Static | ZeroBOX

PE Compile Time

2023-09-14 09:06:24

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0000c934 0x0000ca00 7.93861965291
.rsrc 0x00010000 0x000004c8 0x00000600 3.67016845721
.reloc 0x00012000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000100a0 0x00000234 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000102d8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
v=T\P=-
S)A6_+]\
f? d8Fo
5>$2-`D
KY$/`@
"-und.d
-FBA<
\};mwS
dn-hKp
]!g.k)es
7Tm]qS
"U%gT)-n
~$ED9s
q0ZR4Z
6tgwEp1
'q>dK^.
.M nd8p
-%p8^A$
.du8'>
#Tz(mz
YB}c$N1
v0(\Pha"z
&-&`oq[
KLWLSD
59Fv]W
6Ul/w_L
7Rd&&/
5]L4O
V>" ,d
n+cN}S
xEO[|@
[jAAjH
ZTl<R_G
{{)aPS
^mer^,
Sa_^^![S0
c/l_P2
;x4w^X
@i-Z2H
@SjAyV2
1D" 1[
dlm%0N
=p5[d@
u/P<7F
s(}FxL
O;w!Ma
Cwz_Xqx
\V>mId w
f.VZ|]
3HNlc2
""~mZL
s$:~V8
cnZR'K
e(#[Aw
xE%C(0
=MO=paJ
XG|AA^
MOBx]C
O5(BC;
xG|W##r
OA%Lgju
87E3rV
446(Tu
`bo@2.q
szZyi=
3%S_e\X>
d3"}A5x
9*:44R
"iO;2(
oB%&Y&
j?:4 V9
w>/1^H{-
:$tfV5
FMg6TR
cVf2v>^
v4.0.30319
#Strings
<Module>
new.exe
Program
Loader
mscorlib
System
Object
System.Windows.Forms
Initialize
AES_Decrypt
GetResource
bytesToBeDecrypted
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyFileVersionAttribute
AssemblyVersionAttribute
System.Runtime.InteropServices
GuidAttribute
ComVisibleAttribute
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
STAThreadAttribute
Application
EnableVisualStyles
SetCompatibleTextRenderingDefault
<Initialize>o__SiteContainer0
System.Core
CallSite`1
Action`2
CallSite
<>p__Site1
System.Threading
Thread
AppDomain
get_CurrentDomain
Assembly
GetType
Activator
CreateInstance
RuntimeTypeHandle
GetTypeFromHandle
Microsoft.CSharp
Microsoft.CSharp.RuntimeBinder
CSharpArgumentInfo
CSharpArgumentInfoFlags
Create
Binder
CallSiteBinder
CSharpBinderFlags
System.Collections.Generic
IEnumerable`1
InvokeMember
Target
Invoke
<PrivateImplementationDetails>{A29B6E6A-507F-406B-9A3E-BEB9526EB3BB}
CompilerGeneratedAttribute
$$method0x6000005-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
System.IO
MemoryStream
System.Security.Cryptography
RijndaelManaged
SymmetricAlgorithm
set_KeySize
set_BlockSize
System.Text
Encoding
get_UTF8
GetBytes
Rfc2898DeriveBytes
get_KeySize
DeriveBytes
set_Key
get_BlockSize
set_IV
CipherMode
set_Mode
ICryptoTransform
CreateDecryptor
CryptoStream
Stream
CryptoStreamMode
IDisposable
Dispose
ToArray
GetExecutingAssembly
System.Resources
ResourceManager
GetObject
mgjhhng1gkx.resources
0.0.0.0
$d64aeb2e-8520-4ad3-89e4-d2a308b9cc07
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
qqp4nush2pl
\!\)\1\9\A\I\Q\Y\a\$i\)q\
qqp4nush2pl
Stub.Program
zm0uggr4o4g
mgjhhng1gkx
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
0.0.0.0
InternalName
new.exe
LegalCopyright
OriginalFilename
new.exe
ProductVersion
0.0.0.0
Assembly Version
0.0.0.0
Antivirus Signature
Bkav W32.Common.B0F3B975
Lionic Trojan.Win32.Azorult.4!c
tehtris Clean
ClamAV Win.Packed.Razy-7334624-0
CMC Clean
CAT-QuickHeal Trojan.Nanocore
McAfee PWS-FCUT!A44CD9EA69E9
Malwarebytes Trojan.Agent.Gen
VIPRE IL:Trojan.MSILZilla.Azorult.1690
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 0056052a1 )
BitDefender IL:Trojan.MSILZilla.Azorult.1690
K7GW Trojan ( 0056052a1 )
Cybereason malicious.3e0ec3
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.A
Cyren W32/Azorult.D.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/Kryptik.SZH
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.MSIL.Azorult.gen
Alibaba TrojanPSW:MSIL/NanoCore.249c87bb
NANO-Antivirus Trojan.Win32.Azorult.kalrqu
ViRobot Trojan.Win.Z.Kryptik.54272.B
MicroWorld-eScan IL:Trojan.MSILZilla.Azorult.1690
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:PH+u1X+mhnaD3AJW15jXTw)
Sophos Troj/MSIL-RDY
F-Secure Trojan.TR/Dropper.Gen
DrWeb Trojan.Inject3.26307
Zillya Clean
TrendMicro Backdoor.Win32.REMCOS.YXDIPZ
McAfee-GW-Edition BehavesLike.Win32.Generic.qc
Trapmine malicious.high.ml.score
FireEye Generic.mg.a44cd9ea69e9e6ac
Emsisoft IL:Trojan.MSILZilla.Azorult.1690 (B)
Ikarus Trojan.MSIL.Crypt
Jiangmin Clean
Webroot Clean
Avira TR/Dropper.Gen
MAX malware (ai score=89)
Antiy-AVL Clean
Microsoft Trojan:MSIL/NanoCore.DHB!MTB
Gridinsoft Ransom.Win32.AzorUlt.sa
Xcitium Clean
Arcabit IL:Trojan.MSILZilla.Azorult.D69A
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Azorult.gen
GData IL:Trojan.MSILZilla.Azorult.1690
Google Detected
AhnLab-V3 Trojan/Win32.RL_Generic.C3447461
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.36722.dm0@aSIAyro
ALYac IL:Trojan.MSILZilla.Azorult.1690
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall Backdoor.Win32.REMCOS.YXDIPZ
Tencent Trojan-Psw.Msil.Azorult.zb
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Kryptik.UTK!tr
AVG Win32:CrypterX-gen [Trj]
Avast Win32:CrypterX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.