV_W5<
La`dz
j'tqJY
|+\Q"d
<?xml version="1.0" encoding="utf-8"?>
<assembly manifestVersion="1.0" xmlns="urn:schemas-microsoft-com:asm.v1">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="requireAdministrator" uiAccess="false" />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
dfmbmtlnuuinupqxltqwcvp
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
0.0.0.0
InternalName
crock.exe
LegalCopyright
OriginalFilename
crock.exe
ProductVersion
0.0.0.0
Assembly Version
0.0.0.0
Antivirus Signature
Bkav Clean
Elastic malicious (high confidence)
DrWeb Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
McAfee Artemis!E74B2720EAF3
Malwarebytes Malware.AI.4209042470
VIPRE Clean
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_80% (W)
BitDefender Trojan.GenericKD.46968833
K7GW Trojan ( 005806661 )
K7AntiVirus Trojan ( 005806661 )
BitDefenderTheta Clean
Cyren W64/MSIL_Troj.BKE.gen!Eldorado
ESET-NOD32 a variant of MSIL/GenKryptik.FIJI
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.MSIL.Tasker.gen
Alibaba Trojan:MSIL/Tasker.fb0ac696
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Trojan.GenericKD.46968833
Rising Clean
Ad-Aware Trojan.GenericKD.46968833
Emsisoft Trojan.GenericKD.46968833 (B)
Comodo Clean
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win64.Generic.cc
FireEye Generic.mg.e74b2720eaf32bfc
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
GData Trojan.GenericKD.46968833
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira TR/Crypt.ZPACK.Gen7
Antiy-AVL Clean
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Trojan.Heur!.031124E3
Arcabit Trojan.Generic.D2CCB001
ViRobot Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/AgentTesla!ml
AhnLab-V3 Trojan/Win.Generic.C4591915
Acronis Clean
VBA32 Trojan.MSIL.Tasker
ALYac Trojan.GenericKD.46968833
TACHYON Clean
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall TROJ_FRS.0NA103II21
Tencent Clean
Yandex Clean
MAX malware (ai score=85)
eGambit Unsafe.AI_Score_99%
Fortinet W32/Tasker.FIJI!tr
AVG Win64:Trojan-gen
Avast Win64:Trojan-gen
MaxSecure Trojan.Malware.300983.susgen
No IRMA results available.