Static | ZeroBOX

PE Compile Time

2022-06-30 05:29:31

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000019d4 0x00001a00 5.59551928335
.rsrc 0x00004000 0x00011000 0x00011000 7.62357591773
.reloc 0x00016000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00014530 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00014530 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00014530 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00014530 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00014530 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x000149a8 0x0000004c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x00014a04 0x000002ec LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00014d00 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
v4.0.30319
#Strings
IEnumerable`1
Func`2
<Module>
System.IO
mscorlib
System.Collections.Generic
Thread
Synchronized
set_AutoScaleMode
CompressionMode
Invoke
Enumerable
IDisposable
RuntimeTypeHandle
GetTypeFromHandle
EventWaitHandle
set_WindowStyle
ProcessWindowStyle
get_Name
set_Name
set_FileName
get_FullName
WaitOne
SecurityProtocolType
System.Core
MethodBase
ApplicationSettingsBase
WebResponse
GetResponse
Dispose
Create
EditorBrowsableState
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
GeneratedCodeAttribute
DebuggerNonUserCodeAttribute
DebuggableAttribute
EditorBrowsableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
Jtqjzw.exe
set_ClientSize
System.Threading
System.Runtime.Versioning
String
disposing
System.Drawing
get_Length
get_owh
WaitCallback
System.ComponentModel
set_SecurityProtocol
ThreadPool
ContainerControl
BufferedStream
GetResponseStream
GZipStream
MemoryStream
QueueUserWorkItem
System
AppDomain
GetDomain
System.IO.Compression
System.Configuration
System.Globalization
System.Reflection
Exception
CopyTo
MethodInfo
CultureInfo
MemberInfo
ProcessStartInfo
System.Linq
GetMember
ResourceManager
ServicePointManager
System.CodeDom.Compiler
IContainer
.cctor
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
System.Resources
Jjumy.Properties.Resources.resources
DebuggingModes
Jjumy.Properties
GetTypes
Settings
System.Windows.Forms
Process
set_Arguments
Object
System.Net
WaitForExit
FirstOrDefault
ManualResetEvent
WebRequest
get_Text
set_Text
get_eav
get_eaw
set_eaw
get_jlw
set_CreateNoWindow
Jtqjzw
ToArray
get_Assembly
op_Equality
(++{S|
3System.Resources.Tools.StronglyTypedResourceBuilder
16.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
16.10.0.0
WrapNonExceptionThrows
$ada68a8f-6be8-4db3-b33a-5db3d26c0f70
5.190.0.219
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
&FKs%P
u!$T]X5
> BH!!
Y~]2M3h
7=7K3;9
e8\{"j
9|@eHU
hDBCUh)
xi'bwL
ZV9MSTEf{;
" eB"PB
&]!l&"
~>&=cT?Gc
v\f2MQ%#L2s
V4=+Xa
fGR'fR
kOt%`.
G+W;W!B
~2iW#v
BU"Di&
{y"m9^
;wn#MSk
]&`'*u
lmmakk
NzH]jN
xF13!ili$
,-q=k02
@45VhjS
b[s|l1W
mO2f6cb
0C}=dL
\aff&Z
4-|%M.
xJ;{Es
h4}4Ue
D>_`lx
45n.Vx
?{=p`Ja
vcY6kk
nE?e?Br
3g"! k
7"S`pp
Z-7(q=}
^HWSXw
MSYX^
@$=---ssa
"W(2}e
cx0LHI
sspm5@
kLM]b||
F*X3@0r
UISwZ(@
5VWW9~
tL0L-Z
o'pd'`r,
go/R^]
en.0KHy,
edh9.
Ue|{0!
x"3j3L
8.)#CI
z'c$5HR
|7(~h
ra8SPU
\fyy)*
[qn||<Z.kdd
X\\bqq)z^
Q[UKSkz
]0Br+3
koBX&h
G ?prg
Wm,%%,
DWFTf<
8Gw0DE
5i7<v{}R
A:)1*I
@'KSL%
{_%L]3
0ofDq^^S
rVKvXr
2LWJ70n
-[C.y}>
4EI|,{<}
888_}}}
>>>i---?000#111
111L|||
>>>g,,,<000!333
000Booo
???i...@987)
000,000%000
333*rrr
@@@R000$111
MMM1uuu
FFFJBBBF///
DDDF998
iiinqqqxBBB9&&&
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
https://discord.com/channels/@me/990887447170793522/991802468818243614
Vicxdkwqqqwzcgdvw
Ufhhjrdjalweshgcmzybsllw.Zrfuwkzaanjhhihcm
powershell
Jjumy.Properties.Resources
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
FileVersion
5.190.0.219
InternalName
Jtqjzw.exe
LegalCopyright
LegalTrademarks
OriginalFilename
Jtqjzw.exe
ProductName
ProductVersion
5.190.0.219
Assembly Version
5.190.0.219
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Trojan.Multi.Generic.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
FireEye Generic.mg.e47ba85363d968c9
CAT-QuickHeal Clean
McAfee Artemis!E47BA85363D9
Malwarebytes Trojan.Downloader.MSIL.Generic
Sangfor Clean
K7AntiVirus Clean
Alibaba Trojan:MSIL/DropperX.bb2ca6f0
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Cyren W32/MSIL_Agent.DKY.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.MKA
APEX Malicious
Paloalto generic.ml
ClamAV Clean
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan Clean
Tencent Msil.Trojan-downloader.Agent.Ajlj
Ad-Aware Clean
Emsisoft Clean
Comodo Clean
F-Secure Clean
DrWeb Trojan.DownLoaderNET.410
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Artemis!Trojan
Trapmine Clean
Sophos Clean
Ikarus Win32.Outbreak
Jiangmin Clean
Webroot W32.Dropper.Gen
Avira Clean
Kingsoft Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Gridinsoft Clean
Arcabit Clean
ViRobot Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Clean
TACHYON Clean
AhnLab-V3 Clean
Acronis suspicious
VBA32 Clean
ALYac Clean
MAX Clean
Cylance Unsafe
Panda Trj/RnkBend.A
Zoner Clean
TrendMicro-HouseCall Clean
Rising Trojan.Generic/MSIL@AI.90 (RDM.MSIL:q7CDluAORcC6KTF7KRAOjg)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Agent.MFK!tr.dldr
BitDefenderTheta Gen:NN.ZemsilF.34742.em0@aa!Rtyp
AVG Win32:DropperX-gen [Drp]
Avast Win32:DropperX-gen [Drp]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.