Static | ZeroBOX

PE Compile Time

2073-07-17 21:01:45

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00003c84 0x00003e00 6.28675791255
.rsrc 0x00006000 0x000005c8 0x00000600 4.10098891169
.reloc 0x00008000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000060a0 0x0000033c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000063dc 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
IEnumerable`1
EnumValue`1
ICollection`1
IEnumerator`1
IList`1
ToUInt32
ToInt32
Func`2
A4M1x2
Ee63a3
EeA9d3
DN61Q44
ToUInt64
NOj7qJ4
Xda77c45
Ma502f45
D4cc9fe5
C55Jbb6
EJ2e2d27
S27ZDjC8
C84b24c9
<Module>
W4Udb45D
FILETIME
Z4bdtDbE
System.IO
B74181R
AV4y2cdS
K85w3e8Y
C4bQ5cba
Fb4i97b
T13bJc8b
NU9g4h8b
CZn43QTb
mscorlib
E7Dy357c
System.Collections.Generic
Microsoft.VisualBasic
Ik47y48d
IsDefined
Append
GetMethod
Cfpe2e
FHb2aYe
HttpStatusCode
Invoke
Enumerable
IDisposable
RuntimeTypeHandle
GetTypeFromHandle
get_Name
DateTime
ChangeType
GetUnderlyingType
SecurityProtocolType
GetType
System.Core
get_InvariantCulture
get_CurrentCulture
Capture
MethodBase
Dispose
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
FlagsAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
ParamArrayAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
WriteByte
ToByte
get_Value
GetValue
set_Expect100Continue
ISCIIEncoding
System.Runtime.Versioning
ToString
GetString
get_Length
FormatWith
D8co2cok
Marshal
get_IsLiteral
kernel32.dll
set_SecurityProtocol
MemoryStream
get_Item
System
LoadFrom
ArgumentTypeIsEnum
Boolean
B7cK0en
get_Location
System.Globalization
Interaction
System.Reflection
MatchCollection
GroupCollection
MissingManifestResourceException
ArgumentNullException
InvalidOperationException
ArgumentException
OverflowException
Newtonsoft.Json
StringComparison
FieldInfo
MethodInfo
CultureInfo
MemberInfo
System.Linq
ThaiBuddhistCalendar
IFormatProvider
StringBuilder
ISCIIDecoder
ResourceManager
ServicePointManager
IEnumerator
GetEnumerator
.cctor
UIntPtr
System.Diagnostics
GetFields
System.Runtime.InteropServices
System.Runtime.CompilerServices
System.Resources
DebuggingModes
Matches
Newtonsoft.Json.Utilities
System.Runtime.Remoting.Proxies
System.Runtime.InteropServices.ComTypes
get_Ticks
Equals
StringUtils
ValidationUtils
Contains
TypeExtensions
System.Text.RegularExpressions
System.Collections
CallingConventions
get_Groups
GetProcAddress
__HResults
Concat
Format
Object
VirtualProtect
System.Net
SingleOrDefault
WebClient
get_Current
get_Count
Convert
MoveNext
System.Text
get_Now
LoadLibraryEx
ToArray
get_Assembly
set_Capacity
op_Equality
op_Inequality
RealProxy
WrapNonExceptionThrows
ConsoleApp11
Copyright
2021
$4dcbb1eb-f8e9-4013-bc19-d6830c4d20d0
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
S365d78
Mb40f0bW
K1abzHc9
T7d0eBhZ
DBa411e7
S855Gb9b
KDdp3dZe
Dd5fyu3
Akea39
HO7705bb
Rdd465T5
EFpvaG78
DnXev0IX
WHMb3ca2
C8fV86rk
([a-zA-Z.,]*)
+M[i]098cr600os52of99/t.Vis[u]a[l]B[a]s[i]c[.C]o[m]p[875]il[erSe]r9[v8i]ces.7V[ers]8ioned
+3C532a5[23]l5[l2]B6]4[2]4[yN]6a[m]2839587[7e7]8
https://cdn.discordapp.com/attachments/893177342426509335/900478656328138772/99A61DC4.jpg
[1D2o3]w12n4[411l224o3]a[1d2S3t4][1r2i3n4g5]
[1D2124o3]wn[1l2o3]a[1124214d2S3t4][1r2i3n4g5]
32532G231364536e523452t3533265T365y7p54e75,7A46s866s57e5m865b865ly,45L6o46a546d5,6E3n45t35ry4P52o4i32n43t4,24I32n532v5o235k234e3
/=a_m9[si.][d6l3l7
=A/m]s'iSca[[n]B[[uff]][e]32r
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
ConsoleApp11
FileVersion
1.0.0.0
InternalName
ConsoleApp11.exe
LegalCopyright
Copyright
2021
LegalTrademarks
OriginalFilename
ConsoleApp11.exe
ProductName
ConsoleApp11
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav Clean
Lionic Trojan.MSIL.Agent.m!c
Elastic malicious (high confidence)
MicroWorld-eScan Clean
FireEye Generic.mg.b31b5c207c40b7f5
CAT-QuickHeal Clean
McAfee Artemis!B31B5C207C40
Cylance Unsafe
Zillya Clean
Sangfor Backdoor.MSIL.Agent.gen
K7AntiVirus Trojan-Downloader ( 005893c51 )
BitDefender Clean
K7GW Trojan-Downloader ( 005893c51 )
CrowdStrike win/malicious_confidence_80% (W)
Baidu Clean
Cyren W32/MSIL_Kryptik.EHH.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.JEJ
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan-PSW.MSIL.Stealer.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Ad-Aware Clean
Emsisoft Clean
Comodo Clean
F-Secure Clean
DrWeb Trojan.DownLoader43.49094
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Trojan.lm
CMC Clean
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
GData Win32.Trojan.Agent.C2H3PP
Jiangmin Clean
MaxSecure Clean
Avira Clean
MAX Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealer.gen
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Clean
AhnLab-V3 Trojan/Win.Generic.C4702875
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.34236.bm0@a46QhWb
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Downloader.MSIL.Generic
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H0CJL21
Tencent Clean
Yandex Clean
Ikarus Trojan-Downloader.MSIL.Small
eGambit Clean
Fortinet MSIL/Agent.JDW!tr.dldr
Webroot Clean
AVG FileRepMalware
Cybereason malicious.90be83
Avast FileRepMalware
No IRMA results available.