Static | ZeroBOX

PE Compile Time

2076-05-20 00:05:59

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0017f5a4 0x0017f600 3.58126313531
.rsrc 0x00182000 0x000006e0 0x00000800 3.76136566048
.reloc 0x00184000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00182090 0x0000044e LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x001824f0 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
__StaticArrayInitTypeSize=1566720
CHEAT-MENU-1
WindowsFormsApp22
9FB8EECD4E58179B8EC1F52E7171CE818C5BD79B4A127E87EBC9F207531B58D2
<Module>
<PrivateImplementationDetails>
get_ASCII
mscorlib
get_Method
Invoke
RuntimeFieldHandle
RuntimeTypeHandle
GetTypeFromHandle
ValueType
GetType
MethodBase
CreateDelegate
website
CompilerGeneratedAttribute
GuidAttribute
UnverifiableCodeAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
SecurityPermissionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
ToByte
CHEAT-MENU-1.exe
Encoding
Logging
System.Runtime.Versioning
GetString
Substring
get_Length
RemoteControl
Program
System
SecurityAction
System.Reflection
Uqniprfqtltqpxdlxiznwpn
MethodInfo
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
System.Security.Permissions
get_Buffers
ToBuffers
RuntimeHelpers
Object
Convert
System.Text
InitializeArray
Assembly
System.Security
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
WrapNonExceptionThrows
Windows Progman Group Converter
Microsoft Corporation
&Microsoft
Windows
Operating System
Microsoft Corporation. All rights reserved.
$38710cab-60f9-41ae-a52d-c69e1aa194c3
10.0.17763.1
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
4D5A90000300000004000000FFFF0000B800000000000000400000000000000000000000000000000000000000000000000000000000000000000000800000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A2400000000000000504500004C01030028A1E3630000000000000000E0000E210B01060000EC0B000006000000000000520A0C000020000000200C000000400000200000000200000400000000000000040000000000000000600C000002000000000000030040850000100000100000000010000010000000000000100000000000000000000000F8090C005700000000200C002C0300000000000000000000000000000000000000400C000C00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000080000000000000000000000082000004800000000000000000000002E7465787400000058EA0B000020000000EC0B0000020000000000000000000000000000200000602E727372630000002C03000000200C000004000000EE0B00000000000000000000000000400000402E72656C6F6300000C00000000400C000002000000F20B000000000000000000000000004000004200000000000000000000000000000000
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
Yxkxgnx.Vjezswwaaizh
Ddwhgtunhmosmboaqgnqul
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Windows Progman Group Converter
CompanyName
Microsoft Corporation
FileDescription
Windows Progman Group Converter
FileVersion
10.0.17763.1
InternalName
CHEAT-MENU-1.exe
LegalCopyright
Microsoft Corporation. All rights reserved.
LegalTrademarks
OriginalFilename
CHEAT-MENU-1.exe
ProductName
Microsoft
Windows
Operating System
ProductVersion
10.0.17763.1
Assembly Version
10.0.17763.1
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Trojan.Win32.Scarsi.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.65751463
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
ALYac Trojan.GenericKD.65751463
Malwarebytes Trojan.Crypt.MSIL
Zillya Trojan.Kryptik.Win32.4052398
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0059ed4e1 )
BitDefender Trojan.GenericKD.65751463
K7GW Trojan ( 0059ed4e1 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.A
Cyren W32/ABRisk.KZPQ-1469
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Kryptik.AIAN
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.MSIL.Scarsi.gen
Alibaba Trojan:MSIL/Remcos.9ed305ae
NANO-Antivirus Trojan.Win32.Remcos.jvaxfz
ViRobot Clean
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:fJc9XHh8bOi37seBcEA0Sg)
Emsisoft Trojan.GenericKD.65751463 (B)
F-Secure Clean
DrWeb Trojan.Remcos.6
VIPRE Trojan.GenericKD.65751463
TrendMicro TROJ_GEN.R002C0DC123
McAfee-GW-Edition BehavesLike.Win32.Generic.tz
Trapmine Clean
FireEye Generic.mg.43c3f3e2e2815758
Sophos ML/PE-A
SentinelOne Static AI - Malicious PE
GData Trojan.GenericKD.65751463
Jiangmin Clean
Webroot Clean
Avira HEUR/AGEN.1253934
MAX malware (ai score=85)
Antiy-AVL Trojan/MSIL.Kryptik
Gridinsoft Trojan.Win32.Kryptik.cl
Xcitium Clean
Arcabit Trojan.Generic.D3EB49A7
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:MSIL/Remcos.AR!MTB
Google Detected
AhnLab-V3 Trojan/Win.Remcos.C5389982
Acronis suspicious
McAfee Artemis!43C3F3E2E281
TACHYON Clean
VBA32 TScope.Trojan.MSIL
Cylance unsafe
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0DC123
Tencent Msil.Trojan.Scarsi.Ktgl
Yandex Trojan.Kryptik!MHXcfm1xuwQ
Ikarus Trojan.Agent
MaxSecure Trojan.Malware.73692792.susgen
Fortinet MSIL/Agent.LYC!tr
BitDefenderTheta Gen:NN.ZemsilF.36308.Gn0@a8DC5pp
AVG Win32:RATX-gen [Trj]
Avast Win32:RATX-gen [Trj]
No IRMA results available.