Static | ZeroBOX

PE Compile Time

2061-02-28 05:10:06

PDB Path

C:\Users\User\Desktop\Crypter\UrbanBishopLocal-master\UrbanBishopLocal-master\UrbanBishopLocal\obj\x64\Release\adb.pdb

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0004ba58 0x0004bc00 4.04745180199
.rsrc 0x0004e000 0x00000380 0x00000400 2.81772522781

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0004e058 0x00000324 LANG_NEUTRAL SUBLANG_NEUTRAL data

!This program cannot be run in DOS mode.
`.rsrc
v4.0.30319
#Strings
__StaticArrayInitTypeSize=24
ToInt64
<Module>
<PrivateImplementationDetails>
SECT_DATA
7E79A4F79D632B1D226CF27DA520A669C3F10265852BBF6D841BD195EC5197CB
mscorlib
isvalid
method
ShellCode
EndInvoke
BeginInvoke
RuntimeFieldHandle
RuntimeTypeHandle
GetTypeFromHandle
SectionHandle
ProcessHandle
Console
WriteLine
ValueType
AllocationType
MulticastDelegate
MapLocalSectionAndWrite
CompilerGeneratedAttribute
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
UnmanagedFunctionPointerAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
ToByte
CommitSize
ViewSize
MaxSize
Initialize
System.Runtime.Versioning
FromBase64String
ToString
AsyncCallback
callback
UrbanBishopLocal
Marshal
adb.dll
ntdll.dll
Program
System
NtCreateSection
NtMapViewOfSection
hSection
System.Reflection
section
InheritDisposition
CallingConvention
Runner
GetDelegateForFunctionPointer
IntPtr
allocationAttribs
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
RuntimeHelpers
pAttrs
desiredAccess
BaseAddress
ZeroBits
Concat
Format
Object
object
Win32Protect
SectionOffset
op_Explicit
IAsyncResult
result
pageProt
Convert
InitializeArray
op_Inequality
WrapNonExceptionThrows
UrbanBishopLocal
Copyright ? 2020
$88b8515e-a0e8-4208-a9a0-34b01d7ba533
1.0.0.0
.NETFramework,Version=v4.8
FrameworkDisplayName
.NET Framework 4.8
C:\Users\User\Desktop\Crypter\UrbanBishopLocal-master\UrbanBishopLocal-master\UrbanBishopLocal\obj\x64\Release\adb.pdb
|-> hSection: 0x
|-> Size:
[!] Failed to create section..
[>] Creating first view with PAGE_READWRITE
|-> pBase: 0x
[!] Failed to map section locally..
[>] Creating second view with PAGE_EXECUTE_READ
[>] Creating local section..
[>] Triggering shellcode using delegate!
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
sorootktools
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
UrbanBishopLocal
FileVersion
1.0.0.0
InternalName
adb.dll
LegalCopyright
Copyright ? 2020
LegalTrademarks
OriginalFilename
adb.dll
ProductName
UrbanBishopLocal
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W64.AIDetectMalware.CS
Lionic Trojan.Win32.Agent.Y!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Trojanx-10016099-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Gen:Variant.Cerbu.193523
Cylance unsafe
Zillya Clean
Sangfor Dropper.Msil.Kryptik.Vwu3
CrowdStrike win/malicious_confidence_100% (W)
Alibaba TrojanDropper:MSIL/Kryptik.8a098114
K7GW Clean
K7AntiVirus Clean
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 a variant of MSIL/Kryptik.AERA
APEX Clean
Avast Win64:TrojanX-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-Dropper.MSIL.Agent.gen
BitDefender Gen:Variant.Cerbu.193523
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Cerbu.193523
Tencent Msil.Trojan-Dropper.Agent.Rwhl
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Trojan.InjectNET.58
VIPRE Gen:Variant.Cerbu.193523
TrendMicro Clean
Emsisoft Gen:Variant.Cerbu.193523 (B)
SentinelOne Static AI - Suspicious PE
GData Gen:Variant.Cerbu.193523
Jiangmin Clean
Webroot W32.Trojan.Gen
Varist W64/MSIL_Kryptik.JYA.gen!Eldorado
Avira TR/Kryptik.slfve
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Ransom.Win64.Wacatac.sa
Xcitium Clean
Arcabit Trojan.Cerbu.D2F3F3
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Dropper.MSIL.Agent.gen
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5337844
Acronis Clean
McAfee Artemis!335B8D0FFA6D
TACHYON Clean
VBA32 Clean
Malwarebytes CryptTool.Agent
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H0CAB24
Rising Malware.Obfus/MSIL@AI.98 (RDM.MSIL2:S8K0LGWraSsv0umEQZGMkQ)
Yandex Clean
Ikarus Trojan.MSIL.Crypt
MaxSecure Clean
Fortinet MSIL/Kryptik.AERA!tr
BitDefenderTheta Clean
AVG Win64:TrojanX-gen [Trj]
DeepInstinct MALICIOUS
No IRMA results available.