Static | ZeroBOX

PE Compile Time

2023-09-27 00:17:02

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0001fd2c 0x0001fe00 7.40154527342
.rsrc 0x00022000 0x00008c78 0x00008e00 3.72920839272
.reloc 0x0002c000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0002a31c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002a31c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002a31c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002a31c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0002a31c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0002a7d2 0x0000004c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0002a85a 0x000001f8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0002aa8e 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
,@&&*~
#es-8R
#es-8R
#es-8R
-D&&&~
,>&&&~
,8&&&sS
,,&&&~
-r&&&&&&
-a&&&&&&~
-X&&&~
-V&+(~*
_b`}Q
_d}Q
__d}Q
_b`}Q
-d&&&&&
-b&&&&&
Y_bX
Y_cX
Y_bY
Y_bX
Y_bX
-&&&&&
,%&*o,
&&&*o,
Y_bX
Y_bY
-"&*(!
_b`}
,F&&&&&
,&&&&&&
Qkkbal
|?BSJB
v4.0.30319
#Strings
<Module>
mscorlib
Object
System
MulticastDelegate
ValueType
Attribute
GetString
SmartAssembly.Delegates
MemberRefsProxy
SmartAssembly.HouseOfCards
Strings
MemoryStream
System.IO
PoweredByAttribute
SmartAssembly.Attributes
Dictionary`2
System.Collections.Generic
Assembly
System.Reflection
Version
ModuleHandle
Console
WriteLine
ReadLine
Convert
ToInt32
get_Scheme
get_Location
get_FullName
ToString
String
op_Equality
op_Inequality
TimeZoneInfo
get_Local
FindSystemTimeZoneById
Equals
Concat
GetTypeFromHandle
RuntimeTypeHandle
get_Assembly
ResourceManager
System.Resources
GetObject
Thread
System.Threading
Environment
GetFolderPath
SpecialFolder
GetEntryAssembly
GetExecutingAssembly
GetDirectoryName
Intern
Directory
CreateDirectory
DirectoryInfo
FromBase64String
Encoding
System.Text
get_UTF8
get_ASCII
GetBytes
HashAlgorithm
System.Security.Cryptography
ComputeHash
SymmetricAlgorithm
set_Key
set_Mode
CipherMode
set_Padding
PaddingMode
CreateDecryptor
ICryptoTransform
TransformFinalBlock
IDisposable
Dispose
Stream
ProcessStartInfo
System.Diagnostics
set_CreateNoWindow
set_UseShellExecute
set_RedirectStandardOutput
Process
set_StartInfo
Buffer
BlockCopy
EndsWith
Marshal
System.Runtime.InteropServices
SizeOf
ToUInt32
IsNullOrEmpty
BitConverter
IntPtr
get_Size
op_Explicit
ToInt16
GetManifestResourceStream
get_Length
.cctor
StrongNameSignatureVerificationEx
mscorwks.dll
ParameterInfo
object
method
Invoke
hfsdkffddfghsffdfaffdchd
fghhfgsfffffdfdffddshfdasdfh
cfffdfafdffrsfsshdkfffgh
BeginInvoke
IAsyncResult
AsyncCallback
callback
EndInvoke
result
hjfdfhfgfadffddcdffffskhj
ffgrfgfffffffkhsjd
sfdfdshdffgffefdfkfghj
sdddffhedfddffffgjfsfkfdgsacsafp
sgfhjffffgdrfhdfdfhfffadfsfsscfgdb
djfffsfhgdffafcfdssfkfhgj
ffchkffdafhffdsfsfj
jffgadfcffgfgfsfhfskffj
jcfsdfrdfdsdgkfff
fdfcffrdgffdfsfssffj
jfffffgffrfdfcsdsgkffj
jfffffgfdsdfsdgkffff
hfsdkfddgfgffsefafchd
fghhfgsffrfdfdfffdfdshfdasdfh
cffffdadfdrsfsshdkfffgh
hjfffhfadfddfdcdffffshj
ffghgfdfdfffkhsjd
fsffffdddfgfefdfkfghj
hjfffhfadffddfdcdffffshj
ffghgfdfdffffkhsjd
gddffdhffsfgh
fhfdsffhfdfhhs
fffffh
shssgfsd
sdfgfsf
dffffss
sffdggfs
ffdgfdhs
gsfddsd
gfhfsfs
gsffssg
sdddffhedfddffffgjfsfkdgsacsafp
sgfhjffffgdrfhddfhfffadfsfsscfgdb
djffsfhgdffafcfdssfkfhgj
ffchkffdafhfdsfsfj
jffgadfcffgfgfshfskffj
fdfcffrdgfdfsfssffj
jffffgffrfdfcsdsgkffj
jffffgfdsdfsdgkffff
gdadag
hsffafs
asfdads
gfssddfh
jfgffdfhg
jffdfdfgfdgs
jsfdsffdf
jdffda
gdfdsffddj
kdsgffh
fffdfg
ffdsfs
sfffdd
jfffssk
wsfsssv
gsfffsds
gffssfdsx
startupInfo
FFdhrhSnogmendoA
kdlraFjb
ddknfnhe
jdhfdfsffsdkfj
hdfffafsfsdkfsh
hdffhdfffffkdf
affdhhh
sdfffhdff
hfffffshdhs
hhhgfffdfh
ffffffdhs
fdffss
hffdsffsf
jhfdfdfdh
MoveFileEx
kernel32
ResolveEventArgs
assemblyFullName
CreateMemberRefsDelegates
typeID
CreateGetStringDelegate
ownerType
codeLengths
pending
minCodes
maxLength
buffer
IsWebApplication
AvailableBits
AvailableBytes
IsNeedingInput
TotalOut
IsFinished
BitCount
IsFlushed
UnverifiableCodeAttribute
System.Security
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
AssemblyFileVersionAttribute
SuppressIldasmAttribute
AttributeUsageAttribute
AttributeTargets
CompilerGeneratedAttribute
{dfdff6da-bdae-455a-a156-f2f918fe79d2}
{d8060802-19ff-4469-abda-ddce43f5db28}
UriSchemeFtp
Double
MD5CryptoServiceProvider
TripleDESCryptoServiceProvider
RijndaelManaged
System.Windows.Forms
Application
get_ExecutablePath
SecurityException
AppDomain
get_CurrentDomain
AssemblyName
DefineDynamicAssembly
AssemblyBuilder
System.Reflection.Emit
AssemblyBuilderAccess
DefineDynamicModule
ModuleBuilder
DefineType
TypeBuilder
TypeAttributes
GetMethod
MethodInfo
MethodBase
GetParameters
Func`2
System.Core
Enumerable
System.Linq
Select
IEnumerable`1
ToArray
get_ReturnType
DefinePInvokeMethod
MethodBuilder
MethodAttributes
CallingConventions
CallingConvention
CharSet
GetMethodImplementationFlags
MethodImplAttributes
SetImplementationFlags
CreateType
Delegate
CreateDelegate
Exception
get_ParameterType
GetCurrentProcess
get_MainModule
ProcessModule
get_ModuleName
ToLower
ResolveEventHandler
add_AssemblyResolve
get_Name
ToBase64String
get_Chars
IndexOf
Substring
Monitor
ContainsKey
get_Item
GetTempPath
Format
Exists
OpenWrite
FileStream
LoadFile
set_Item
FileLoadException
BadImageFormatException
StringBuilder
Append
StartsWith
ResolveTypeHandle
GetFields
FieldInfo
BindingFlags
MemberInfo
ResolveMethodHandle
RuntimeMethodHandle
GetMethodFromHandle
get_IsStatic
get_FieldType
DynamicMethod
GetILGenerator
ILGenerator
OpCodes
Ldarg_0
OpCode
Ldarg_1
Ldarg_2
Ldarg_3
Ldarg_S
Tailcall
Callvirt
SetValue
GetModules
Module
get_ModuleHandle
RuntimeHelpers
InitializeArray
RuntimeFieldHandle
get_Module
GetMethods
Ldc_I4
get_MetadataToken
add_ResourceResolve
GetManifestResourceNames
StackTrace
GetFrames
StackFrame
TryGetValue
GetName
GetPublicKey
CreateEncryptor
DESCryptoServiceProvider
GetCallingAssembly
FormatException
get_Position
DateTime
get_Now
get_Year
get_Month
get_Day
get_Hour
get_Minute
get_Second
UInt32
SeekOrigin
set_Position
get_Message
InvalidOperationException
ArgumentOutOfRangeException
WriteByte
ReadByte
WrapNonExceptionThrows
6.9.0.114
"Powered by SmartAssembly 6.9.0.114
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
7$&"mpO
OM"/s:
fg>`YA}
WEiRwa
_Eh"vR
Vu(DOZ
rVZ7.J
&P! ^
8N|mi7
s;Pu;q
g_^A*a
Etzz<@
V?Js'"
?Tf,D|
2c0Gev
%F778*
?{UQ&=
<,5x%x
E*oXU+v
e Y a0
6% 0['
J,VMQW
P8@hGB
0` 7Gx
{&7uao
_FksGu
%:E9dKs5
)-eO(+
Xm<\WUJ#
{CPqvF<_N=
=EUb`J
#<9nx
{X&^$'+P
PS(m"N
s1`$jI
;vkNc}Cp
vyP^{h
3OB'Aj
eIL`=sy_
C8#o7h
(w;/P2
_gv.`^
QdfFN)
D)Z -%a
u0,rdT
bes{ m
{|mJZ'
}#h~@'
j\\ixa
LK#r*/
jP{KKx~
vS)ruf
YRC*h3
1MUF|
Pae7 l
mtJL&l
g~Jmxs#
iCUan1
=xT#Eo
[Sm{b&
Q1<bPRf
)U}H4O
X1:/.*<!
[im)GG
^<gq>p7
&`Byf{0j
NszLp15
Iv,#I3
8|U%8 +,
%%Hn|}
+|`J2_
$=mP=5
}Z^_<Vr
rW#aE1~i
J9)OJ/
WEPf;uK~.N
^1]NC>`
z`O^"~
{vT1A%
QAl^s*qJqw
Ve0ZN;(
^z+Re,f
y*yK$5p
:fbs)H
e6^n!X
XKEh]X
"y8&z5
BAv!I{=
[~,mc!
eGFUT_
u;:av)
o8VXRv
OYceak
`@oK&6
qGhz3M
oXMaF'4
#OTT= $l
\9\q?s
]E}h"q
?BEb(u
)x11[D
[-7].~"
"_[D\_
v3993W
{]-.'?
fh9(X?
EN=i-z
9G;;>9
~f$D
&r =q?
-i0%EYom'
2k6/9Y|
H8je+ Dy
\R-1%C
A9 il<
?r\t&0$I
:/XMEV
Q5g(8wa
8mHy7fI
kDgO1d
l}u9<:
!l[Z$E
h|>s0rOZ
o,/*z`
Ug#_u^1
=x@7]D
q{-oOd
B:\);Y
dFa%%
_CorExeMain
mscoree.dll
bbbd~~~
9NQQQQQQQQQQQQQQQQP
zzz-kkk
{{{+ppp
888Z>>>u>>>u>>>u>>>u>>>u>>>u>>>u>>>u>>>u>>>u>>>u>>>q
lllVJJJ
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
65BAJIKILIMINIOIPIQPRISITIVUWUXUYUZU[U
w3wp.exe
aspnet_wp.exe
ezViZmNjOTVkLTdkY2MtNGFkMy1iNGRhLTQ2MzQwZTUwZWFmZn0sIEN1bHR1cmU9bmV1dHJhbCwgUHVibGljS2V5VG9rZW49M2U1NjM1MDY5M2Y3MzU1ZQ==,[z]{dfdff6da-bdae-455a-a156-f2f918fe79d2},ezViZmNjOTVkLTdkY2MtNGFkMy1iNGRhLTQ2MzQwZTUwZWFmZn0=,[z]{dfdff6da-bdae-455a-a156-f2f918fe79d2}
{0}{1}\
, Version=
, Culture=
neutral
, PublicKeyToken=
Version=
Culture=
PublicKeyToken=
{5bfcc95d-7dcc-4ad3-b4da-46340e50eaff}, PublicKeyToken=3e56350693f7355e
{d8060802-19ff-4469-abda-ddce43f5db28}
Wrong Header Signature
Unknown Header
{data}
ERR 2003:
{71461f04-2faa-4bb9-a0dd-28a79101b599}
MAINICON
VS_VERSION_INFO
StringFileInfo
040904b0
Comments
CompanyName
FileVersion
, , ,
FileDescription
LegalCopyright
ProductName
ProductVersion
, , ,
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.XWorm.4!c
tehtris Generic.Malware
MicroWorld-eScan Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
McAfee Artemis!6A4E90565B00
Malwarebytes Trojan.Crypt.MSIL
VIPRE Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
Cybereason malicious.802725
Baidu Clean
VirIT Clean
Cyren W32/MSIL_Kryptik.JLU.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/Kryptik.AHUA
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Backdoor.MSIL.XWorm.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:2j4GY5z6IKRO9yhlzs7Cqg)
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition BehavesLike.Win32.Generic.ch
Trapmine malicious.high.ml.score
FireEye Generic.mg.6a4e90565b00a175
Emsisoft Clean
Ikarus Trojan.MSIL.Crypt
GData Clean
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira Clean
Antiy-AVL Clean
Kingsoft malware.kb.c.1000
Gridinsoft Malware.Win32.XWorm.bot
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.MSIL.XWorm.gen
Microsoft Backdoor:MSIL/AsyncRAT.N!MTB
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5494915
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.36722.km0@auSLHOii
ALYac Clean
MAX Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Msil.Backdoor.Xworm.Gkjl
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Kryptik.AHUA!tr
AVG Win32:RATX-gen [Trj]
Avast Win32:RATX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.