Static | ZeroBOX

PE Compile Time

2023-10-17 09:57:12

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00005e24 0x00006000 5.65194273552
.rsrc 0x00008000 0x000004d8 0x00000600 3.6941710689
.reloc 0x0000a000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000080a0 0x00000244 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000082e8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
!  (
v4.0.30319
#Strings
<Module>
mscorlib
Microsoft.VisualBasic
MyApplication
MyComputer
MyProject
MyWebServices
ThreadSafeObjectProvider`1
Microsoft.VisualBasic.ApplicationServices
ApplicationBase
Microsoft.VisualBasic.Devices
Computer
System
Object
.cctor
get_Computer
m_ComputerObjectProvider
get_Application
m_AppObjectProvider
get_User
m_UserObjectProvider
get_WebServices
m_MyWebServicesObjectProvider
Application
WebServices
Equals
GetHashCode
GetType
ToString
Create__Instance__
instance
Dispose__Instance__
get_GetInstance
m_ThreadStaticValue
GetInstance
System.Text
StringBuilder
ToUnicodeEx
user32.dll
GetKeyboardState
MapVirtualKey
GetWindowThreadProcessId
GetKeyboardLayout
user32
GetAsyncKeyState
VKCodeToUnicode
System.Windows.Forms
LastAV
LastAS
lastKey
NtSetInformationProcess
hProcess
processInformationClass
processInformation
processInformationLength
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
avicap32.dll
GetVolumeInformation
lpRootPathName
lpVolumeNameBuffer
nVolumeNameSize
lpVolumeSerialNumber
lpMaximumComponentLength
lpFileSystemFlags
lpFileSystemNameBuffer
nFileSystemNameSize
kernel32
GetVolumeInformationA
GetForegroundWindow
GetWindowText
WinTitle
MaxLength
GetWindowTextA
GetWindowTextLength
GetWindowTextLengthA
Microsoft.Win32
RegistryValueKind
Plugin
SessionEndingEventArgs
sender
connect
AdicionarAplicacaoAoIniciar
webcam
System.Net.Sockets
TcpClient
lastcap
System.IO
FileInfo
MemoryStream
DownloadHostOrNot
DownloadHostOrNotURL
FileStream
System.ComponentModel
EditorBrowsableAttribute
EditorBrowsableState
System.CodeDom.Compiler
GeneratedCodeAttribute
System.Diagnostics
DebuggerHiddenAttribute
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
HideModuleNameAttribute
System.ComponentModel.Design
HelpKeywordAttribute
System.Runtime.CompilerServices
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
Activator
CreateInstance
MyGroupCollectionAttribute
System.Runtime.InteropServices
ComVisibleAttribute
ThreadStaticAttribute
CompilerGeneratedAttribute
STAThreadAttribute
Process
Exception
DateTime
GetProcessById
IntPtr
ToInt32
get_MainWindowTitle
Operators
CompareString
String
get_Length
DateAndTime
get_Now
get_ProcessName
Concat
ProjectData
SetProjectError
ClearProjectError
op_Explicit
Keyboard
get_Keyboard
get_CapsLock
ToUpper
ToLower
Conversions
ToInteger
Remove
System.Threading
Thread
OutAttribute
MarshalAsAttribute
UnmanagedType
ToBoolean
Strings
StrReverse
System.Reflection
Assembly
GetEntryAssembly
get_Location
ServerComputer
Microsoft.VisualBasic.MyServices
RegistryProxy
get_Registry
RegistryKey
get_CurrentUser
OpenSubKey
DeleteValue
GetValue
CreateSubKey
SetValue
ConditionalCompareObjectEqual
Environment
get_MachineName
get_UserName
FileSystemInfo
get_LastWriteTime
get_Date
ComputerInfo
get_Info
get_OSFullName
Replace
OperatingSystem
get_OSVersion
get_ServicePack
CompareMethod
SpecialFolder
GetFolderPath
Contains
RegistryKeyPermissionCheck
GetValueNames
Convert
ToBase64String
FromBase64String
Encoding
get_UTF8
GetBytes
GetString
System.IO.Compression
GZipStream
Stream
CompressionMode
set_Position
BitConverter
Dispose
Socket
get_Client
get_Connected
op_Equality
Interaction
Environ
Conversion
Module
GetModules
GetTypes
get_FullName
EndsWith
get_Assembly
get_LocalMachine
Delete
DeleteSubKey
AppWinStyle
EndApp
System.Net
WebClient
System.Drawing
Bitmap
Rectangle
Graphics
Cursor
ConcatenateObject
get_Chars
NewLateBinding
LateGet
SubtractObject
ToArray
DownloadData
GetTempFileName
WriteAllBytes
get_Name
get_Message
LateSet
LateCall
Boolean
CompareObjectEqual
OrObject
Screen
get_PrimaryScreen
get_Bounds
get_Width
get_Height
System.Drawing.Imaging
PixelFormat
FromImage
CopyPixelOperation
CopyFromScreen
Cursors
get_Default
get_Position
DrawImage
ImageFormat
get_Jpeg
WriteByte
ChangeType
System.Security.Cryptography
MD5CryptoServiceProvider
HashAlgorithm
ComputeHash
GetCurrentProcess
get_Handle
Monitor
SocketFlags
ServicePointManager
SecurityProtocolType
set_SecurityProtocol
set_Encoding
WebHeaderCollection
get_Headers
HttpRequestHeader
set_Item
DownloadString
set_ReceiveBufferSize
set_SendBufferSize
set_SendTimeout
set_ReceiveTimeout
Connect
get_Available
SelectMode
Receive
ParameterizedThreadStart
NetworkStream
GetStream
ReadByte
ToLong
DirectoryInfo
get_Directory
ThreadStart
SessionEndingEventHandler
SystemEvents
add_SessionEnding
DoEvents
set_MinWorkingSet
Registry
CurrentUser
get_ExecutablePath
IDisposable
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
Server
Server.exe
MyTemplate
14.0.0.0
My.User
My.Application
My.WebServices
My.Computer
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
xabcdefg
yy/MM/dd
[ENTER]
[CapsLock]
exe.revreS
https://pt.textbin.net/download/rcd5ihynxw
6a2634340fbf8a0a2c038c6263d49fd1
Software\Microsoft\Windows\CurrentVersion\Run
SGFjS2Vk
0.7d By Pjoao1578
Software\
yy-MM-dd
??-??-??
Microsoft
Windows
SystemDrive
Software
cmd.exe /c ping 0 -n 2 & del "
getvalue
Length
Execute ERROR
Download ERROR
Executed As
Execute ERROR
Update ERROR
Updating To
Update ERROR
Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
0.0.0.0
InternalName
Server.exe
LegalCopyright
OriginalFilename
Server.exe
ProductVersion
0.0.0.0
Assembly Version
0.0.0.0
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.SpyGate.4!c
Elastic Windows.Trojan.Njrat
MicroWorld-eScan Generic.MSIL.Bladabindi.134BC814
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Generic.mm
McAfee Trojan-FJXA
Malwarebytes Bladabindi.Backdoor.Bot.DDS
VIPRE Generic.MSIL.Bladabindi.134BC814
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 700000121 )
BitDefender Generic.MSIL.Bladabindi.134BC814
K7GW Trojan ( 700000121 )
Cybereason malicious.0b28fc
Baidu MSIL.Backdoor.Bladabindi.a
VirIT Trojan.Win32.Genus.PRT
Symantec Backdoor.Ratenjay
tehtris Clean
ESET-NOD32 a variant of MSIL/Bladabindi.BC
APEX Malicious
Paloalto Clean
ClamAV Win.Trojan.B-468
Kaspersky HEUR:Backdoor.MSIL.SpyGate.gen
Alibaba Backdoor:MSIL/Bladabindi.234b924f
NANO-Antivirus Clean
ViRobot Backdoor.Win32.Bladabindi.Gen.A
Rising Backdoor.njRAT!1.9E49 (CLASSIC)
Sophos Troj/Bbindi-W
F-Secure Trojan.TR/Dropper.Gen7
DrWeb BackDoor.BladabindiNET.27
Zillya Trojan.Bladabindi.Win32.150595
TrendMicro BKDR_BLADABI.SMC
Trapmine malicious.high.ml.score
FireEye Generic.mg.a60c2e8459387329
Emsisoft Generic.MSIL.Bladabindi.134BC814 (B)
SentinelOne Static AI - Malicious PE
MAX malware (ai score=88)
GData MSIL.Backdoor.Bladabindi.AV
Jiangmin Clean
Webroot Clean
Google Detected
Avira TR/Dropper.Gen7
Varist W32/MSIL_Agent.AQ.gen!Eldorado
Antiy-AVL Clean
Kingsoft malware.kb.c.1000
Gridinsoft Clean
Xcitium Clean
Arcabit Generic.MSIL.Bladabindi.134BC814
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.MSIL.SpyGate.gen
Microsoft Backdoor:MSIL/Bladabindi.B
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.RL_SpyGate.C3495328
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.36738.bm0@a4jVUQh
ALYac Generic.MSIL.Bladabindi.134BC814
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Trojan.MSIL.Bladabindi.Heur
Cylance unsafe
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Bladabindi.16000442
Yandex Clean
Ikarus Trojan.MSIL.Bladabindi
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Bladabindi.BC!tr
AVG Win32:RATX-gen [Trj]
Avast Win32:RATX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.