Static | ZeroBOX

PE Compile Time

2023-09-26 18:45:45

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00003e04 0x00004000 5.49007978445
.reloc 0x00006000 0x0000000c 0x00000200 0.0611628522412

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.reloc
v2.0.50727
#Strings
<Module>
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
System
MulticastDelegate
CompilerGeneratedAttribute
System.Diagnostics
DebuggerDisplayAttribute
IAsyncResult
AsyncCallback
Object
EventHandler
EventArgs
DebuggerHiddenAttribute
System.Threading
ReleaseMutex
Thread
Microsoft.VisualBasic.Devices
ComputerInfo
System.Windows.Forms
Application
get_ExecutablePath
ThreadStart
Microsoft.VisualBasic
Strings
CompareMethod
STAThreadAttribute
Microsoft.VisualBasic.CompilerServices
NewLateBinding
LateCall
System.CodeDom.Compiler
CompilerResults
ProjectData
EndApp
add_ApplicationExit
Exception
SetProjectError
ClearProjectError
String
Operators
CompareString
Conversions
ToString
Concat
Microsoft.Win32
RegistryKey
Registry
CurrentUser
ConcatenateObject
OpenSubKey
GetValue
ToInteger
ToBoolean
Boolean
LateGet
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
ChangeType
RuntimeFieldHandle
InitializeArray
Convert
FromBase64String
System.Reflection
Assembly
SetValue
System.IO
MemoryStream
Process
GetCurrentProcess
get_Handle
IntPtr
op_Explicit
ConditionalCompareObjectEqual
System.Net.Sockets
SelectMode
CompareObjectLessEqual
AndObject
ConditionalCompareObjectGreater
SubtractObject
SocketFlags
Contains
ParameterizedThreadStart
LateIndexGet
get_Length
LateIndexSetComplex
LateSetComplex
TcpClient
set_ReceiveTimeout
set_SendTimeout
set_SendBufferSize
set_ReceiveBufferSize
Environment
get_MachineName
get_UserName
get_OSFullName
get_TotalPhysicalMemory
UInt64
System.Globalization
CultureInfo
get_CurrentCulture
get_Name
System.Net
GetHostName
IPHostEntry
GetHostByName
IPAddress
get_AddressList
System.Text
StringBuilder
Interaction
Environ
Conversion
System.Management
ManagementObjectCollection
ManagementObjectEnumerator
ManagementObject
ManagementObjectSearcher
GetEnumerator
ManagementBaseObject
get_Current
get_Item
ToInt32
MoveNext
IDisposable
Dispose
get_Capacity
Encoding
get_Default
GetBytes
GetString
System.Collections.Generic
List`1
ToArray
Stream
System.IO.Compression
GZipStream
set_Position
CompressionMode
get_UTF8
ToBase64String
ValueType
Nuclear Explosion.exe
kernel32
user32
avicap32.dll
kernel32.dll
ntdll.dll
mscorlib
VB$AnonymousDelegate_0
Atomic
Nuclear_Explosion
_Closure$__
<PrivateImplementationDetails>
__StaticArrayInitTypeSize=43
__StaticArrayInitTypeSize=6
TargetObject
TargetMethod
BeginInvoke
DelegateCallback
DelegateAsyncState
EndInvoke
DelegateAsyncResult
Invoke
.cctor
Execute
GetVolumeInformationA
GetForegroundWindow
GetWindowText
lpString
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
EmptyWorkingSet
hProcess
GetProduct
Product
Decompress
Encode
Decode
_Lambda$__R32-2
$I24-0
$IR24-1
_Lambda$__R24-1
_Lambda$__24-0
03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
5B1EE7CAD3DFF220A95D1D6B91435D9E1520AC41
Nuclear Explosion
<generated method>
<generated method>
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
AVTQGJX
*-]NK[-*
Revenge-RAT
127.0.0.1,february-warnings.gl.at.ply.gg,
4444,4560,
R3Vlc3Q=
RV_MUTEX
Software\
HKEY_CURRENT_USER\SOFTWARE\
CreateInstance
Client
Connected
Available
Receive
ToArray
Dispose
length
Disconnect
Connect
Information
Select * from AntiVirusProduct
SELECT * FROM FirewallProduct
SendBufferSize
Length
SystemDrive
select * from Win32_Processor
AddressWidth
root\SecurityCenter
displayName
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0
ProcessorNameString
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.RRAT.4!c
Elastic Windows.Trojan.Revengerat
DrWeb BackDoor.RevetRat.2
MicroWorld-eScan IL:Trojan.MSILZilla.4787
FireEye Generic.mg.3d666f1f41826f03
CAT-QuickHeal Trojan.Generic.TRFH253
Skyhigh BehavesLike.Win32.Generic.lm
ALYac IL:Trojan.MSILZilla.4787
Malwarebytes Generic.Malware.AI.DDS
VIPRE IL:Trojan.MSILZilla.4787
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 700000121 )
BitDefender IL:Trojan.MSILZilla.4787
K7GW Trojan ( 700000121 )
Cybereason malicious.c5a564
BitDefenderTheta Gen:NN.ZemsilF.36738.biW@aq6K5qf
VirIT Backdoor.Win32.RevetRat.C
Symantec Trojan.Revetrat
ESET-NOD32 a variant of MSIL/Agent.APN
APEX Malicious
Paloalto Clean
ClamAV Win.Dropper.LimeRAT-9776087-0
Kaspersky HEUR:Trojan.Win32.RRAT.gen
Alibaba Backdoor:MSIL/RevengeRat.5228f485
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Revetrat.17408
Rising Backdoor.Revetrat!1.B8DA (CLASSIC)
Emsisoft IL:Trojan.MSILZilla.4787 (B)
F-Secure Trojan.TR/ATRAPS.Gen
Baidu Clean
Zillya Trojan.Windef.Win32.3424
TrendMicro BKDR_REVET.SM
Trapmine malicious.high.ml.score
CMC Clean
Sophos Mal/Revet-A
SentinelOne Static AI - Malicious PE
MAX malware (ai score=81)
GData IL:Trojan.MSILZilla.4787
Jiangmin Clean
Webroot Clean
Google Detected
Avira TR/ATRAPS.Gen
Varist W32/Revetrat.A.gen!Eldorado
Antiy-AVL Clean
Kingsoft malware.kb.c.1000
Gridinsoft Trojan.Win32.Agent.sa
Xcitium TrojWare.MSIL.Revetrat.A@7osjcj
Arcabit IL:Trojan.MSILZilla.D12B3
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.RRAT.gen
Microsoft Backdoor:MSIL/RevengeRat.GA!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.R421744
Acronis Clean
McAfee GenericRXEK-KS!3D666F1F4182
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Backdoor.MSIL.Revenge.Heur
Cylance unsafe
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall BKDR_REVET.SM
Tencent Win32.Trojan.Rrat.Ktgl
Yandex Clean
Ikarus Trojan.MSIL.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/RevengeRat.APN!tr
AVG Win32:MalwareX-gen [Trj]
Avast Win32:MalwareX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.