Static | ZeroBOX

PE Compile Time

2073-07-17 21:01:45

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00003064 0x00003200 6.25243183241
.rsrc 0x00006000 0x000023c0 0x00002400 4.59385024722
.reloc 0x0000a000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000078e0 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x000078e0 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x000078e0 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x00007e48 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x00007e78 0x0000035c LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000081d4 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
I5uf5fM0
Jb6de0
Expression`1
List`1
ToUInt32
ToInt32
Acb5pw72
Func`3
AR15d988
<Module>
W8a27acD
D908bF
Df1158L
System.IO
D14fSb3P
CkGhYT
IzfeVb9a
Lambda
B50t5ka
mscorlib
H07b48c
System.Collections.Generic
Microsoft.VisualBasic
Cv2135jc
BF89JKd
N8f192Wd
Append
get_Method
MakeGenericMethod
GetMethod
BiE88Fce
Invoke
IDisposable
Double
RuntimeTypeHandle
SafeFileMappingHandle
GetTypeFromHandle
Compile
get_Type
GetFuncType
SecurityProtocolType
GetActionType
GetType
System.Core
Capture
MethodBase
Dispose
TimeSpanParse
Delegate
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
IContextAttribute
ParamArrayAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
WriteByte
ToByte
get_Value
set_Expect100Continue
System.Runtime.Versioning
ToString
GetString
Marshal
kernel32.dll
set_SecurityProtocol
MemoryStream
get_Item
System
LoadFrom
Boolean
LambdaExpression
MethodCallExpression
ParameterExpression
get_Location
System.Globalization
Action
Interaction
System.Reflection
MatchCollection
GroupCollection
GetGenericMethodDefinition
MissingManifestResourceException
MethodInfo
Fb4597p
CDSCollectionETWBCLProvider
StringBuilder
System.Resources.ResourceManager
ServicePointManager
StringParser
Parameter
IEnumerator
GetEnumerator
.cctor
UIntPtr
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
System.Resources
DebuggingModes
Matches
Microsoft.Win32.SafeHandles
Equals
Contains
System.Linq.Expressions
System.Text.RegularExpressions
System.Collections
get_Groups
GetProcAddress
System.Runtime.Remoting.Contexts
Concat
Format
Object
VirtualProtect
System.Net
WebClient
get_Current
System.Collections.Concurrent
Convert
SynchronizedList
MoveNext
System.Text
LoadLibraryEx
ToArray
get_Assembly
get_Capacity
op_Inequality
WrapNonExceptionThrows
ConsoleApp11
Copyright
2021
$4dcbb1eb-f8e9-4013-bc19-d6830c4d20d0
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
sOX4A__p
ttttG9
=HHE25Q+S
]}TEG==
&rrprrQ|
uSccktt[O{
8^_cjqv}
Vecb_^_hpv
Jo_I5fc-9Wjs{
vuL8'om!+>^cox
X}}D)TusL"0c^_mv\
|zusojc__kv
}wtqjf__m%v
zuqkf__&W
{vqjc^&%
{uqjc/
Jj[*$`\ddddl\rt}7
((((((
'*(%*2+
==<:741-
6>>=<84$
;>>><8!'
.>>>;6(
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
Ad1bc92
JQb8dc9
M469b3af
([a-zA-Z.,]*)
+M[i]098cr600os52of99/t.Vis[u]a[l]B[a]s[i]c[.C]o[m]p[875]il[erSe]r9[v8i]ces.7V[ers]8ioned
+3C532a5[23]l5[l2]B6]4[2]4[yN]6a[m]2839587[7e7]8
https://cdn.discordapp.com/attachments/893177342426509335/900460516747657216/95E3E248.jpg|https://cdn.discordapp.com/attachments/893177342426509335/900460520904200212/8BA525E2.jpg
[1D2o3]w12n4[411l224o3]a[1d2S3t4][1r2i3n4g5]
[1D2124o3]wn[1l2o3]a[1124214d2S3t4][1r2i3n4g5]
32532G231364536e523452t3533265T365y7p54e75,7A46s866s57e5m865b865ly,45L6o46a546d5,6E3n45t35ry4P52o4i32n43t4,24I32n532v5o235k234e3
/=a_m9[si.][d6l3l7
=A/m]s'iSca[[n]B[[uff]][e]32r
VS_VERSION_INFO
StringFileInfo
040904e4
ProductName
Ad Muncher
FileDescription
Ad Muncher
CompanyName
Murray Hurps Software Pty Ltd
LegalCopyright
Copyright
Murray Hurps Software Pty Ltd
LegalTrademarks
643400e0 9989 4623 bef4 efd62316fcfc
Comments
52a9a98a a38f 43f5 90c0 c4d2bf8075a0
901d9142-829e-4e07-9048-a777625a655d
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Clean
FireEye Generic.mg.64420e27dd893025
CAT-QuickHeal Clean
McAfee Artemis!64420E27DD89
Cylance Unsafe
VIPRE Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike Clean
Baidu Clean
Cyren W32/MSIL_Kryptik.EHH.gen!Eldorado
Symantec Clean
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.JEJ
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky HEUR:Trojan-Spy.MSIL.Stealer.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
Ad-Aware Clean
TACHYON Clean
Emsisoft Trojan.Crypt (A)
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Artemis
CMC Clean
Sophos Clean
SentinelOne Static AI - Malicious PE
GData Clean
Jiangmin Clean
MaxSecure Trojan.Malware.300983.susgen
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Script/Phonzy.B!ml
Cynet Clean
AhnLab-V3 Trojan/Win.Generic.R417060
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.34236.bm0@aupTZ0ni
ALYac Clean
MAX Clean
VBA32 Clean
Malwarebytes Trojan.Crypt.MSIL.Generic
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Trojan-Downloader.MSIL.Agent
eGambit Clean
Fortinet MSIL/Agent.JDW!tr.dldr
Webroot Clean
AVG Win32:Malware-gen
Cybereason Clean
Avast Win32:Malware-gen
No IRMA results available.