Static | ZeroBOX

PE Compile Time

2023-03-10 11:57:07

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00003e24 0x00004000 5.49681915032
.reloc 0x00006000 0x0000000c 0x00000200 0.0815394123432

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.reloc
v2.0.50727
#Strings
<Module>
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
System
MulticastDelegate
CompilerGeneratedAttribute
System.Diagnostics
DebuggerDisplayAttribute
IAsyncResult
AsyncCallback
Object
EventHandler
EventArgs
DebuggerHiddenAttribute
System.Threading
ReleaseMutex
Thread
Microsoft.VisualBasic.Devices
ComputerInfo
System.Windows.Forms
Application
get_ExecutablePath
ThreadStart
Microsoft.VisualBasic
Strings
CompareMethod
STAThreadAttribute
Microsoft.VisualBasic.CompilerServices
NewLateBinding
LateCall
System.CodeDom.Compiler
CompilerResults
ProjectData
EndApp
add_ApplicationExit
Exception
SetProjectError
ClearProjectError
String
Operators
CompareString
Conversions
ToString
Concat
Microsoft.Win32
RegistryKey
Registry
CurrentUser
ConcatenateObject
OpenSubKey
GetValue
ToInteger
ToBoolean
Boolean
LateGet
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
ChangeType
RuntimeFieldHandle
InitializeArray
Convert
FromBase64String
System.Reflection
Assembly
SetValue
System.IO
MemoryStream
Process
GetCurrentProcess
get_Handle
IntPtr
op_Explicit
ConditionalCompareObjectEqual
System.Net.Sockets
SelectMode
CompareObjectLessEqual
AndObject
ConditionalCompareObjectGreater
SubtractObject
SocketFlags
Contains
ParameterizedThreadStart
LateIndexGet
get_Length
LateIndexSetComplex
LateSetComplex
TcpClient
set_ReceiveTimeout
set_SendTimeout
set_SendBufferSize
set_ReceiveBufferSize
Environment
get_MachineName
get_UserName
get_OSFullName
get_TotalPhysicalMemory
UInt64
System.Globalization
CultureInfo
get_CurrentCulture
get_Name
System.Net
GetHostName
IPHostEntry
GetHostByName
IPAddress
get_AddressList
System.Text
StringBuilder
Interaction
Environ
Conversion
System.Management
ManagementObjectCollection
ManagementObjectEnumerator
ManagementObject
ManagementObjectSearcher
GetEnumerator
ManagementBaseObject
get_Current
get_Item
ToInt32
MoveNext
IDisposable
Dispose
get_Capacity
Encoding
get_Default
GetBytes
GetString
System.Collections.Generic
List`1
ToArray
Stream
System.IO.Compression
GZipStream
set_Position
CompressionMode
get_UTF8
ToBase64String
ValueType
Nuclear Explosion.exe
kernel32
user32
avicap32.dll
kernel32.dll
ntdll.dll
mscorlib
VB$AnonymousDelegate_0
Atomic
Nuclear_Explosion
_Closure$__
<PrivateImplementationDetails>
__StaticArrayInitTypeSize=43
__StaticArrayInitTypeSize=6
TargetObject
TargetMethod
BeginInvoke
DelegateCallback
DelegateAsyncState
EndInvoke
DelegateAsyncResult
Invoke
.cctor
Execute
GetVolumeInformationA
GetForegroundWindow
GetWindowText
lpString
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
EmptyWorkingSet
hProcess
GetProduct
Product
Decompress
Encode
Decode
_Lambda$__R32-2
$I24-0
$IR24-1
_Lambda$__R24-1
_Lambda$__24-0
03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
5B1EE7CAD3DFF220A95D1D6B91435D9E1520AC41
Nuclear Explosion
<generated method>
<generated method>
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
AVTQGJX
*-]NK[-*
127.0.0.1,songs-travel.at.ply.gg,tcp://5.tcp.eu.ngrok.io,
333,37734,12792,
R3Vlc3Q=
RV_MUTEX
Software\
HKEY_CURRENT_USER\SOFTWARE\
CreateInstance
Client
Connected
Available
Receive
ToArray
Dispose
length
Disconnect
Connect
Information
Select * from AntiVirusProduct
SELECT * FROM FirewallProduct
SendBufferSize
Length
SystemDrive
select * from Win32_Processor
AddressWidth
root\SecurityCenter
displayName
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0
ProcessorNameString
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Clean
tehtris Clean
MicroWorld-eScan IL:Trojan.MSILZilla.47877
ClamAV Win.Dropper.LimeRAT-9776087-0
FireEye Generic.mg.655f6edee75a4cc4
CAT-QuickHeal Trojan.Generic.TRFH253
ALYac IL:Trojan.MSILZilla.47877
Malwarebytes Crypt.Trojan.MSIL.DDS
Zillya Trojan.Agent.Win32.840141
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 700000121 )
BitDefender IL:Trojan.MSILZilla.47877
K7GW Trojan ( 700000121 )
CrowdStrike win/malicious_confidence_100% (D)
Baidu Clean
VirIT Backdoor.Win32.RevetRat.C
Cyren W32/Revetrat.A.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/Agent.APN
APEX Clean
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Backdoor.MSIL.Revenge.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
TACHYON Clean
Emsisoft IL:Trojan.MSILZilla.47877 (B)
F-Secure Clean
DrWeb BackDoor.RevetRat.2
VIPRE IL:Trojan.MSILZilla.47877
TrendMicro BKDR_REVET.SM
McAfee-GW-Edition BehavesLike.Win32.Generic.lm
Trapmine malicious.high.ml.score
CMC Clean
Sophos Mal/Revet-A
Ikarus Backdoor-Rat.Revenge
GData IL:Trojan.MSILZilla.47877
Jiangmin Clean
Webroot Clean
Avira TR/ATRAPS.Gen
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Backdoor.MSIL.Revetrat.A@8fr3ae
Arcabit IL:Trojan.MSILZilla.DBB05
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Clean
Google Detected
AhnLab-V3 Trojan/Win.MSIL.R524851
Acronis suspicious
McAfee GenericRXEK-KS!655F6EDEE75A
MAX malware (ai score=82)
VBA32 Backdoor.MSIL.Revenge.Heur
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall BKDR_REVET.SM
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
Fortinet MSIL/RevengeRat.APN!tr
BitDefenderTheta Gen:NN.ZemsilF.36308.biW@aKfoPOl
AVG Win32:MalwareX-gen [Trj]
Avast Win32:MalwareX-gen [Trj]
No IRMA results available.