Static | ZeroBOX

PE Compile Time

2020-05-10 14:24:51

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0000a714 0x0000a800 5.50630294508
.rsrc 0x0000e000 0x000007ff 0x00000800 4.88506844918
.reloc 0x00010000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0000e0a0 0x000002cc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0000e36c 0x00000493 LANG_NEUTRAL SUBLANG_NEUTRAL exported SGML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
Action`10
<>p__0
IEnumerable`1
CallSite`1
List`1
__StaticArrayInitTypeSize=32
Microsoft.Win32
ToUInt32
ToInt32
SwapInt32
<>o__2
X509Certificate2
WriteUInt64
ToUInt64
GetAsUInt64
SetAsUInt64
ToInt64
SwapInt64
ToUInt16
ToInt16
SwapInt16
HMACSHA256
Sha256
Aes256
aes256
__StaticArrayInitTypeSize=6
get_UTF8
<Module>
MessagePackLib.<PrivateImplementationDetails>
1DB2A1F9902B35F8F880EF1692CE9947A193D5A698D8F568BDA721658ED4C58B
ES_SYSTEM_REQUIRED
ES_DISPLAY_REQUIRED
MapNameToOID
get_FormatID
EXECUTION_STATE
87639126EA77B358F26532367DBA67C5310EF50A8D9888ED070CD40E1F605A8F
get_ASCII
System.IO
ES_CONTINUOUS
get_IV
set_IV
GenerateIV
value__
ReadServertData
mscorlib
System.Collections.Generic
Microsoft.VisualBasic
get_SendSync
EndRead
BeginRead
Thread
InnerAdd
SHA256Managed
get_Connected
get_IsConnected
set_IsConnected
Received
get_Guid
<SendSync>k__BackingField
<IsConnected>k__BackingField
<KeepAlive>k__BackingField
<HeaderSize>k__BackingField
<Ping>k__BackingField
<ActivatePong>k__BackingField
<Interval>k__BackingField
<Buffer>k__BackingField
<Offset>k__BackingField
<SslClient>k__BackingField
<TcpClient>k__BackingField
InnerAddMapChild
InnerAddArrayChild
Append
RegistryValueKind
Replace
CreateInstance
set_Mode
FileMode
PaddingMode
EnterDebugMode
CryptoStreamMode
CompressionMode
CipherMode
SelectMode
utf8Encode
DeleteSubKeyTree
get_Message
DetectSandboxie
Invoke
IEnumerable
IDisposable
ToDouble
SwapDouble
get_Handle
RuntimeFieldHandle
GetModuleHandle
RuntimeTypeHandle
GetTypeFromHandle
WaitHandle
WriteSingle
ToSingle
SetAsSingle
InstallFile
DecodeFromFile
SaveBytesToFile
IsInRole
WindowsBuiltInRole
GetActiveWindowTitle
get_MainModule
ProcessModule
set_WindowStyle
ProcessWindowStyle
get_Name
get_FileName
set_FileName
GetTempFileName
GetFileName
fileName
lpModuleName
get_MachineName
get_OSFullName
get_FullName
IsValidDomainName
get_UserName
lowerName
SetName
CheckHostName
DateTime
get_LastWriteTime
ToUniversalTime
WriteLine
Combine
UriHostNameType
get_ValueType
valueType
MsgPackType
ProtocolType
GetType
SocketType
FileShare
System.Core
Serversignature
Dispose
StrReverse
X509Certificate
ValidateServerCertificate
certificate
Create
SetThreadExecutionState
Delete
CallSite
CompilerGeneratedAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
DefaultMemberAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
set_UseShellExecute
ReadByte
WriteByte
DeleteValue
innerValue
GetValue
SetValue
get_KeepAlive
set_KeepAlive
Remove
TOKYO.exe
set_BlockSize
get_TotalSize
get_HeaderSize
set_HeaderSize
set_SendBufferSize
set_ReceiveBufferSize
set_KeySize
IndexOf
strFlag
CryptoConfig
get_Ping
set_Ping
System.Threading
set_Padding
add_SessionEnding
SystemEvents_SessionEnding
UTF8Encoding
System.Drawing.Imaging
System.Runtime.Versioning
FromBase64String
ToBase64String
ReadString
DownloadString
WriteString
ToString
get_AsString
set_AsString
BytesAsString
GetAsString
SetAsString
GetString
BytesAsHexString
Substring
System.Drawing
get_ActivatePong
set_ActivatePong
set_ErrorDialog
ComputeHash
strToHash
GetHash
VerifyHash
get_ExecutablePath
GetTempPath
HmacSha256Length
get_Length
IvLength
AuthKeyLength
msgpackObj
listObj
MessagePackLib.MessagePack
MsgPack
AsyncCallback
RemoteCertificateValidationCallback
TimerCallback
unpack_msgpack
RegistryKeyPermissionCheck
FlushFinalBlock
IsSmallDisk
strVal
RtlSetProcessIsCritical
ProcessCritical
NetworkCredential
System.Security.Principal
WindowsPrincipal
AreEqual
get_Interval
set_Interval
Client.Install
kernel32.dll
user32.dll
ntdll.dll
WriteNull
SetAsNull
MutexControl
Encode2Stream
FileStream
NetworkStream
SslStream
DecodeFromStream
CryptoStream
GZipStream
MemoryStream
Program
get_Item
get_Is64BitOperatingSystem
Client.Algorithm
SymmetricAlgorithm
AsymmetricAlgorithm
HashAlgorithm
Random
ICryptoTransform
MsgPackEnum
WriteBoolean
ToBoolean
SetAsBoolean
HwidGen
children
X509Chain
AppDomain
get_CurrentDomain
Pastebin
IsAdmin
GetFileNameWithoutExtension
get_OSVersion
System.IO.Compression
Application
System.Security.Authentication
System.Reflection
X509CertificateCollection
ManagementObjectCollection
Client.Connection
set_Position
position
CryptographicException
ArgumentNullException
ArgumentException
Unknown
ImageCodecInfo
SendInfo
FileInfo
DriveInfo
FileSystemInfo
ComputerInfo
CSharpArgumentInfo
ProcessStartInfo
WriteMap
PreventSleep
currentApp
Microsoft.CSharp
NormalStartup
System.Linq
InvokeMember
MD5CryptoServiceProvider
RSACryptoServiceProvider
AesCryptoServiceProvider
StringBuilder
InstallFolder
IdSender
sender
Microsoft.CSharp.RuntimeBinder
CallSiteBinder
GetEncoder
get_Buffer
set_Buffer
WriteInteger
get_AsInteger
set_AsInteger
GetAsInteger
SetAsInteger
DetectDebugger
ManagementObjectSearcher
SessionEndingEventHandler
Client.Helper
ToUpper
DetectManufacturer
CurrentUser
StreamWriter
TextWriter
BitConverter
ToLower
IEnumerator
ManagementObjectEnumerator
System.Collections.IEnumerable.GetEnumerator
Activator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
IntPtr
System.Diagnostics
NativeMethods
Microsoft.VisualBasic.Devices
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
ExpandEnvironmentVariables
GetProcesses
GetHostAddresses
System.Security.Cryptography.X509Certificates
Encode2Bytes
GetUtf8Bytes
utf8Bytes
Rfc2898DeriveBytes
ReadAllBytes
DecodeFromBytes
SwapBytes
LoadFileAsBytes
GetAsBytes
SetAsBytes
GetBytes
rawBytes
CSharpArgumentInfoFlags
CSharpBinderFlags
esFlags
Strings
InitializeSettings
SessionEndingEventArgs
Anti_Analysis
RunAntiAnalysis
ICredentials
set_Credentials
Equals
SslProtocols
ReadTools
WriteTools
BytesTools
System.Windows.Forms
Contains
System.Collections
StringSplitOptions
GetImageDecoders
RuntimeHelpers
SslPolicyErrors
sslPolicyErrors
FileAccess
hProcess
GetCurrentProcess
IPAddress
Compress
Decompress
System.Net.Sockets
set_Arguments
SystemEvents
Exists
Antivirus
Concat
ImageFormat
format
WriteFloat
get_AsFloat
set_AsFloat
GetAsFloat
SetAsFloat
FindObject
ManagementBaseObject
ForcePathObject
Collect
Connect
Reconnect
System.Net
Target
Client.Handle_Packet
KeepAlivePacket
ClientSocket
System.Collections.IEnumerator.Reset
get_Offset
set_Offset
ClientOnExit
IAsyncResult
ToUpperInvariant
WebClient
InitializeClient
get_SslClient
set_SslClient
get_TcpClient
set_TcpClient
AuthenticateAsClient
System.Management
Environment
parent
System.Collections.IEnumerator.Current
System.Collections.IEnumerator.get_Current
GetCurrent
CheckRemoteDebuggerPresent
isDebuggerPresent
get_RemoteEndPoint
get_Count
get_ProcessorCount
GetPathRoot
Decrypt
Encrypt
ParameterizedThreadStart
Convert
FailFast
ToList
System.Collections.IEnumerator.MoveNext
System.Text
GetWindowText
GetForegroundWindow
set_CreateNoWindow
CloseMutex
CreateMutex
WirteArray
InitializeArray
MsgPackArray
ToArray
get_AsArray
refAsArray
get_Key
set_Key
CreateSubKey
DeleteSubKey
OpenSubKey
get_PublicKey
_authKey
masterKey
RegistryKey
System.Security.Cryptography
Assembly
AddressFamily
BlockCopy
WriteBinary
ToBinary
get_SystemDirectory
SetRegistry
op_Equality
op_Inequality
System.Net.Security
WindowsIdentity
IsNullOrEmpty
WrapNonExceptionThrows
1.0.0.0
).NETFramework,Version=v4.0,Profile=Client
FrameworkDisplayName.NET Framework 4 Client Profile
_CorExeMain
mscoree.dll
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false" />
</requestedPrivileges>
</security>
</trustInfo>
<compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">
<application>
<!-- Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<!-- Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<!-- Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<!-- Windows 8.1 -->
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<!-- Windows 10 -->
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
</application>
</compatibility>
<asmv3:application xmlns:asmv3="urn:schemas-microsoft-com:asm.v3" >
<asmv3:windowsSettings xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">
<dpiAware>true</dpiAware>
</asmv3:windowsSettings>
</asmv3:application>
</assembly>
SHA256
FKpTtdslk3lwWF03V/JHadPwBl3poW/lYwe9jLrzpkGe46yivRpV3KIzj5m7M1z6JsiDrsW0ERqfPfK72VR5Cw==
MMK1OD6NOd3ddgfGnt5lGDZ0/0sBSdsY8y8jySZoOotpWAUV/MDXINd30gOn0nCShPZIY3jAPMEre0E6W1/ivA==
EnT3ZYvSIQsr8KLsnZA6ly4RiWHAVXsLh90p1lqQg3zSzrl7HoQHEj3Mt3Qyru0uE3yHDpbtq48BkmmXflRqWQ==
C0Oj6sMNvgAaz0iuRfXUTTQTSj3ExXN8DJWzbHTTuYcbl0Tr+flzdQI2+T+bU9Z7YuP0asTuCpXFmZN9EyHCrQ==
%AppData%
SHRCMHZ3dmdWNzJMV0pxQlZjNEZPRkVsM1F3ZmhPcnU=
CFwpeU232IWvRe1SvDjQJygJcCnbwXjXe5SnuMtkgKTH+LqLMBFrxqpRYkCjW+oJQUiJqvIomR6b+RD5A+k6gOctkg4m04DcniQGD4b6kGk=
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
tcJj/V7602Z8MQYVjRBCeasdejwNnkA0Yf7dIJT3zmGqSP/EvNErARf5jUClvtgZYz4DldFYa+SwzIeQ8axmqPZDJoJyt8lKevHLTAgp8cSAn8ZOO0oZKJpc7p8rf4p4o5Cs5Dop7Tx45WAjUkmigx6rHptqSS7KMQGST/6MDBuoVpj/0R2lZvgHT/5rIms+NnHFCwVaQH8deLmZuIoUbHFpv3eccznLi0/5Ds/N39ElbL9y4LKRLumEH4KHd+3G7EEMbEsTMtQHyf6DVJn119qMR8FqK7hW/onlABY0nhp4Jk6S804QkAkAJIlqHavs2fBp6fURgXMEDybginGODn280pBebBXFFhJ7goqtJq+estC+U0/n6ZxAZOnLioFVBRHWjX04B9Tj3s24dWbG+3QFPOXC2EOQJSN4NRRTpRIBG2ropVU6izNnAKg2cr5gKgjZTIFNwPJRb6wxiIXmazacBeQBIxUUa4K09FQJKNWj2VkSLjgWES35DYnFEziUXHBAcCUHklLHl9S/zisI9CjTYLRJ1qHaqJNFpgUDx2ljp7VBTByl1pEyfAgc8BqOLjZf6Qa5+hLkjhfhsOXwDjFVhzgryi297aV+hRa1wGtCG4FmWv76w69ozT1/wmIj80EzNrZUodey1Ttv3+XXLaQJNHlpu4ggjsa+vdivIACRCfiHr285TAtm3K24AXX2X4IWHCn6Mw/UpO/qQA/5LubQJ/N1hmcYVuAklpJEsIYlp5AT5753214uCcA1n93MaqaYoIh/HEcp3cFkIpoS7/JQNwnJwp/mDDc4w1//9Ps5e1C4ZRoHImj0uor+dYC1WMIdi6FMh3kBFa294OA+rvRHHmCT+rAEsP7wU2ZZE8yJ5KtwUn33GVBFU804UcIyrmYDf1uXj5CxJZxsXcUTKpVVVHFCJ1YrMLnCZYJmeBL/zhrHMHMjALWUc8TEGnrjdK1oKqoxkBdBTmV0xHMnWw==
++CFyqTf7ptxSn3Lywh86MgSuDN2RlsMLOd5evNnd7T1PuKmsNH4xIqukhN+2xWIbAvhx0G6tve0pwSdyzQTQA==
xphjis6wjQamD1ar8Rty2K80W8eM0/Jipivt9f5xeYG0ahjy24bSJtL9WzB6Coy7esh6p0jvRDOkUIruZYzEJQ==
PdZTGR+aJ28Vezk5pzGM4YZQEJONGrHm0LysegjqqNd+Iky6+7sis0qcIZgCaWLVooRJ44AIydjdeOXK7evWZQ==
gE2BZ6LiMhv1P+7nRxismMzbe4gBDuKZcod9LMcXTnUfTibU915nB5qbw4tCuTsZH+scDB7/xkw9y5fF+00pxg==
Packet
Message
/c schtasks /create /f /sc onlogon /rl highest /tn "
" /tr '"
"' & exit
\nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
@echo off
timeout 3 > NUL
START "" "
" /f /q
Select * from Win32_ComputerSystem
Manufacturer
microsoft corporation
VIRTUAL
vmware
VirtualBox
SbieDll.dll
Err HWID
ClientInfo
Microsoft
Version
Performance
Pastebin
Antivirus
Installed
\root\SecurityCenter2
Select * from AntivirusProduct
displayName
Software\
plugin
savePlugin
sendPlugin
Hashes
Plugin.Plugin
Msgpack
Received
masterKey can not be null or empty.
input can not be null.
Invalid message authentication code (MAC).
{0:D3}
{0:X2}
(never used) type $c1
(ext8,ext16,ex32) type $c7,$c8,$c9
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
FileVersion
1.0.0.0
InternalName
Stub.exe
LegalCopyright
LegalTrademarks
OriginalFilename
Stub.exe
ProductName
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectNet.01
Lionic Trojan.Win32.Crysan.4!c
Elastic Windows.Trojan.Asyncrat
MicroWorld-eScan Generic.AsyncRAT.Marte.B.7713EB42
ClamAV Win.Packed.Razy-9625918-0
CMC Clean
CAT-QuickHeal Trojan.IgenericFC.S14890850
ALYac Generic.AsyncRAT.Marte.B.7713EB42
Malwarebytes Generic.Trojan.MSIL.DDS
VIPRE Generic.AsyncRAT.Marte.B.7713EB42
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005678321 )
BitDefender Generic.AsyncRAT.Marte.B.7713EB42
K7GW Trojan ( 005678321 )
CrowdStrike win/malicious_confidence_100% (W)
Baidu Clean
VirIT Trojan.Win32.Genus.NFZ
Cyren W32/Samas.B.gen!Eldorado
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 a variant of MSIL/Agent.CFQ
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Backdoor.MSIL.Crysan.gen
Alibaba Backdoor:MSIL/AsyncRat.c706b640
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Agent.46080.KI
Rising Trojan.AntiVM!1.CF63 (CLASSIC)
Sophos Troj/AsyncRat-B
F-Secure Trojan.TR/Dropper.Gen
DrWeb Trojan.Siggen9.56514
Zillya Trojan.Agent.Win32.1334302
TrendMicro Backdoor.MSIL.ASYNCRAT.SMXSR
McAfee-GW-Edition BehavesLike.Win32.Fareit.pm
Trapmine Clean
FireEye Generic.mg.f249ab6266b09f71
Emsisoft Trojan.Agent (A)
Ikarus Trojan.MSIL.Agent
GData MSIL.Backdoor.DCRat.D
Jiangmin Backdoor.MSIL.cxnh
Webroot Clean
Avira TR/Dropper.Gen
MAX malware (ai score=89)
Antiy-AVL Trojan[Backdoor]/MSIL.Crysan
Gridinsoft Trojan.Win32.AsyncRAT.bot
Xcitium Malware@#agweq0isd79q
Arcabit Generic.AsyncRAT.Marte.B.7713EB42
SUPERAntiSpyware Trojan.Agent/Gen-Kryptik
ZoneAlarm HEUR:Backdoor.MSIL.Crysan.gen
Microsoft Backdoor:MSIL/AsyncRat.AD!MTB
Google Detected
AhnLab-V3 Malware/Win32.RL_Generic.C3558490
Acronis suspicious
McAfee Fareit-FZT!F249AB6266B0
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 OScope.Backdoor.MSIL.Crysan
Cylance unsafe
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Msil.Agent.zap
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.74418669.susgen
Fortinet MSIL/CoinMiner.CFQ!tr
BitDefenderTheta Gen:NN.ZemsilF.36164.cm0@a4te13j
AVG Win32:DropperX-gen [Drp]
Avast Win32:DropperX-gen [Drp]
No IRMA results available.