Static | ZeroBOX

PE Compile Time

2023-12-08 06:22:32

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00009884 0x00009a00 5.62727554152
.rsrc 0x0000c000 0x000004e8 0x00000600 3.7548730747
.reloc 0x0000e000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0000c0a0 0x00000254 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0000c2f8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
  (y
v4.0.30319
#Strings
<Module>
mscorlib
Microsoft.VisualBasic
MyApplication
MyComputer
MyProject
MyWebServices
ThreadSafeObjectProvider`1
Settings
ClientSocket
Messages
Helper
RemoteDesktop
AppendOutputTextDelegate
Microsoft.VisualBasic.ApplicationServices
ApplicationBase
Microsoft.VisualBasic.Devices
Computer
System
Object
.cctor
get_Computer
m_ComputerObjectProvider
get_Application
m_AppObjectProvider
get_User
m_UserObjectProvider
get_WebServices
m_MyWebServicesObjectProvider
Application
WebServices
Equals
GetHashCode
GetType
ToString
Create__Instance__
instance
Dispose__Instance__
get_GetInstance
m_ThreadStaticValue
GetInstance
Mutexx
System.Threading
_appMutex
current
isConnected
System.Net.Sockets
Socket
BufferLength
BufferLengthReceived
Buffer
System.IO
MemoryStream
ManualResetEvent
allDone
SendSync
BeginConnect
IAsyncResult
BeginReceive
BeginRead
EndSend
isDisconnected
System.Diagnostics
Process
_MyProcess
get_MyProcess
set_MyProcess
WithEventsValue
processid
AppendOutputText
DataReceivedEventArgs
MyProcess_ErrorDataReceived
sender
MyProcess_OutputDataReceived
WSound
mouse_event
dwFlags
cButtons
dwExtraInfo
user32
keybd_event
Thread
capCreateCaptureWindowA
lpszWindowName
dwStyle
nWidth
nHeight
hwndParent
Handle
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
getFolders
location
getFiles
getDrives
Download
MyProcess
GetHashT
strToHash
frombase64
Plugin
AES_Encryptor
AES_Decryptor
INDATE
Comment
Antivirus
CreateMutex
CloseMutex
userAgents
IPHOST
PortHost
IsValid
Address
BitBlt
nXDest
nYDest
hdcSrc
gdi32.dll
System.Drawing
Capture
System.Drawing.Imaging
ImageCodecInfo
GetEncoderInfo
MulticastDelegate
TargetObject
TargetMethod
AsyncCallback
BeginInvoke
DelegateCallback
DelegateAsyncState
EndInvoke
DelegateAsyncResult
Invoke
System.ComponentModel
EditorBrowsableAttribute
EditorBrowsableState
System.CodeDom.Compiler
GeneratedCodeAttribute
DebuggerHiddenAttribute
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
HideModuleNameAttribute
System.ComponentModel.Design
HelpKeywordAttribute
System.Runtime.CompilerServices
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
Activator
CreateInstance
MyGroupCollectionAttribute
System.Runtime.InteropServices
ComVisibleAttribute
ThreadStaticAttribute
CompilerGeneratedAttribute
GetCurrentProcess
ProcessModule
get_MainModule
get_FileName
VB$AnonymousDelegate_0
_Lambda$__1
DebuggerDisplayAttribute
FileInfo
Exception
Environment
SpecialFolder
GetFolderPath
GetFileName
String
Concat
FileSystemInfo
FileAttributes
set_Attributes
ProjectData
SetProjectError
ClearProjectError
Interaction
Environ
ServerComputer
Microsoft.VisualBasic.MyServices
RegistryProxy
get_Registry
Microsoft.Win32
RegistryKey
get_CurrentUser
OpenSubKey
GetFileNameWithoutExtension
SetValue
ThreadStart
Random
WaitHandle
WaitOne
STAThreadAttribute
_Lambda$__2
_Lambda$__3
DebuggerStepThroughAttribute
TimerCallback
AddressFamily
SocketType
ProtocolType
set_ReceiveBufferSize
set_SendBufferSize
Conversions
ToInteger
Connect
SocketFlags
EventWaitHandle
ComputerInfo
get_UserName
get_OSFullName
Replace
OperatingSystem
get_OSVersion
get_ServicePack
get_Is64BitOperatingSystem
Boolean
EndReceive
ToArray
ToLong
Stream
Dispose
WriteByte
get_Length
WaitCallback
ThreadPool
QueueUserWorkItem
ObjectFlowControl
CheckForSyncLockOnValueType
Monitor
SelectMode
BeginSend
IDisposable
Collect
_Closure$__1
$VB$Local_A
_Lambda$__6
_Lambda$__4
_Lambda$__5
DataReceivedEventHandler
remove_OutputDataReceived
remove_ErrorDataReceived
add_OutputDataReceived
add_ErrorDataReceived
Operators
AddObject
get_Data
System.Net
WebClient
StreamWriter
Bitmap
FileAttribute
Rectangle
ProcessStartInfo
DateTime
System.Collections
IEnumerator
Strings
CompareMethod
CompareString
System.Windows.Forms
Restart
SocketShutdown
Shutdown
NewLateBinding
LateCall
ChangeType
Screen
get_PrimaryScreen
get_Bounds
get_Size
ConcatenateObject
LateGet
Cursor
set_Position
Convert
ToBoolean
ToByte
UIntPtr
GetTempFileName
DownloadFile
CreateObject
LateSet
AppWinStyle
ToInt32
Exists
get_StartInfo
set_FileName
set_Arguments
set_UseShellExecute
set_RedirectStandardError
set_RedirectStandardOutput
set_CreateNoWindow
WaitForExit
set_RedirectStandardInput
get_Id
BeginErrorReadLine
BeginOutputReadLine
get_StartTime
get_StandardInput
TextWriter
WriteLine
GetProcesses
get_ProcessName
GetExtension
GetProcessById
Delete
Directory
FileSystemProxy
get_FileSystem
RenameDirectory
RenameFile
ReadAllText
GetThumbnailImageAbort
IntPtr
GetThumbnailImage
ImageFormat
get_Png
FileSystem
SetAttr
CreateDirectory
FileStream
Create
ReadAllBytes
ToBase64String
WriteAllBytes
GetTempPath
CopyDirectory
MoveDirectory
get_Audio
Registry
GetValue
IEnumerable
GetEnumerator
get_Current
MoveNext
Network
get_Network
MessageBox
DialogResult
UploadFile
DirectoryInfo
GetDirectories
get_Name
GetFiles
DriveInfo
System.Collections.Generic
IEnumerator`1
DriveType
System.Collections.ObjectModel
ReadOnlyCollection`1
get_Drives
get_DriveType
DllImportAttribute
avicap32.dll
user32.dll
AccessedThroughPropertyAttribute
MarshalAsAttribute
UnmanagedType
_Lambda$__7
System.Text
Encoding
get_Default
GetBytes
GetString
get_ProcessorCount
get_MachineName
get_SystemDirectory
GetPathRoot
get_TotalSize
System.Security.Cryptography
MD5CryptoServiceProvider
StringBuilder
get_ASCII
HashAlgorithm
ComputeHash
Append
Substring
ToUpper
FromBase64String
System.Reflection
Module
Assembly
GetModules
GetTypes
get_FullName
EndsWith
get_Assembly
RijndaelManaged
ICryptoTransform
SymmetricAlgorithm
set_Key
CipherMode
set_Mode
CreateEncryptor
TransformFinalBlock
CreateDecryptor
get_LastWriteTime
System.Security.Principal
WindowsIdentity
GetCurrent
WindowsPrincipal
WindowsBuiltInRole
IsInRole
System.Management
ManagementObjectSearcher
ManagementBaseObject
ManagementObjectCollection
ManagementObjectEnumerator
get_Item
get_DnsSafeHost
get_UTF8
EncoderParameter
EncoderParameters
Graphics
get_Width
get_Height
FromImage
FromHwnd
GetHdc
ReleaseHdc
Cursors
get_Position
op_Inequality
Encoder
Quality
get_Param
GetImageEncoders
get_MimeType
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
GuidAttribute
AssemblyFileVersionAttribute
AssemblyTrademarkAttribute
AssemblyCopyrightAttribute
AssemblyProductAttribute
AssemblyCompanyAttribute
AssemblyDescriptionAttribute
AssemblyTitleAttribute
XWormClient
XWormClient.exe
MyTemplate
14.0.0.0
My.Computer
My.Application
My.User
My.WebServices
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
<generated method>
<generated method>
MyProcess
WrapNonExceptionThrows
$8676214c-4828-4352-be17-a645bff0d60a
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
89.23.99.86
<123456789>
<Xwormmm>
USB.exe
9sFhtscMLr74lMX9
appdata
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft
Service Pack
XWorm V2.2
Error:
uninstall
update
Height
Memory
getinfo
openhide
internetexplorer.application
navigate
visible
shellfuc
regfuc
WScript.Shell
RegWrite
REG_DWORD
RunBotKiller
script
Cilpper
Clipper
injRun
startusb
startsp
PSleep
PreventSleep
taskkill.exe
/pid
CMD.EXE
Process Started at:
runnnnnn
closeshell
GetText
setText
clearr
BScreen
GetDrives
FileManager
Delete
Folder
Execute
Rename
txtttt
viewimage
hidefolderfile
showfolderfile
creatnewfolder
creatfile
downloadfile
downloadedfile
sendfileto
install
NETINS
7zip\7z.exe
InsProg
RSSDis
GETWCamPlu
GETWmicPlu
Wsound
GETWsoundPlu
JustFun
MapsPLU
closeKL
HKEY_CURRENT_USER\SOFTWARE\
GETTCP
GetActiveWindows
killAct
InstallN
InstallngC
\ngrok.exe
Getpass
Pvbnet
Emails
Error!
LLCHAT
[Folder]
FileManagerSplitFileManagerSplit
FileManagerSplit
[Drive]
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Err HWID
Class1
dd/MM/yyy
Nothing
\root\SecurityCenter2
Select * from AntivirusProduct
displayName
POST / HTTP/1.1
Host:
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
User-Agent:
Content-length: 5235
image/jpeg
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
XWormClient.exe
LegalCopyright
OriginalFilename
XWormClient.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.XWorm.j!c
Elastic Windows.Trojan.Xworm
DrWeb Trojan.MulDrop20.21028
MicroWorld-eScan IL:Trojan.MSILZilla.30401
CMC Clean
CAT-QuickHeal Backdoor.MsilFC.S31068087
Skyhigh BehavesLike.Win32.Generic.pm
McAfee GenericRXUQ-KQ!C24FB9E28286
Malwarebytes Generic.Malware.AI.DDS
VIPRE IL:Trojan.MSILZilla.30401
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 00592e8b1 )
BitDefender IL:Trojan.MSILZilla.30401
K7GW Trojan ( 00592e8b1 )
Cybereason malicious.82124c
Arcabit IL:Trojan.MSILZilla.D76C1
BitDefenderTheta Gen:NN.ZemsilF.36608.cm0@aaiguXf
VirIT Trojan.Win32.MSIL_Heur.A
Symantec MSIL.XWorm!gen1
tehtris Clean
ESET-NOD32 a variant of MSIL/Agent.DWN
Cynet Malicious (score: 100)
APEX Malicious
Paloalto Clean
ClamAV Win.Packed.Msilzilla-10005608-0
Kaspersky HEUR:Trojan-Ransom.MSIL.Blocker.gen
Alibaba Trojan:Win32/CoinMiner.330b5069
NANO-Antivirus Trojan.Win32.Ransom.keybtv
ViRobot Trojan.Win.Z.Agent.41984.DXC
Rising Backdoor.XWorm!1.E1F9 (CLASSIC)
Sophos Mal/Vermis-X
F-Secure Trojan:W32/XwormRAT.A
Baidu Clean
Zillya Trojan.Agent.Win32.2900607
TrendMicro Backdoor.Win32.XWORM.YXDLHZ
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.c24fb9e282869764
Emsisoft IL:Trojan.MSILZilla.30401 (B)
Ikarus Trojan.MSIL.Injector
Jiangmin Trojan.MSIL.aoysb
Webroot W32.Trojan.MSILZilla
Varist W32/MSIL_Ransom.D.gen!Eldorado
Avira HEUR/AGEN.1365768
MAX malware (ai score=85)
Antiy-AVL Trojan[Ransom]/MSIL.Blocker
Kingsoft malware.kb.c.1000
Gridinsoft Trojan.Win32.CoinMiner.sa
Xcitium Malware@#2m8jzj2wr2tle
Microsoft Trojan:Win32/CoinMiner!pz
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Ransom.MSIL.Blocker.gen
GData MSIL.Backdoor.SiRAT.A
Google Detected
AhnLab-V3 Trojan/Win.XWormRAT.C5120690
Acronis Clean
VBA32 Backdoor.MSIL.XWorm.gen
ALYac IL:Trojan.MSILZilla.30401
TACHYON Clean
DeepInstinct MALICIOUS
Cylance unsafe
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Backdoor.Win32.XWORM.YXDLHZ
Tencent Malware.Win32.Gencirc.10bf6bf1
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.121218.susgen
Fortinet MSIL/Agent.DWN!tr
AVG Win32:MalwareX-gen [Trj]
Avast Win32:MalwareX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.