Static | ZeroBOX

PE Compile Time

2024-04-15 06:52:51

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00007534 0x00007600 5.65319583378
.rsrc 0x0000a000 0x00020640 0x00020800 5.91388701443
.reloc 0x0002c000 0x0000000c 0x00000200 0.0815394123432

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x00029b88 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00029b88 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00029b88 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00029b88 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00029b88 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x00029b88 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0002a04c 0x0000005a LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0002a04c 0x0000005a LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0002a0a8 0x000003b0 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0002a458 0x000001e7 LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, ASCII text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
  sw
v2.0.50727
#Strings
<Module>
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
Microsoft.VisualBasic.ApplicationServices
ApplicationBase
System.CodeDom.Compiler
GeneratedCodeAttribute
System.ComponentModel
EditorBrowsableAttribute
EditorBrowsableState
Microsoft.VisualBasic.Devices
Computer
System.Diagnostics
DebuggerHiddenAttribute
System
Object
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
Microsoft.VisualBasic
HideModuleNameAttribute
MyGroupCollectionAttribute
RuntimeHelpers
GetObjectValue
Equals
GetHashCode
RuntimeTypeHandle
GetTypeFromHandle
ToString
Activator
CreateInstance
System.Runtime.InteropServices
ComVisibleAttribute
CompilerGeneratedAttribute
ThreadStaticAttribute
m_ThreadStaticValue
get_GetInstance
System.ComponentModel.Design
HelpKeywordAttribute
System.Timers
ElapsedEventArgs
Process
GetProcessesByName
ProjectData
EndApp
ElapsedEventHandler
add_Elapsed
set_Enabled
System.Net.Sockets
TcpClient
System.IO
FileStream
FileInfo
MemoryStream
Conversions
ToBoolean
System.Reflection
Assembly
GetEntryAssembly
get_Location
DebuggerStepThroughAttribute
Microsoft.Win32
SessionEndingEventArgs
Exception
IntPtr
op_Equality
op_Explicit
Strings
String
get_Length
SetProjectError
ClearProjectError
System.Text
Encoding
get_UTF8
GetString
DirectoryInfo
get_Name
ToLower
Operators
CompareString
get_Directory
get_Parent
System.Threading
Thread
Monitor
Stream
Dispose
set_ReceiveBufferSize
set_SendBufferSize
Socket
get_Client
set_SendTimeout
set_ReceiveTimeout
ToInteger
Connect
ConditionalCompareObjectEqual
Concat
Convert
FromBase64String
Microsoft.VisualBasic.MyServices
RegistryProxy
ServerComputer
get_Registry
RegistryKey
get_CurrentUser
OpenSubKey
DeleteValue
ToBase64String
System.Collections
IEnumerator
Interaction
GetObject
Boolean
NewLateBinding
LateGet
IEnumerable
GetEnumerator
get_Current
MoveNext
IDisposable
GetValue
Environ
Conversion
System.Net
WebClient
System.Drawing
Rectangle
Bitmap
Graphics
CompareMethod
RegistryValueKind
ConcatenateObject
get_Chars
ToArray
DownloadData
GetTempFileName
WriteAllBytes
get_Message
LateSet
LateCall
CompareObjectEqual
OrObject
System.Windows.Forms
Screen
get_PrimaryScreen
get_Bounds
get_Width
get_Height
System.Drawing.Imaging
PixelFormat
FromImage
CopyPixelOperation
CopyFromScreen
Cursor
get_Position
Cursors
get_Default
DrawImage
ImageFormat
get_Jpeg
WriteByte
FileSystemInfo
get_FullName
ChangeType
DateTime
Environment
get_MachineName
get_UserName
get_LastWriteTime
get_Date
ComputerInfo
get_Info
get_OSFullName
Replace
OperatingSystem
get_OSVersion
get_ServicePack
SpecialFolder
GetFolderPath
Contains
RegistryKeyPermissionCheck
CreateSubKey
GetValueNames
Exists
Delete
FileMode
ReadAllBytes
EnvironmentVariableTarget
SetEnvironmentVariable
AppWinStyle
SetValue
get_LocalMachine
FileSystemProxy
get_FileSystem
SpecialDirectoriesProxy
get_SpecialDirectories
get_ProgramFiles
Directory
GetLogicalDrives
GetExecutingAssembly
Command
ThreadStart
SessionEndingEventHandler
SystemEvents
add_SessionEnding
Application
DoEvents
GetCurrentProcess
set_MinWorkingSet
ConditionalCompareObjectNotEqual
System.Security.Cryptography
MD5CryptoServiceProvider
HashAlgorithm
ComputeHash
Module
GetModules
GetTypes
EndsWith
get_Assembly
get_Handle
get_Available
SelectMode
NetworkStream
GetStream
ReadByte
ToLong
SocketFlags
Receive
ParameterizedThreadStart
GetBytes
DeleteSubKey
System.IO.Compression
GZipStream
CompressionMode
set_Position
BitConverter
ToInt32
GetProcessById
get_MainWindowTitle
DateAndTime
get_Now
get_ProcessName
Keyboard
get_Keyboard
get_ShiftKeyDown
get_CapsLock
ToUpper
StringBuilder
get_CtrlKeyDown
Remove
STAThreadAttribute
Stub.exe
avicap32.dll
user32.dll
kernel32
user32
mscorlib
MyApplication
MyComputer
MyProject
MyWebServices
ThreadSafeObjectProvider`1
CsAntiProcess
m_ComputerObjectProvider
m_AppObjectProvider
m_UserObjectProvider
m_MyWebServicesObjectProvider
.cctor
get_Computer
get_Application
get_User
get_WebServices
GetType
Create__Instance__
instance
Dispose__Instance__
Handler
sender
Anti_CH
USB_SP
lastcap
_Lambda__1
_Lambda__2
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
CompDir
connect
GetForegroundWindow
GetVolumeInformation
GetVolumeInformationA
lpRootPathName
lpVolumeNameBuffer
nVolumeNameSize
lpVolumeSerialNumber
lpMaximumComponentLength
lpFileSystemFlags
lpFileSystemNameBuffer
nFileSystemNameSize
GetWindowText
GetWindowTextA
WinTitle
MaxLength
GetAntiVirus
GetWindowTextLength
GetWindowTextLengthA
NtSetInformationProcess
hProcess
processInformationClass
processInformation
processInformationLength
Plugin
LastAS
LastAV
lastKey
GetAsyncKeyState
GetKeyboardLayout
GetKeyboardState
GetWindowThreadProcessId
MapVirtualKey
ToUnicodeEx
VKCodeToUnicode
WebServices
GetInstance
MyTemplate
11.0.0.0
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
My.Computer
My.Application
My.User
My.WebServices
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
x%IDATx
3N:m]!
8WI FvL
0G&K~A
E'r&zsR
y=]f\9~"
c?=VH`
>SH .#&
&h<0Sv@
V9"]=A'b
TV_@{~
HW|AB
X(E%!a
6?RN,W
M50Rv1Y
G@m7Py(
A|6`Vz
];'0Usq
?u!/T#o
-\byQX
)kJXV2
q,\t&.
C&p.<o*
v%zql
E*)5o)
xnqw`L
<Nbh)~
]H:J`O
?K*c!|
]ru/iY.
B3*&r=
M<'qTal
=t7n>x3
3q7,fa}n
I~R^N
iOAbX`
t}4M>61
%)d$}A
")f&yC
$\"eB
$,m;J
2+^!|7v,
*`"v>
0vXe#"
-(Xg3n(
+^"]7t,
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
PPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
7JU]dkr
procexp
SbieCtrl
SpyTheSpy
wireshark
apateDNS
IPBlocker
TiGeR-Firewall
smsniff
exeinfoPE
NetSnifferCs
Sandboxie Control
processhacker
CodeReflect
Reflector
VGAuthService
VBoxService
AppData
GoogleChrome.exe
mndasl22.duckdns.org
5dfad7232bb02a500d6b739eb9de8be5
Software\Microsoft\Windows\CurrentVersion\Run
TXlCb3Q=
Y262SUCZ4UJJ
Software\
Select * From AntiVirusProduct
winmgmts:\\.\root\SecurityCenter2
ExecQuery
displayName
SystemDrive
getvalue
Execute ERROR
Download ERROR
Executed As
Execute ERROR
Update ERROR
Updating To
Update ERROR
yy-MM-dd
??-??-??
Microsoft
Windows
SEE_MASK_NOZONECHECKS
netsh firewall add allowedprogram "
" ENABLE
Tools.exe
netsh firewall delete allowedprogram "
Software
cmd.exe /c ping 0 -n 2 & del "
yy/MM/dd
[ENTER]
IMAGE_2024-04-15_003324328
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
*Description*
CompanyName
Google LLC
FileDescription
Google Chrome
FileVersion
98.0.100.22
InternalName
chrome.exe
LegalCopyright
Copyright 2024 Google LLC. All rights reserved.
LegalTrademarks
chrome
OriginalFilename
chrome.exe
ProductName
Google Chrome
ProductVersion
98.0.100.22
Assembly Version
98.0.100.22
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Generic.lA1H
Elastic Windows.Trojan.Njrat
Cynet Clean
CMC Clean
CAT-QuickHeal Trojan.GenericFC.S20328680
ALYac Gen:Variant.Jalapeno.1929
Cylance Unsafe
Zillya Trojan.Bladabindi.Win32.164479
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Backdoor:MSIL/Bladabindi.4311994a
K7GW Trojan ( 700000121 )
K7AntiVirus Trojan ( 700000121 )
huorong Backdoor/Bladabindi.e
Baidu MSIL.Backdoor.Bladabindi.a
VirIT Trojan.Win32.Dnldr25.DDDI
Paloalto generic.ml
Symantec MSIL.Trojan!gen2
tehtris Clean
ESET-NOD32 a variant of MSIL/Bladabindi.AS
APEX Malicious
Avast MSIL:Bladabindi-JK [Trj]
ClamAV Win.Packed.Generic-9795615-0
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Gen:Variant.Jalapeno.1929
NANO-Antivirus Trojan.Win32.Gen8.ecsqgn
ViRobot Trojan.Win.Z.Bladabindi.164352
MicroWorld-eScan Gen:Variant.Jalapeno.1929
Tencent Trojan.Msil.Bladabindi.fb
Sophos Mal/Bladabi-D
F-Secure Trojan.TR/Dropper.Gen7
DrWeb BackDoor.Bladabindi.15771
VIPRE Gen:Variant.Jalapeno.1929
TrendMicro BKDR_BLADABI.SMC
McAfeeD Real Protect-LS!79DE31CB069A
Trapmine malicious.moderate.ml.score
CTX exe.trojan.bladabindi
Emsisoft Gen:Variant.Jalapeno.1929 (B)
Ikarus Backdoor.MSIL.NJRat
FireEye Generic.mg.79de31cb069a4e06
Jiangmin TrojanDropper.Autoit.dce
Webroot Clean
Varist W32/MSIL_Kryptik.UV.gen!Eldorado
Avira TR/Dropper.Gen7
Antiy-AVL Trojan[Backdoor]/MSIL.Bladabindi.as
Kingsoft malware.kb.c.1000
Gridinsoft Clean
Xcitium Backdoor.MSIL.Bladabindi.BA@7oej5x
Arcabit Trojan.Jalapeno.D789
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Generic
Microsoft Backdoor:MSIL/Bladabindi
Google Detected
AhnLab-V3 Trojan/Win32.RL_Bladabindi.R268107
Acronis suspicious
VBA32 Trojan.MSIL.Bladabindi.Heur
TACHYON Clean
Malwarebytes Bladabindi.Backdoor.Bot.DDS
Panda Trj/CI.A
Zoner Trojan.Win32.85838
TrendMicro-HouseCall Clean
Rising Backdoor.njRAT!1.9E49 (CLASSIC)
Yandex Trojan.AvsMofer.dd6520
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.121218.susgen
Fortinet MSIL/Bladabindi.AS!tr
AVG MSIL:Bladabindi-JK [Trj]
DeepInstinct MALICIOUS
alibabacloud RansomWare:MSIL/Bladabindi.AS
No IRMA results available.