Static | ZeroBOX

PE Compile Time

2023-11-26 20:47:33

PE Imphash

dae02f32a21e03ce65412f6e56942daa

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000033ac 0x00003400 5.59431156004
.rsrc 0x00006000 0x00000358 0x00000400 2.70319496907
.reloc 0x00008000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00006058 0x000002fc LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library mscoree.dll:
0x10002000 _CorDllMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
<>p__0
string_0
intptr_0
object_0
uint_0
DD22222220000000011111
<>p__1
intptr_1
object_1
IEnumerable`1
CallSite`1
Class1
kernel32
ToUInt32
ToInt32
<>p__2
smethod_2
object_2
Action`2
<>p__3
Func`3
PayloadEmBase64
<>p__4
smethod_4
Func`4
<>p__5
ToInt16
<>p__6
smethod_6
<>p__7
get_UTF8
<>p__8
<>p__9
smethod_9
<Module>
LoadLibraryA
BrKxOILebBmfeOUlbp
ODzJXYhOUvC
yeWiOZppNopqROkgUoNjtHfCCOWOyD
System.IO
nIMsmqTTZwPKNRDgHNLTmYWWeNGMO
mdSwlcnvkMPLZnQwokjDlSHvLUmGRQ
NetFrameWorkMaconha
mscorlib
System.Collections.Generic
Microsoft.VisualBasic
GetProcessById
bytesRead
thread
AntiVmMethod
Replace
EndInvoke
BeginInvoke
Enumerable
RuntimeTypeHandle
GetTypeFromHandle
handle
set_WindowStyle
ProcessWindowStyle
set_FileName
applicationName
get_ProcessName
commandLine
CheckForVirtualMachine
ValueType
System.Core
MyClose
Reverse
Create
MulticastDelegate
CallSite
GuidAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
ObfuscationAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
YanoAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
get_Size
bufferSize
SizeOf
set_Encoding
System.Runtime.Versioning
FromBase64String
DownloadString
ToString
GetString
length
AsyncCallback
callback
Marshal
Fiber.dll
ixLUbUbLGOhPzYGnlUDhIqCIwKdeGm
AntiVm
System
bytesWritten
Version
processInformation
Interaction
System.Reflection
Exception
startupInfo
CSharpArgumentInfo
set_StartInfo
ProcessStartInfo
Microsoft.CSharp
System.Linq
aPkTmDDkWyC
UBxQLHJPsbfDCPPHZr
InvokeMember
SetMember
Microsoft.CSharp.RuntimeBinder
CallSiteBinder
Buffer
buffer
GetDelegateForFunctionPointer
BitConverter
.cctor
IntPtr
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
inheritHandles
GetProcesses
threadAttributes
processAttributes
GetBytes
creationFlags
CSharpArgumentInfoFlags
CSharpBinderFlags
Contains
Process
process
GetProcAddress
address
set_Arguments
Exists
Concat
CreateObject
object
protect
System.Net
Target
IAsyncResult
result
WebClient
Environment
environment
Convert
System.Text
context
ToArray
BlockCopy
currentDirectory
op_Equality
Lrrtfc
dRrgPxHpIcGUMcCRvWQdnv
WrapNonExceptionThrows
Copyright
2023
$0ea17cfe-3a6f-4f25-be74-3b106db3e3e6
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
StripAfterObfuscation
_CorDllMain
mscoree.dll
@&H@&#
vmtoolsd
VBoxService
@Thread
Resume
Wow64Set%
ThreadContext
+adContext
SetThre
kernel32
Wow64GetThreadContext
#ontext
GetThreadC
qllocEx
VirtualA
WritePro@
cessMemory
!ssMemory
ReadProce
#ewOfSection
ZwUnmapVi
Create&
ProcessA
C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe
-WindowStyle Hidden Copy-Item -Path *.vbs -Destination
WScript.Shell
SpecialFolders
Startup
CreateShortcut
IconLocation
C:\Windows\System32\shell32.dll,
TargetPath
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WorkingDirectory
WindowStyle
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden Start-Sleep 5;Start-Process
Arguments
Description
Microsoft
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
1.0.15.0
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
FileVersion
1.0.0.0
InternalName
Fiber.dll
LegalCopyright
Copyright
2023
LegalTrademarks
OriginalFilename
Fiber.dll
ProductName
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
MicroWorld-eScan Clean
ClamAV Win.Trojan.Bladbindi-1
FireEye Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Clean
Malwarebytes Trojan.Downloader.MSIL.Generic
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Clean
K7GW Clean
CrowdStrike win/malicious_confidence_100% (D)
Arcabit Clean
Baidu Clean
VirIT Clean
Symantec Clean
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.PIX
APEX Clean
Paloalto Clean
Cynet Clean
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Clean
TACHYON Clean
Emsisoft Clean
F-Secure Clean
DrWeb Trojan.DownLoaderNET.842
VIPRE Clean
TrendMicro Clean
Trapmine Clean
CMC Clean
Sophos Clean
Ikarus Clean
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Microsoft Trojan:Win32/Wacatac.B!ml
SUPERAntiSpyware Clean
ZoneAlarm Clean
GData Clean
Varist Clean
AhnLab-V3 Malware/Win32.RL_Generic.C3754190
Acronis Clean
McAfee Clean
MAX Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
Fortinet MSIL/Injector.UWS!tr
BitDefenderTheta Clean
AVG MSIL:GenMalicious-CQL [Trj]
Avast MSIL:GenMalicious-CQL [Trj]
No IRMA results available.