Static | ZeroBOX

PE Compile Time

2099-09-04 05:29:45

PDB Path

C:\Users\1234\Desktop\?????????????? ?????? ????????????\?????????? ??????????\bin\Release\Secured\Stub.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000758e0 0x00075a00 6.65388440986
.rsrc 0x00078000 0x000005cc 0x00000600 4.13306613431
.reloc 0x0007a000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000780a0 0x00000340 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000783e0 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
%Wr@
%[rX
%^r*!
%_rp!
%brB"
%frZ#
%ir,$
%jrr$
%mrD%
%qr\&
%tr.'
%urt'
%xrF(
%|r^)
%!rJ{
%$rL|
%'rN}
%*rP~
v4.0.30319
#Strings
Stub.exe
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
AssemblyTitleAttribute
System.Reflection
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
Object
System
X509Certificate
System.Security.Cryptography.X509Certificates
EventWaitHandle
System.Threading
RegistryKey
Microsoft.Win32
StreamReader
System.IO
EventArgs
STAThreadAttribute
Exception
CompilerGeneratedAttribute
ThreadStart
StringBuilder
System.Text
StreamWriter
List`1
System.Collections.Generic
Enumerator
Random
DateTime
RNGCryptoServiceProvider
System.Security.Cryptography
MemoryStream
ValueType
Delegate
Environment
SpecialFolder
EventResetMode
Thread
WaitHandle
Registry
IDisposable
String
Stream
TextReader
Encoding
Convert
EventHandler
IEnumerable`1
RegistryKeyPermissionCheck
IntPtr
Marshal
OperatingSystem
DriveInfo
MD5CryptoServiceProvider
HashAlgorithm
Directory
DirectoryInfo
FileSystemInfo
Assembly
FileAttributes
FileStream
FileMode
TextWriter
FileInfo
RuntimeTypeHandle
RandomNumberGenerator
RuntimeHelpers
RuntimeFieldHandle
SecuritySafeCriticalAttribute
System.Security
Hashtable
System.Collections
Monitor
AppDomain
ResolveEventHandler
ObfuscationAttribute
ResolveEventArgs
Version
PropertyInfo
ICryptoTransform
BinaryReader
DESCryptoServiceProvider
SymmetricAlgorithm
CryptoStream
CryptoStreamMode
MulticastDelegate
IAsyncResult
AsyncCallback
FileSystemAccessRule
System.Security.AccessControl
FileSecurity
WindowsImpersonationContext
System.Security.Principal
IdentityReference
FileSystemRights
AccessControlType
SecurityIdentifier
FileSystemSecurity
WindowsIdentity
StackTrace
StackFrame
MethodBase
RuntimeMethodHandle
Module
ModuleHandle
FieldInfo
MethodInfo
ParameterInfo
DynamicMethod
System.Reflection.Emit
ILGenerator
BindingFlags
MemberInfo
BitConverter
OpCodes
OpCode
X509Chain
SslPolicyErrors
System.Net.Security
SslProtocols
System.Security.Authentication
SecurityProtocolType
System.Net
WebClient
IContainer
System.ComponentModel
ProcessStartInfo
GZipStream
System.IO.Compression
ServicePointManager
RemoteCertificateValidationCallback
WebRequest
WebResponse
Process
ProcessWindowStyle
ProcessModule
IWebProxy
WebHeaderCollection
NameValueCollection
System.Collections.Specialized
System.Text.RegularExpressions
CompressionMode
System.Windows.Forms
Message
Control
ContainerControl
AutoScaleMode
Clipboard
Screen
Application
Bitmap
System.Drawing
Rectangle
Graphics
ImageFormat
System.Drawing.Imaging
HashSet`1
Enumerable
System.Linq
ManagementObject
System.Management
ManagementObjectCollection
ManagementObjectEnumerator
ManagementBaseObject
ManagementObjectSearcher
<Module>
SslProtocolsExtensions
SecurityProtocolTypeExtensions
Client
<PrivateImplementationDetails>
<>c__DisplayClass5_0
<AgileDotNetRT>
InitializeDelegate
ExitDelegate
{FE3C441D-DF9D-407b-917D-0B4471A8296C}
SystemDefault
ECD2A46F33C483276DC36347ED09334C18ED033AB0438CA76929E595EB8C2E30
<>9__0_0
<>9__5_0
<>9__5_1
inited
runtimeAssembly
9AAAAA==
LgAAAA==
9QAAAA==
9gAAAA==
iQAAAA==
NwAAAA==%
PAAAAA==%
egAAAA==%
JwEAAA==%
UgAAAA==%
qAAAAA==%
OQAAAA==
EwAAAA==%
FAAAAA==%
FQAAAA==%
FQAAAA==
+AAAAA==
+QAAAA==%
FwAAAA==%
7wAAAA==%
8gAAAA==%
hAAAAA==%
GAAAAA==%
FgAAAA==%
KwEAAA==%
EAAAAA==%
UwAAAA==%
fQAAAA==%
AQEAAA==%
fgAAAA==%
DAAAAA==%
MAAAAA==
PgAAAA==
+gAAAA==%
PQAAAA==
SgAAAA==
qQAAAA==
VAAAAA==
TAAAAA==
VQAAAA==
FAEAAA==
6AAAAA==%
/QAAAA==
EgAAAA==%
XQAAAA==
XwAAAA==
YQAAAA==
sAAAAA==
YgAAAA==
VgAAAA==
XgAAAA==%
QAAAAA==
QQAAAA==
ZgAAAA==
MgAAAA==
NAAAAA==
NQAAAA==
GAEAAA==
aAAAAA==
OAAAAA==
LwAAAA==
FQEAAA==
FgEAAA==%
HgEAAA==
IAEAAA==%
HwEAAA==%
IgEAAA==
IQEAAA==%
FwEAAA==
GQAAAA==%
cAAAAA==
MQAAAA==
bwAAAA==
MwAAAA==
ZwAAAA==
aQAAAA==
agAAAA==
YAAAAA==%
sQAAAA==%
VwAAAA==
8AAAAA==%
8QAAAA==%
/gAAAA==
eQAAAA==
fAAAAA==
mgAAAA==
WAAAAA==
WQAAAA==
/wAAAA==
AAEAAA==%
JQAAAA==%
JgAAAA==%
iwAAAA==%
RQAAAA==
BQEAAA==
hgAAAA==
owAAAA==
fwAAAA==%
hwAAAA==%
iAAAAA==
JwAAAA==%
KAAAAA==
6gAAAA==%
AgEAAA==%
6wAAAA==%
SAAAAA==
7AAAAA==%
SQAAAA==
7QAAAA==%
KQEAAA==%
TwAAAA==%
kgAAAA==
kwAAAA==
pgAAAA==
pwAAAA==
jwAAAA==%
kAAAAA==%
ZAAAAA==
IQAAAA==%
kQAAAA==%
rgAAAA==%
ogAAAA==%
rQAAAA==%
TQAAAA==
WgAAAA==
WwAAAA==
uQAAAA==%
XAAAAA==
cQAAAA==
vQAAAA==%
vgAAAA==%
vwAAAA==%
lQAAAA==
lwAAAA==%
lgAAAA==%
oQAAAA==
pAAAAA==
pQAAAA==%
mwAAAA==%
nAAAAA==
nQAAAA==%
nwAAAA==%
oAAAAA==%
.cctor
WndProc
Dispose
<Main>b__0_0
<Getinstalstart23>b__2
<Getinstalstart23>b__5_0
<Getinstalstart23>b__5_1
LoadLibraryA
GetProcAddress
_Initialize
_Initialize64
_AtExit
_AtExit64
InitializeThroughDelegate
InitializeThroughDelegate64
ExitThroughDelegate
ExitThroughDelegate64
DomainUnload
Initialize
PostInitialize
BeginInvoke
EndInvoke
Invoke
sender
disposing
strToHash
uFormat
format
hWndNewOwner
wParam
lParam
className
caption
parent
startChild
origTxt
filename
contentType
regexStr
domain
length
resourceStream
proxyDelegateTypeToken
get_Value
ToString
OpenSubKey
CreateSubKey
SetValue
GetValue
DeleteValue
Append
NextBytes
get_Now
get_Ticks
ToArray
Combine
GetFolderPath
get_ProcessorCount
get_UserName
get_OSVersion
get_MachineName
get_SystemDirectory
SignalAndWait
CurrentUser
LocalMachine
op_Inequality
Concat
get_Length
Substring
ToUpper
get_Chars
Format
op_Equality
IsNullOrEmpty
Equals
ReadToEnd
Exists
Delete
ReadAllBytes
ReadLines
SetAttributes
OpenWrite
GetAccessControl
SetAccessControl
get_UTF8
GetString
get_ASCII
GetBytes
get_Default
FromBase64String
ToBase64String
ToChar
GetTempFileName
GetPathRoot
GetTempPath
GetFileName
GetFullPath
get_Size
PtrToStringUni
GetDelegateForFunctionPointer
get_TotalSize
ComputeHash
CreateDirectory
Refresh
get_Name
GetExecutingAssembly
get_Location
get_CodeBase
GetCustomAttributes
GetManifestResourceStream
LoadFile
WriteLine
GetTypeFromHandle
InitializeArray
ContainsKey
get_Item
set_Item
get_CurrentDomain
add_ResourceResolve
add_DomainUnload
GetManifestResourceNames
get_Position
get_Version
get_Major
GetProperty
ReadString
ReadBytes
ReadInt32
set_Key
set_IV
CreateDecryptor
AddAccessRule
Impersonate
get_FrameCount
GetFrame
GetMethod
get_MethodHandle
GetFunctionPointer
GetModules
get_ModuleHandle
ResolveTypeHandle
ResolveMethodHandle
GetFields
get_FieldType
get_ReturnType
CreateDelegate
get_ParameterType
GetILGenerator
EndsWith
TrimEnd
ToUInt32
GetMethodFromHandle
get_IsStatic
GetParameters
Ldarg_0
Ldarg_1
Ldarg_2
Ldarg_3
Ldarg_S
Callvirt
DownloadFile
set_Proxy
get_Headers
get_Encoding
UploadData
DownloadString
set_FileName
set_CreateNoWindow
set_WindowStyle
set_Arguments
get_ServerCertificateValidationCallback
set_ServerCertificateValidationCallback
set_SecurityProtocol
Create
GetResponse
GetResponseStream
get_LocalPath
GetCurrentProcess
get_MainModule
get_FileName
IsMatch
Replace
set_ClientSize
add_Load
get_Msg
SuspendLayout
set_Name
set_Text
ResumeLayout
get_Handle
set_AutoScaleDimensions
set_AutoScaleMode
ContainsText
SetText
get_PrimaryScreen
get_Bounds
get_ExecutablePath
get_Width
get_Height
FromImage
CopyFromScreen
get_Png
ToList
GetEnumerator
get_Current
MoveNext
Contains
user32.dll
kernel32.dll
user32
AgileDotNetRT.dll
AgileDotNetRT64.dll
AddClipboardFormatListener
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
CloseClipboard
EmptyClipboard
GlobalLock
GlobalUnlock
PostMessage
FindWindow
FindWindowEx
mscorlib
System.Core
{FEA94A50-E5C8-4edd-BE62-F738BC8C043E}
80b13ce4-3eba-49eb-935b-0517099e441b
788086f6-8ca0-4e47-8d8a-507c7b3c79ad
WrapNonExceptionThrows
Microsoft Edge
Copyright
2021
$3d96442a-15c9-4908-9d66-2ce6acd8890e
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
!{tq!7
???}g?y?
`[gt~b
wUP|%*>QS
5-1i]c
,JT4234
5]7]$j
/"~a`d
R06a)'a
Ct_A(m
t"Vc:b
J`;y4{
%HLA8eo
8938l?M
(f"U0F
uj;P4?,e\
dJ BQ,N6"=
GxKdtAJZrc
w-7s~]
Gb;%L|
,kU2zB
M_GF]?
3ot?8j
?\7yCt
J-#)Tb
IS 8#e
BH|]}K
QMZh/Z
-XisB%
^|Z9US
:`IyX]
L#I2;b
L0q;~}
6$q$cF
jGmn^+
cF/vj
70#]`v
c-K#O0EN
>T/z W>
KHd5<P
tI-JuM
P8Z|w
\Wfx*3
1k9(#Y>"
h<9mnBvfB
wzbbNf
cjZnBJr
mbzJNj
o=0$-`
X2P}X2m
StmWU^
#.&*c&e
5&0yvfBf
,m@BZR
L]zfjBZ
6![K/#
UxrfvNB
P7#=)'
CfbzjFB
X8EWDw#C
k+_7#k
)5913=+]
5&!kjZn
,p)v)w9
^.sMr-s;
q5le$Wia
6\RY9<!]_c
d#pvK?Q
Tr?Nr.
wi>m8r
:4rF<sF
Z>]zt
3,v&w{
E@/ImR
Qz#l.8
@:LM|F
'Wp/my
AT0yH(p
'M={Jx
nVof
K|v4Xy
 @0}lv
toSyC7
zZ%z;9
C~TSx?
Xanv8I
{7NrTC
Zr'NbT
;T{d/F
L0Jv;z
j``aTJ4Q
hyUw^/
HYtHK
DXF|H?
m"zI[aW
B.6^]Ak
oCh'2+
sgSX]?
.64|t1j6
m}t5J]
t5j~XF
uRT0B
+ue*mG
4GUd]n
,?>Z4_cz
q'Bj9@c
tSZ=z[oy
C*c03^
7W"/{O
1T^SjY
\bctM9
M1vS@w$
4:+U;%
8{;6?|
bt`HS0?
xNlhtO
)uN;kV
*Q'b_I5
;[O%}j
-x.Tx^
|{FM#&hPw6
C}j#H<
=0Rz]b
@9j2|D
`m)L3s&
V%Q\`b
BBb#j#*/^
*-)Jn1
+<V[tc
zR'@N|
']{_@=}
9@~Eq+
'RC"SXL
El2Y?~
u#YtWY
n\{,RbBBs~U
T!4?-Ju
XZ--UZ
TSpI(x
LTCZg_
"I4;LA
lZTiOb
t6ok"Q_2
Fb+1v+
:bNTdB
0S9,=
r;NC}q
dxVD~g
\k3#cx
CJYL\np
AJGF5|
:iRV|7
*_kU;*q
-dpWn4
(9F~KL+
rP],Nz#
!~,Ng?
raY/sR)(5
+g>s%z
g.qcdq7
;`!3hU
{!~_9>
8B/F'Z
dtV:q j
J~L)#)
H1C|d1
,&8And1
4Ts&/{
Go*oY$
XD8YAR
*sf{Gd
a5$_T7
Tv@LG:
}Fy=]FM]Yw
Y+AERbN
Hs`TX4]
\thhBl
V>^m}<<
>^w1h.
59<6:*
\bHHx<
0\FG"I!
u7,g#l\
G9,'"\
;9#`f*
-9fc4;
wr*5kJs
*/Be$/
;EL9(_
\009+(9
VNq>WN
Pr,!8ea
[h`f]E
SGI?aL&
ECxQRj
R/g{WI
Ua$a'C1
fdjGb YV}}
i@R9cy
k7I5Se#6
ygA1$
c8Ds]H
O/*EI
N95wI`
l|*M2zz
nu4e>$bSI
8~fNCcR
eTw<~#^x
w'CK@R
yzBwe0Q
X36${Xp
iN|TK&
s!O.yf
{ao":`
S,`/Wh
?,x *TW
pG:-`t&
"7zvUYiBl
HK$b}ZQ_
'\G`Ja
|W2Crd
=6,cM
Y,IWIf
OlVCIC
tH!kRB
uBwwF-
v=d+:h
gGuf?p
&*Hox`
G[v_r~u
[?MXUs
LBC>9?^
5LlQE~
lIb3jO
"aQ!~i)
j`_@TM
plpB2J
mU!gVM
_:6z*}
'hvOwB
@j6U{[v
AiY"oWAV,
s;S7b<
ctHpoe
>db4(j
~7[l[X0m
%4#i\@T
{Cxp^5c
_Ef?Tu
+vx,>'S
Ws) }<
SU2$zR"
Kl8^Z{
dC}Rt+
2V|n?)
*#w[PE
ex~]?W
/oTkT)
0}>Kf;e
P\Z)_qn
7*tX(|
NOg"|8
1n6xOF
Q%xkVj
}nzcv
s8tOm[
k 8m5]
>G@=!
~}-/.
\d$H9%
`t<g\H
AVISZ
'rA*w/
_CorExeMain
mscoree.dll
C:\Users\1234\Desktop\?????????????? ?????? ????????????\?????????? ??????????\bin\Release\Secured\Stub.pdb
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_
RequestingAssembly
{FEA94A50-E5C8-4edd-BE62-F738BC8C043E}
80b13ce4-3eba-49eb-935b-0517099e441b
AgileDotNetRT
788086f6-8ca0-4e47-8d8a-507c7b3c79ad
AgileDotNetRT64
{0}{1}\
S-1-1-0
_Initialize
_Initialize64
_AtExit
_AtExit64
{FE3C441D-DF9D-407b-917D-0B4471A8296C}
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
Microsoft Edge
FileDescription
FileVersion
1.0.0.0
InternalName
Stub.exe
LegalCopyright
Copyright
2021
LegalTrademarks
Microsoft Edge
OriginalFilename
Stub.exe
ProductName
Microsoft Edge
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav Clean
Lionic Trojan.MSIL.Bingoml.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Clean
FireEye Generic.mg.81b5f1e1a01a8922
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason malicious.546247
BitDefenderTheta Clean
Cyren Clean
Symantec Clean
ESET-NOD32 a variant of MSIL/Agent.DOP
Baidu Clean
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan.MSIL.Bingoml.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Ad-Aware Clean
Sophos Mal/Generic-S
Comodo Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
CMC Clean
Emsisoft Clean
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
eGambit Unsafe.AI_Score_97%
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!81B5F1E1A01A
TACHYON Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Msil.Trojan.Bingoml.Eadh
Yandex Clean
Ikarus Trojan.Diztakun
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
Webroot Clean
AVG Win64:TrojanX-gen [Trj]
Avast Win64:TrojanX-gen [Trj]
CrowdStrike win/malicious_confidence_90% (W)
No IRMA results available.