Static | ZeroBOX

PE Compile Time

2094-04-19 06:51:10

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00002404 0x00002600 5.51323694496
.rsrc 0x00006000 0x00000596 0x00000600 4.02078645867
.reloc 0x00008000 0x0000000c 0x00000200 0.0611628522412

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000060a0 0x0000030c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000063ac 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
<Random>b__6_0
IEnumerable`1
List`1
ToInt32
Func`2
<Module>
System.IO
utkmtqvouaa
wirwntmnca
DownloadData
xuzpoqnmab
mscorlib
zabjuxrghwyjb
wdsfuniglhzkb
rewojkrcjpb
set_Verb
xyrzxozcuzvub
System.Collections.Generic
mddaevqfquc
Thread
jsieanuxigfzwd
Replace
FileMode
dxkxshepjgoje
Enumerable
IDisposable
get_Handle
GetModuleHandle
IsInRole
WindowsBuiltInRole
get_MainModule
ProcessModule
set_WindowStyle
ProcessWindowStyle
get_FileName
set_FileName
get_ProcessName
DateTime
Combine
itcybhwzemne
SecurityProtocolType
System.Core
X509Store
Dispose
X509Certificate
Update
Delegate
CompilerGeneratedAttribute
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
set_UseShellExecute
GetPropertyValue
ihysotintalkzjf
ybqllnffwwqhykmf
wouuwwgswufppf
lhdqfpnkhyf
uvybldoqfcfg
qcpblpbbeyvmg
System.Threading
Encoding
System.Runtime.Versioning
DownloadString
ToString
GetString
GetFolderPath
get_Length
qindhupbfrcti
anliyjqayopdj
astnyhnqggj
tmkvrihlixlj
ikqbueehvdtmlxj
RemoteCertificateValidationCallback
get_ServerCertificateValidationCallback
set_ServerCertificateValidationCallback
zjcnxtjzccwmk
System.Security.Principal
WindowsPrincipal
czlccltncfl
kernel32.dll
ajxgbzpoajuprnl
set_SecurityProtocol
mrslzhgjvzngsl
FileStream
csfmvooalzyadm
get_Item
System
Random
pvazyuwomcbiqm
bjdxzybmktvlwtm
X509Chain
StoreLocation
System.Reflection
ManagementObjectCollection
nsnprcodgcpon
npntmirllisn
broutrfuafrfco
ojfnsgcvuudo
set_StartInfo
ProcessStartInfo
DirectoryInfo
ywgsxnbskuto
epzwnbbqebbp
ztxgqpckkmnmp
uzbclqduejwgq
System.Linq
rxhuukktuq
SpecialFolder
ServicePointManager
ManagementObjectSearcher
ToUpper
ToLower
ManagementObjectEnumerator
GetEnumerator
.cctor
IntPtr
shzbmtvubzdtr
nwjwwkaaorrezr
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
GetProcesses
System.Security.Cryptography.X509Certificates
NextBytes
OpenFlags
get_Ticks
yhjvclpsifms
Contains
get_Chars
SslPolicyErrors
GetCurrentProcess
set_Arguments
Exists
Concat
Repeat
ManagementBaseObject
Select
xfsneziqtcagdt
System.Net
ztspiyjmsnget
get_Default
ToUpperInvariant
WebClient
System.Management
Environment
get_Current
GetCurrent
CheckRemoteDebuggerPresent
xiidrksirewsot
uzmoabytst
MoveNext
System.Text
tnogvuslzu
gadguplttrtoomv
yhvnsuhudtv
get_Now
set_CreateNoWindow
juymvzsfpztsfx
ToArray
CreateDirectory
op_Equality
System.Net.Security
WindowsIdentity
WrapNonExceptionThrows
Installer
Copyright
2024
$455e30ab-c4e0-4df3-a288-2f8ff320ff28
1.0.0.0
.NETFramework,Version=v4.5
FrameworkDisplayName
.NET Framework 4.5
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
GWLpI65VYXJFFVT0
Fe$<>/4#87Ugz
*Z@%07$
;E]354d#>3
gmodrsx`
niw3'(21H42>
EE:,+d#>3(
,PR>02!*+8;@6%?
<@B. "
?)u+6/x7_*x
i?1/*"%iX($8
ZYx=4&
1~^-ZY
|y>8)+v
YX&,,/4
/WV",*/4
&EZ0-x))4&;B&#%'
Y)d~/_Q36
%(2$;\+2>
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Installer
FileVersion
1.0.0.0
InternalName
Stub.exe
LegalCopyright
Copyright
2024
LegalTrademarks
OriginalFilename
Stub.exe
ProductName
Installer
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Generic.4!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis!Trojan
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Downloader.Msil.Agent.V81v
K7AntiVirus Clean
Alibaba Trojan:MSIL/Generic.96316e5e
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.QZK
APEX Malicious
Avast Win32:MalwareX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan.MSIL.Quasar.gen
BitDefender Trojan.GenericKD.73818335
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Msil.Trojan-Downloader.Ader.Gplw
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/Dropper.Gen
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfeeD ti!B8009341F881
Trapmine Clean
FireEye Generic.mg.772fe24df16e3950
Emsisoft Clean
huorong Trojan/MSIL.Agent.kg
GData Win32.Trojan.Agent.9PH90D
Jiangmin Clean
Webroot Clean
Varist W32/ABTrojan.MGCO-2448
Avira TR/Dropper.Gen
Antiy-AVL Clean
Kingsoft malware.kb.c.852
Gridinsoft Backdoor.Win32.Quasar.tr
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Trojan:Win32/Vindor!pz
Google Clean
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!772FE24DF16E
MAX malware (ai score=83)
VBA32 Clean
Malwarebytes Generic.Malware/Suspicious
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Downloader.Agent!8.B23 (CLOUD)
Yandex Clean
Ikarus Clean
MaxSecure Clean
Fortinet MSIL/Agent.QZK!tr.dldr
BitDefenderTheta Gen:NN.ZemsilF.36810.am0@aK9UpDj
AVG Win32:MalwareX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Trojan[downloader]:MSIL/Agent.QOJ
No IRMA results available.