Static | ZeroBOX

PE Compile Time

2020-07-15 17:47:14

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000013ac 0x00001400 5.38590603386
.rsrc 0x00004000 0x00000600 0x00000600 4.25875664846
.reloc 0x00006000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00004090 0x0000036e LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00004410 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
IEnumerable`1
List`1
<Module>
System.IO
mscorlib
System.Collections.Generic
get_PropertiesToLoad
System.Collections.Specialized
password
FileMode
Enumerable
IDisposable
Console
userName
ReadLine
WriteLine
set_SearchScope
System.Core
Dispose
Authenticate
Delete
DebuggableAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
SharpDomainSpray.exe
set_PageSize
Encoding
System.Runtime.Versioning
ToString
get_Length
FindAll
FileStream
get_EndOfStream
get_Item
System
GetCurrentDomain
domain
System.Reflection
ResultPropertyValueCollection
StringCollection
SearchResultCollection
ResultPropertyCollection
DirectoryServicesCOMException
System.Linq
StreamReader
TextReader
DirectorySearcher
Pass2User
set_Filter
GetEnumerator
.cctor
System.Diagnostics
System.Runtime.CompilerServices
System.DirectoryServices
DebuggingModes
get_Properties
Contains
User2Pass
MainClass
FileAccess
Exists
Concat
get_NativeObject
get_Default
SearchResult
Environment
get_Current
get_Count
DomainUserList
MoveNext
System.Text
SharpDomainSpray
System.DirectoryServices.ActiveDirectory
get_CurrentDirectory
DirectoryEntry
v(u7b.
[US*N(u7b
h"}(u7b
*g~b0R
WrapNonExceptionThrows
SharpDomainSpray
${AuthorCopyright}
.NETFramework,Version=v4.6.1
FrameworkDisplayName
.NET Framework 4.6.1
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
LDAP://
[>] User:
Password is:
Count:
\password.txt
File not found
Finish!
############## SharpDomainSpray Code By RcoIl ##############
-Pass2User
[+]
[*]
: {0}
-User2Pass
[+]
password.txt
[*]
Error: Not enough arguments.
(&(objectCategory=Person)(sAMAccountName=*)(!userAccountControl:1.2.840.113556.1.4.803:=16)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))
sAMAccountName
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
SharpDomainSpray
FileVersion
1.0.7501.30217
InternalName
SharpDomainSpray.exe
LegalCopyright
${AuthorCopyright}
LegalTrademarks
OriginalFilename
SharpDomainSpray.exe
ProductName
ProductVersion
1.0.7501.30217
Assembly Version
1.0.7501.30217
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Shapray.4!c
Elastic malicious (moderate confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Generic.zt
ALYac Gen:Variant.Marsilia.12815
Cylance unsafe
Zillya Clean
Sangfor Trojan.Msil.Tnega.Vch8
CrowdStrike Clean
Alibaba VirTool:MSIL/Shapray.3321bcf5
K7GW Riskware ( 0040eff71 )
K7AntiVirus Riskware ( 0040eff71 )
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec Trojan Horse
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Avast Win32:Malware-gen
Cynet Clean
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Variant.Marsilia.12815
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Marsilia.12815
Tencent Clean
TACHYON Clean
Sophos SharpDomainSpray (PUA)
F-Secure Trojan.TR/Redcap.wkpij
DrWeb Clean
VIPRE Gen:Variant.Marsilia.12815
TrendMicro TROJ_GEN.R002C0DL622
Trapmine Clean
FireEye Gen:Variant.Marsilia.12815
Emsisoft Gen:Variant.Marsilia.12815 (B)
SentinelOne Clean
GData Gen:Variant.Marsilia.12815
Jiangmin Clean
Webroot Clean
Varist W32/ABRisk.QGEB-5271
Avira TR/Redcap.wkpij
Antiy-AVL HackTool[VirTool]/MSIL.Shapray
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Marsilia.D320F
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:MSIL/Tnega!MSR
Google Detected
AhnLab-V3 HackTool/Win.Agent.C5410826
Acronis Clean
McAfee RDN/Generic PUP.z
MAX malware (ai score=84)
VBA32 Clean
Malwarebytes Malware.AI.3856920286
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0DL622
Rising Trojan.Tnega!8.11997 (CLOUD)
Yandex Clean
Ikarus Virus.MSIL.Shapray
MaxSecure Trojan.Malware.192075242.susgen
Fortinet Clean
BitDefenderTheta Clean
AVG Win32:Malware-gen
DeepInstinct MALICIOUS
alibabacloud Trojan:Win/Tnega
No IRMA results available.