Static | ZeroBOX

PE Compile Time

2073-07-17 21:01:45

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00003064 0x00003200 6.25243183241
.rsrc 0x00006000 0x000023c0 0x00002400 4.59385024722
.reloc 0x0000a000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000078e0 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x000078e0 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x000078e0 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x00007e48 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x00007e78 0x0000035c LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x000081d4 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
I5uf5fM0
Jb6de0
Expression`1
List`1
ToUInt32
ToInt32
Acb5pw72
Func`3
AR15d988
<Module>
W8a27acD
D908bF
Df1158L
System.IO
D14fSb3P
CkGhYT
IzfeVb9a
Lambda
B50t5ka
mscorlib
H07b48c
System.Collections.Generic
Microsoft.VisualBasic
Cv2135jc
BF89JKd
N8f192Wd
Append
get_Method
MakeGenericMethod
GetMethod
BiE88Fce
Invoke
IDisposable
Double
RuntimeTypeHandle
SafeFileMappingHandle
GetTypeFromHandle
Compile
get_Type
GetFuncType
SecurityProtocolType
GetActionType
GetType
System.Core
Capture
MethodBase
Dispose
TimeSpanParse
Delegate
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
IContextAttribute
ParamArrayAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
WriteByte
ToByte
get_Value
set_Expect100Continue
System.Runtime.Versioning
ToString
GetString
Marshal
kernel32.dll
set_SecurityProtocol
MemoryStream
get_Item
System
LoadFrom
Boolean
LambdaExpression
MethodCallExpression
ParameterExpression
get_Location
System.Globalization
Action
Interaction
System.Reflection
MatchCollection
GroupCollection
GetGenericMethodDefinition
MissingManifestResourceException
MethodInfo
Fb4597p
CDSCollectionETWBCLProvider
StringBuilder
System.Resources.ResourceManager
ServicePointManager
StringParser
Parameter
IEnumerator
GetEnumerator
.cctor
UIntPtr
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
System.Resources
DebuggingModes
Matches
Microsoft.Win32.SafeHandles
Equals
Contains
System.Linq.Expressions
System.Text.RegularExpressions
System.Collections
get_Groups
GetProcAddress
System.Runtime.Remoting.Contexts
Concat
Format
Object
VirtualProtect
System.Net
WebClient
get_Current
System.Collections.Concurrent
Convert
SynchronizedList
MoveNext
System.Text
LoadLibraryEx
ToArray
get_Assembly
get_Capacity
op_Inequality
WrapNonExceptionThrows
ConsoleApp11
Copyright
2021
$4dcbb1eb-f8e9-4013-bc19-d6830c4d20d0
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
sOX4A__p
ttttG9
=HHE25Q+S
]}TEG==
&rrprrQ|
uSccktt[O{
8^_cjqv}
Vecb_^_hpv
Jo_I5fc-9Wjs{
vuL8'om!+>^cox
X}}D)TusL"0c^_mv\
|zusojc__kv
}wtqjf__m%v
zuqkf__&W
{vqjc^&%
{uqjc/
Jj[*$`\ddddl\rt}7
((((((
'*(%*2+
==<:741-
6>>=<84$
;>>><8!'
.>>>;6(
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
Ad1bc92
JQb8dc9
M469b3af
([a-zA-Z.,]*)
+M[i]098cr600os52of99/t.Vis[u]a[l]B[a]s[i]c[.C]o[m]p[875]il[erSe]r9[v8i]ces.7V[ers]8ioned
+3C532a5[23]l5[l2]B6]4[2]4[yN]6a[m]2839587[7e7]8
https://cdn.discordapp.com/attachments/893177342426509335/900460516747657216/95E3E248.jpg|https://cdn.discordapp.com/attachments/893177342426509335/900460520904200212/8BA525E2.jpg
[1D2o3]w12n4[411l224o3]a[1d2S3t4][1r2i3n4g5]
[1D2124o3]wn[1l2o3]a[1124214d2S3t4][1r2i3n4g5]
32532G231364536e523452t3533265T365y7p54e75,7A46s866s57e5m865b865ly,45L6o46a546d5,6E3n45t35ry4P52o4i32n43t4,24I32n532v5o235k234e3
/=a_m9[si.][d6l3l7
=A/m]s'iSca[[n]B[[uff]][e]32r
VS_VERSION_INFO
StringFileInfo
040904e4
ProductName
Ad Muncher
FileDescription
Ad Muncher
CompanyName
Murray Hurps Software Pty Ltd
LegalCopyright
Copyright
Murray Hurps Software Pty Ltd
LegalTrademarks
643400e0 9989 4623 bef4 efd62316fcfc
Comments
52a9a98a a38f 43f5 90c0 c4d2bf8075a0
901d9142-829e-4e07-9048-a777625a655d
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Trojan.MSIL.Stealer.l!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Generic.30896896
FireEye Generic.mg.64420e27dd893025
CAT-QuickHeal Clean
ALYac Trojan.GenericKD.37850028
Cylance Unsafe
VIPRE Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan-Downloader ( 005894211 )
BitDefender Trojan.Generic.30896896
K7GW Trojan-Downloader ( 005894211 )
CrowdStrike win/malicious_confidence_70% (W)
Baidu Clean
Cyren W32/MSIL_Kryptik.EHH.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.JEJ
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky HEUR:Trojan-Spy.MSIL.Stealer.gen
Alibaba TrojanSpy:MSIL/Stealer.4f11abe9
NANO-Antivirus Clean
ViRobot Trojan.Win32.Z.Agent.23040.BZR
Rising Clean
Ad-Aware Trojan.Generic.30896896
Emsisoft Trojan.Crypt (A)
Comodo Clean
F-Secure Clean
DrWeb Trojan.Siggen15.30013
Zillya Clean
TrendMicro TROJ_FRS.0NA103JN21
McAfee-GW-Edition RDN/Generic PWS.y
CMC Clean
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
GData Trojan.Generic.30896896
Jiangmin Clean
Webroot Clean
Avira TR/Dldr.Agent.gbmwn
MAX malware (ai score=100)
Antiy-AVL Clean
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Downloader.sa
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Spy.MSIL.Stealer.gen
Microsoft Trojan:MSIL/AgentTesla.SM!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.R417060
Acronis Clean
McAfee RDN/Generic PWS.y
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Crypt.MSIL.Generic
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TROJ_FRS.0NA103JN21
Tencent Msil.Trojan-spy.Stealer.Wmso
Yandex Clean
Ikarus Trojan-Downloader.MSIL.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Agent.JDW!tr.dldr
BitDefenderTheta Gen:NN.ZemsilF.34236.bm0@aupTZ0ni
AVG Win32:Malware-gen
Cybereason Clean
Avast Win32:Malware-gen
No IRMA results available.