Static | ZeroBOX

PE Compile Time

2086-12-15 11:36:33

PDB Path

C:\Users\UNKNOWN\Desktop\illegal new\obj\Debug\Microsoft.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00001b84 0x00001c00 5.02489628341
.rsrc 0x00004000 0x00009bbe 0x00009c00 2.42717309879
.reloc 0x0000e000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00004138 0x000094a8 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0000d5e0 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0000d5f4 0x000003de LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0000d9d4 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
<Module>
System.IO
get_IV
set_IV
mscorlib
ReadToEnd
RunPowerShellCommand
command
set_Mode
CryptoStreamMode
CipherMode
get_Message
IDisposable
Console
set_FileName
AESSifreleme
WriteLine
Dispose
Create
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
set_UseShellExecute
ToByte
Microsoft.exe
get_BlockSize
System.Runtime.Versioning
FromBase64String
Substring
get_Length
CryptoStream
MemoryStream
System
SymmetricAlgorithm
ICryptoTransform
sifreliMetin
System.Reflection
Exception
set_StartInfo
ProcessStartInfo
anahtar
StreamReader
TextReader
CreateDecryptor
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
Process
set_Arguments
Concat
Object
Microsoft
WaitForExit
Convert
get_StandardOutput
set_RedirectStandardOutput
set_CreateNoWindow
StringToByteArray
get_Key
set_Key
System.Security.Cryptography
WrapNonExceptionThrows
'Microsoft Visual Studio Solution (.sln)
Microsoft
Visual Studio
Microsoft Corporation. All rights reserved
$a412b597-0df1-40a2-bfe9-17931cb212ae
17.7.34202.233
.NETFramework,Version=v4.8
FrameworkDisplayName
.NET Framework 4.8
C:\Users\UNKNOWN\Desktop\illegal new\obj\Debug\Microsoft.pdb
_CorExeMain
mscoree.dll
z!hez!h
z!hMz!h
z!hEz!h
z!hz!h
z!h#z!h
z!h?z!h
z!h#z!h
z!htz!h
z!h)z!h
z!h1z!h
z!h6z!h
z!h;z!h
BBB[BBB
z!h:z!h
BBBdBBB
z!h?z!h
BBBbBBB
z!hPz!h
z!hDz!h
BBBbBBB
z!hDz!h
z!hNz!h
BBBbBBB
z!h9z!h
z!hwz!h
BBBfBBB
z!h1z!h
BBB!BBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBVBBBeBBB
z!h-z!h
z!h%z!h
z!h&z!h
z!h:z!h
z!h8z!h
z!hMz!h
z!hcz!h
z!hzz!h
z!h,z!hnz!h
z!htz!h
z!hvz!h
z!hyz!h
z!h{z!h
z!h^z!h
z!hlz!h
z!h6z!h
z!h}z!h
z!h?z!h=
BBBPBBB
BBBiBBB
z!hWz!h
z!hNz!h
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
230316184328Z
240314184328Z0t1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Corporation0
I0G1-0+
$Microsoft Ireland Operations Limited1
230012+5005170
Chttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a
Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0
c8LCaIJo
;sCkCe
;s,Ps
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20110
110708205909Z
260708210909Z0~1
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 20110
Ihttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^
Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
3http://www.microsoft.com/pkiops/docs/primarycps.htm0@
*?*kXIc
QEX82q'
WqVNHE
Washington1
Redmond1
Microsoft Corporation1(0&
Microsoft Code Signing PCA 2011
http://www.microsoft.com0
AIT*Sk:g
20231003044323.089Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
230525191214Z
240201191214Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service0
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20231002173551Z
20231003173551Z0w0=
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
MA%nz\
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
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
A858098B090BCB5DC442763A557E303775D45C5F268760DD4BC149026822C954
powershell.exe
Hata:
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Microsoft Visual Studio Solution (.sln)
FileVersion
17.7.34202.233
InternalName
Microsoft.exe
LegalCopyright
Microsoft Corporation. All rights reserved
LegalTrademarks
OriginalFilename
Microsoft.exe
ProductName
Microsoft
Visual Studio
ProductVersion
17.7.34202.233
Assembly Version
17.7.34202.233
Legal_policy_statement
8Microsoft Visual Studio 202
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Nekark.4!c
tehtris Clean
MicroWorld-eScan Trojan.GenericKD.70732145
FireEye Generic.mg.51584394f75ed449
CAT-QuickHeal Clean
Skyhigh RDN/genericuh
ALYac Trojan.GenericKD.70732145
Cylance unsafe
VIPRE Clean
Sangfor Clean
K7AntiVirus Clean
BitDefender Trojan.GenericKD.70732145
K7GW Clean
Cybereason malicious.f9d9a9
BitDefenderTheta Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 MSIL/Agent.WPY
Cynet Clean
APEX Clean
Paloalto Clean
ClamAV Clean
Alibaba Trojan:MSIL/Nekark.0327821f
NANO-Antivirus Clean
ViRobot Clean
Sophos Mal/Behav-421
F-Secure Trojan.TR/AD.Nekark.iahes
Baidu Clean
Zillya Clean
Trapmine Clean
CMC Clean
Emsisoft Trojan.GenericKD.70732145 (B)
Ikarus Trojan.Nekark
Jiangmin Clean
Webroot W32.Trojan.Gen
Avira TR/AD.Nekark.iahes
MAX malware (ai score=89)
Antiy-AVL Trojan/MSIL.Agent
Kingsoft MSIL.Trojan.Agent.gen
Gridinsoft Trojan.Win32.Agent.sa
Xcitium Malware@#2irx32e680wik
Arcabit Trojan.Generic.D4374971
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.MSIL.Agent.gen
GData Trojan.GenericKD.70732145
Varist Clean
AhnLab-V3 Malware/Win.Generic.C5560647
Acronis Clean
McAfee RDN/genericuh
TACHYON Clean
Malwarebytes Trojan.FakeMS.Gen
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Clean
MaxSecure Trojan.Malware.8703358.susgen
Fortinet PossibleThreat
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.