Static | ZeroBOX

PE Compile Time

2023-09-11 08:14:09

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00009664 0x00009800 5.6396532237
.rsrc 0x0000c000 0x000004e8 0x00000600 3.7548730747
.reloc 0x0000e000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0000c0a0 0x00000254 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0000c2f8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
  (n
v4.0.30319
#Strings
<Module>
mscorlib
Microsoft.VisualBasic
MyApplication
MyComputer
MyProject
MyWebServices
ThreadSafeObjectProvider`1
Settings
ClientSocket
Messages
Helper
RemoteDesktop
AppendOutputTextDelegate
Microsoft.VisualBasic.ApplicationServices
ApplicationBase
Microsoft.VisualBasic.Devices
Computer
System
Object
.cctor
get_Computer
m_ComputerObjectProvider
get_Application
m_AppObjectProvider
get_User
m_UserObjectProvider
get_WebServices
m_MyWebServicesObjectProvider
Application
WebServices
Equals
GetHashCode
GetType
ToString
Create__Instance__
instance
Dispose__Instance__
get_GetInstance
m_ThreadStaticValue
GetInstance
Mutexx
System.Threading
_appMutex
current
isConnected
System.Net.Sockets
Socket
BufferLength
BufferLengthReceived
Buffer
System.IO
MemoryStream
ManualResetEvent
allDone
SendSync
BeginConnect
IAsyncResult
BeginReceive
BeginRead
EndSend
isDisconnected
System.Diagnostics
Process
_MyProcess
get_MyProcess
set_MyProcess
WithEventsValue
processid
AppendOutputText
DataReceivedEventArgs
MyProcess_ErrorDataReceived
sender
MyProcess_OutputDataReceived
WSound
mouse_event
dwFlags
cButtons
dwExtraInfo
user32
keybd_event
Thread
capCreateCaptureWindowA
lpszWindowName
dwStyle
nWidth
nHeight
hwndParent
Handle
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
getFolders
location
getFiles
getDrives
Download
MyProcess
GetHashT
strToHash
frombase64
Plugin
AES_Encryptor
AES_Decryptor
INDATE
Comment
Antivirus
CreateMutex
CloseMutex
userAgents
IPHOST
PortHost
IsValid
Address
BitBlt
nXDest
nYDest
hdcSrc
gdi32.dll
System.Drawing
Capture
System.Drawing.Imaging
ImageCodecInfo
GetEncoderInfo
MulticastDelegate
TargetObject
TargetMethod
AsyncCallback
BeginInvoke
DelegateCallback
DelegateAsyncState
EndInvoke
DelegateAsyncResult
Invoke
System.ComponentModel
EditorBrowsableAttribute
EditorBrowsableState
System.CodeDom.Compiler
GeneratedCodeAttribute
DebuggerHiddenAttribute
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
HideModuleNameAttribute
System.ComponentModel.Design
HelpKeywordAttribute
System.Runtime.CompilerServices
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
Activator
CreateInstance
MyGroupCollectionAttribute
System.Runtime.InteropServices
ComVisibleAttribute
ThreadStaticAttribute
CompilerGeneratedAttribute
GetCurrentProcess
ProcessModule
get_MainModule
get_FileName
VB$AnonymousDelegate_0
_Lambda$__1
DebuggerDisplayAttribute
Environment
ThreadStart
Random
WaitHandle
WaitOne
STAThreadAttribute
_Lambda$__2
_Lambda$__3
DebuggerStepThroughAttribute
TimerCallback
Exception
AddressFamily
SocketType
ProtocolType
set_ReceiveBufferSize
set_SendBufferSize
Conversions
ToInteger
Connect
SocketFlags
ProjectData
SetProjectError
ClearProjectError
EventWaitHandle
ComputerInfo
get_UserName
get_OSFullName
String
Replace
OperatingSystem
get_OSVersion
get_ServicePack
Concat
get_Is64BitOperatingSystem
Boolean
EndReceive
ToArray
ToLong
Stream
Dispose
WriteByte
get_Length
WaitCallback
ThreadPool
QueueUserWorkItem
ObjectFlowControl
CheckForSyncLockOnValueType
Monitor
SelectMode
BeginSend
IDisposable
Collect
_Closure$__1
$VB$Local_A
_Lambda$__6
_Lambda$__4
_Lambda$__5
DataReceivedEventHandler
remove_OutputDataReceived
remove_ErrorDataReceived
add_OutputDataReceived
add_ErrorDataReceived
Operators
AddObject
get_Data
System.Net
WebClient
StreamWriter
Bitmap
FileAttribute
Rectangle
ProcessStartInfo
DateTime
System.Collections
IEnumerator
Strings
CompareMethod
CompareString
System.Windows.Forms
Restart
SocketShutdown
Shutdown
NewLateBinding
LateCall
ChangeType
Screen
get_PrimaryScreen
get_Bounds
get_Size
ConcatenateObject
LateGet
Cursor
set_Position
Convert
ToBoolean
ToByte
UIntPtr
GetTempFileName
DownloadFile
Interaction
CreateObject
LateSet
AppWinStyle
ToInt32
Exists
get_StartInfo
set_FileName
set_Arguments
set_UseShellExecute
set_RedirectStandardError
set_RedirectStandardOutput
set_CreateNoWindow
WaitForExit
set_RedirectStandardInput
get_Id
BeginErrorReadLine
BeginOutputReadLine
get_StartTime
get_StandardInput
TextWriter
WriteLine
GetProcesses
get_ProcessName
GetFileNameWithoutExtension
GetExtension
GetProcessById
Delete
Directory
ServerComputer
Microsoft.VisualBasic.MyServices
FileSystemProxy
get_FileSystem
RenameDirectory
RenameFile
ReadAllText
GetThumbnailImageAbort
IntPtr
GetThumbnailImage
ImageFormat
get_Png
FileSystem
SetAttr
CreateDirectory
FileStream
Create
ReadAllBytes
ToBase64String
WriteAllBytes
GetTempPath
GetFileName
CopyDirectory
MoveDirectory
get_Audio
Microsoft.Win32
Registry
GetValue
IEnumerable
GetEnumerator
get_Current
MoveNext
Network
get_Network
MessageBox
DialogResult
UploadFile
Environ
SetValue
DirectoryInfo
GetDirectories
get_Name
FileInfo
GetFiles
DriveInfo
System.Collections.Generic
IEnumerator`1
DriveType
System.Collections.ObjectModel
ReadOnlyCollection`1
get_Drives
get_DriveType
AccessedThroughPropertyAttribute
DllImportAttribute
avicap32.dll
MarshalAsAttribute
UnmanagedType
user32.dll
_Lambda$__7
System.Text
Encoding
get_Default
GetBytes
GetString
get_ProcessorCount
get_MachineName
get_SystemDirectory
GetPathRoot
get_TotalSize
System.Security.Cryptography
MD5CryptoServiceProvider
StringBuilder
get_ASCII
HashAlgorithm
ComputeHash
Append
Substring
ToUpper
FromBase64String
System.Reflection
Module
Assembly
GetModules
GetTypes
get_FullName
EndsWith
get_Assembly
RijndaelManaged
ICryptoTransform
SymmetricAlgorithm
set_Key
CipherMode
set_Mode
CreateEncryptor
TransformFinalBlock
CreateDecryptor
FileSystemInfo
get_LastWriteTime
System.Security.Principal
WindowsIdentity
GetCurrent
WindowsPrincipal
WindowsBuiltInRole
IsInRole
System.Management
ManagementObjectSearcher
ManagementBaseObject
ManagementObjectCollection
ManagementObjectEnumerator
get_Item
get_DnsSafeHost
get_UTF8
EncoderParameter
EncoderParameters
Graphics
get_Width
get_Height
FromImage
FromHwnd
GetHdc
ReleaseHdc
Cursors
get_Position
op_Inequality
Encoder
Quality
get_Param
GetImageEncoders
get_MimeType
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
GuidAttribute
AssemblyFileVersionAttribute
AssemblyTrademarkAttribute
AssemblyCopyrightAttribute
AssemblyProductAttribute
AssemblyCompanyAttribute
AssemblyDescriptionAttribute
AssemblyTitleAttribute
XWormClient
XWormClient.exe
MyTemplate
14.0.0.0
My.Computer
My.WebServices
My.Application
My.User
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
<generated method>
<generated method>
MyProcess
WrapNonExceptionThrows
$7b8b470f-5f26-4e46-b03e-c933823a7ead
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
xyoptotway.work.gd
<123456789>
<Xwormmm>
USB.exe
zRvvAJhG8tAf4cXE
Microsoft
Service Pack
XWorm V2.2
Error:
uninstall
update
Height
Memory
getinfo
openhide
internetexplorer.application
navigate
visible
shellfuc
regfuc
WScript.Shell
RegWrite
REG_DWORD
RunBotKiller
script
Cilpper
Clipper
injRun
startusb
startsp
PSleep
PreventSleep
taskkill.exe
/pid
CMD.EXE
Process Started at:
runnnnnn
closeshell
GetText
setText
clearr
BScreen
GetDrives
FileManager
Delete
Folder
Execute
Rename
txtttt
viewimage
hidefolderfile
showfolderfile
creatnewfolder
creatfile
downloadfile
downloadedfile
sendfileto
install
NETINS
7zip\7z.exe
InsProg
RSSDis
GETWCamPlu
GETWmicPlu
Wsound
GETWsoundPlu
JustFun
MapsPLU
closeKL
HKEY_CURRENT_USER\SOFTWARE\
GETTCP
GetActiveWindows
killAct
InstallN
InstallngC
\ngrok.exe
Getpass
Pvbnet
Emails
Error!
LLCHAT
[Folder]
FileManagerSplitFileManagerSplit
FileManagerSplit
[Drive]
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Err HWID
Class1
dd/MM/yyy
Nothing
\root\SecurityCenter2
Select * from AntivirusProduct
displayName
POST / HTTP/1.1
Host:
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
User-Agent:
Content-length: 5235
image/jpeg
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
XWormClient.exe
LegalCopyright
OriginalFilename
XWormClient.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
MicroWorld-eScan IL:Trojan.MSILZilla.25629
ClamAV Win.Packed.Msilzilla-10005608-0
CMC Clean
CAT-QuickHeal Clean
McAfee GenericRXUQ-KQ!358E5B1466B7
Cylance unsafe
Zillya Trojan.Agent.Win32.2998967
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
BitDefender IL:Trojan.MSILZilla.25629
K7GW Trojan ( 00592e8b1 )
K7AntiVirus Trojan ( 00592e8b1 )
Baidu Clean
VirIT Trojan.Win32.MSIL.BVC
Cyren W32/MSIL_Ransom.D.gen!Eldorado
Symantec MSIL.XWorm!gen1
Elastic Windows.Trojan.Xworm
ESET-NOD32 a variant of MSIL/Agent.DWN
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.MSIL.Tasker.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Backdoor.XWorm!1.E1F9 (CLASSIC)
Sophos Mal/Vermis-X
F-Secure Trojan:W32/XwormRAT.A
DrWeb Trojan.MulDrop20.48670
VIPRE IL:Trojan.MSILZilla.25629
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.pm
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.358e5b1466b74932
Emsisoft IL:Trojan.MSILZilla.25629 (B)
SentinelOne Static AI - Malicious PE
GData MSIL.Backdoor.SiRAT.A
Jiangmin Clean
Webroot Clean
Avira Clean
MAX malware (ai score=83)
Antiy-AVL Trojan/MSIL.Tasker
Gridinsoft Clean
Xcitium Clean
Arcabit IL:Trojan.MSILZilla.D641D
SUPERAntiSpyware Trojan.Agent/Gen-MSILZilla
ZoneAlarm HEUR:Trojan.MSIL.Tasker.gen
Microsoft Trojan:Win32/CoinMiner!pz
Google Detected
AhnLab-V3 Trojan/Win.XWormRAT.C5120690
Acronis Clean
VBA32 Backdoor.MSIL.XWorm.gen
ALYac IL:Trojan.MSILZilla.25629
TACHYON Trojan/W32.DN-Tasker.41472.Q
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware.AI.DDS
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
Ikarus Trojan.MSIL.Agent
MaxSecure Trojan.Malware.121218.susgen
Fortinet MSIL/Agent.DWN!tr
BitDefenderTheta Gen:NN.ZemsilF.36662.cm0@aWesN!f
AVG Win32:MalwareX-gen [Trj]
Cybereason malicious.77611a
Avast Win32:MalwareX-gen [Trj]
No IRMA results available.