Static | ZeroBOX

PE Compile Time

2024-10-31 14:23:27

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00008104 0x00008200 5.72197040514
.rsrc 0x0000c000 0x000004c8 0x00000600 3.68773425178
.reloc 0x0000e000 0x0000000c 0x00000200 0.0611628522412

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0000c0a0 0x00000234 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0000c2d8 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
3j%(4
v4.0.30319
#Strings
<Module>
mscorlib
Microsoft.VisualBasic
MyApplication
MyComputer
MyProject
MyWebServices
ThreadSafeObjectProvider`1
Settings
ClientSocket
Messages
Uninstaller
ProcessCritical
AlgorithmAES
Helper
LASTINPUTINFO
EXECUTION_STATE
Microsoft.VisualBasic.ApplicationServices
ApplicationBase
Microsoft.VisualBasic.Devices
Computer
System
Object
.cctor
get_Computer
m_ComputerObjectProvider
get_Application
m_AppObjectProvider
get_User
m_UserObjectProvider
get_WebServices
m_MyWebServicesObjectProvider
Application
WebServices
Equals
GetHashCode
GetType
ToString
Create__Instance__
instance
Dispose__Instance__
get_GetInstance
m_ThreadStaticValue
GetInstance
InstallDir
InstallStr
isConnected
System.Net.Sockets
Socket
BufferLength
Buffer
System.IO
MemoryStream
System.Threading
ManualResetEvent
allDone
SendSync
Interval
ActivatePong
BeginConnect
ConnectServer
INDATE
Spread
Antivirus
IAsyncResult
BeginReceive
BeginRead
EndSend
isDisconnected
Plugin
SendMSG
SendError
Thread
ReportWindow
Monitoring
OpenUrl
Hidden
capCreateCaptureWindowA
lpszWindowName
dwStyle
nWidth
nHeight
hwndParent
Handle
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
RunDisk
Extension
Memory
buffer
IsUpdate
SetCurrentProcessIsCritical
isCritical
refWasCritical
needSystemCriticalBreaks
Microsoft.Win32
SessionEndingEventArgs
SystemEvents_SessionEnding
sender
CriticalProcess_Enable
CriticalProcesses_Disable
Decrypt
ProcessDpi
SetProcessDpiAwareness
awareness
IsValidDomainName
FileStream
fileStream
Alphabet
Random
current
GetRandomString
length
GetLastInputInfo
idletime
lastInputInf
GetLastInputTime
TimeSpan
sumofidletime
LastLastIdletime
LastAct
userAgents
GetForegroundWindow
System.Text
StringBuilder
GetWindowText
SetThreadExecutionState
esFlags
PreventSleep
GetActiveWindowTitle
GetHashT
strToHash
SetValue
GetValue
Decompress
Compress
AES_Encryptor
AES_Decryptor
_appMutex
CreateMutex
CloseMutex
ValueType
cbSize
dwTime
value__
ES_CONTINUOUS
ES_DISPLAY_REQUIRED
ES_SYSTEM_REQUIRED
System.ComponentModel
EditorBrowsableAttribute
EditorBrowsableState
System.CodeDom.Compiler
GeneratedCodeAttribute
System.Diagnostics
DebuggerHiddenAttribute
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
HideModuleNameAttribute
System.ComponentModel.Design
HelpKeywordAttribute
System.Runtime.CompilerServices
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
Activator
CreateInstance
MyGroupCollectionAttribute
System.Runtime.InteropServices
ComVisibleAttribute
ThreadStaticAttribute
CompilerGeneratedAttribute
VB$AnonymousDelegate_0
MulticastDelegate
TargetObject
TargetMethod
AsyncCallback
BeginInvoke
DelegateCallback
DelegateAsyncState
EndInvoke
DelegateAsyncResult
Invoke
_Lambda$__1
_Lambda$__2
DebuggerDisplayAttribute
DebuggerStepThroughAttribute
Exception
FileInfo
Conversions
Environment
ExpandEnvironmentVariables
ProjectData
SetProjectError
ClearProjectError
String
Concat
DirectoryInfo
get_Directory
get_FullName
Directory
Exists
CreateDirectory
Delete
ReadAllBytes
WriteAllBytes
ServerComputer
Microsoft.VisualBasic.MyServices
RegistryProxy
get_Registry
RegistryKey
get_CurrentUser
OpenSubKey
GetFileNameWithoutExtension
SpecialFolder
GetFolderPath
Interaction
CreateObject
Boolean
NewLateBinding
LateGet
ChangeType
LateSetComplex
LateCall
FileMode
ToBoolean
ThreadStart
WaitHandle
WaitOne
STAThreadAttribute
_Lambda$__3
_Lambda$__4
System.Net
IPAddress
GetHostAddresses
TimerCallback
AddressFamily
SocketType
ProtocolType
set_ReceiveBufferSize
set_SendBufferSize
ToInteger
Connect
SocketFlags
EventWaitHandle
ComputerInfo
get_UserName
get_OSFullName
Replace
OperatingSystem
get_OSVersion
get_ServicePack
get_Is64BitOperatingSystem
DateTime
FileSystemInfo
get_LastWriteTime
GetFileName
Operators
CompareString
System.Security.Principal
WindowsIdentity
GetCurrent
WindowsPrincipal
WindowsBuiltInRole
IsInRole
System.Management
ManagementObjectSearcher
ManagementBaseObject
ManagementObjectCollection
ManagementObjectEnumerator
get_MachineName
GetEnumerator
get_Current
get_Item
Append
MoveNext
IDisposable
Dispose
get_Length
Substring
ObjectQuery
ManagementObject
ConcatenateObject
get_Info
get_TotalPhysicalMemory
UInt64
Conversion
Double
Remove
EndReceive
ToArray
ToLong
Stream
WriteByte
ParameterizedThreadStart
ObjectFlowControl
CheckForSyncLockOnValueType
Monitor
SelectMode
BeginSend
Collect
_Closure$__1
$VB$Local_Host
$VB$Local_Port
_Lambda$__7
_Lambda$__5
_Lambda$__6
WebClient
System.Drawing
Graphics
Rectangle
Bitmap
Strings
CompareMethod
System.Windows.Forms
Restart
SocketShutdown
Shutdown
Convert
FromBase64String
ServicePointManager
set_Expect100Continue
SecurityProtocolType
set_SecurityProtocol
set_DefaultConnectionLimit
GetTempPath
Combine
DownloadFile
Process
AppWinStyle
ReadAllText
WriteAllText
get_Message
DeleteSubKey
Screen
get_PrimaryScreen
get_Bounds
get_Width
get_Height
System.Drawing.Imaging
PixelFormat
FromImage
CopyPixelOperation
CopyFromScreen
GraphicsUnit
DrawImage
ImageFormat
get_Jpeg
ToBase64String
System.Reflection
MethodInfo
AppDomain
get_CurrentDomain
Assembly
GetTypes
MemberInfo
get_Name
GetMethods
ConditionalCompareObjectEqual
ToInt32
StartsWith
Stopwatch
FromSeconds
get_Elapsed
op_GreaterThan
System.Collections.Generic
List`1
GetProcesses
get_MainWindowTitle
IsNullOrEmpty
ToLower
Contains
Func`2
System.Core
System.Linq
Enumerable
IEnumerable`1
HttpWebRequest
HttpWebResponse
WebRequest
Create
set_UserAgent
set_AllowAutoRedirect
set_Timeout
set_Method
WebResponse
GetResponse
ProcessStartInfo
EndsWith
ProcessWindowStyle
set_WindowStyle
set_Arguments
get_EntryPoint
MethodBase
ParameterInfo
GetParameters
Encoding
get_UTF8
GetBytes
DllImportAttribute
avicap32.dll
MarshalAsAttribute
UnmanagedType
StreamWriter
Registry
CurrentUser
DeleteValue
GetTempFileName
TextWriter
WriteLine
get_StartupPath
get_ExecutablePath
set_FileName
set_CreateNoWindow
set_ErrorDialog
set_UseShellExecute
SessionEndingEventHandler
SystemEvents
add_SessionEnding
EnterDebugMode
NTdll.dll
RtlSetProcessIsCritical
System.Security.Cryptography
RijndaelManaged
ICryptoTransform
MD5CryptoServiceProvider
HashAlgorithm
ComputeHash
SymmetricAlgorithm
set_Key
CipherMode
set_Mode
CreateDecryptor
TransformFinalBlock
GetCurrentProcess
ProcessModule
get_MainModule
get_FileName
UriHostNameType
CheckHostName
get_Chars
Marshal
SizeOf
get_TickCount
GetString
get_ProcessorCount
get_SystemDirectory
GetPathRoot
DriveInfo
get_TotalSize
get_ASCII
ToUpper
RegistryKeyPermissionCheck
CreateSubKey
RegistryValueKind
BitConverter
System.IO.Compression
GZipStream
CompressionMode
SubtractObject
CreateEncryptor
SHCore.dll
user32.dll
kernel32.dll
StructLayoutAttribute
LayoutKind
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
GuidAttribute
AssemblyFileVersionAttribute
AssemblyTrademarkAttribute
AssemblyCopyrightAttribute
AssemblyProductAttribute
AssemblyCompanyAttribute
AssemblyDescriptionAttribute
AssemblyTitleAttribute
XC.exe
MyTemplate
14.0.0.0
My.User
My.Computer
My.WebServices
My.Application
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
<generated method>
<generated method>
WrapNonExceptionThrows
$921dc374-643f-4f72-b421-821a8f46fa18
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
tkrWfD7QNYZS1WmtMUQVS/oRPEOtRhSnl/k3VY3GbGz2tI+OSav5G2S6qS6PAB0i
6Iaj58DZfLrRaZKky1JZIQ==
4drkQ3qYOx/c5KsgsV8CKA==
Jre9Emg3NLixQFEmqvsqCQ==
yXij/ZBrNKUx5noR71725Q==
8ceSCUTg12w+Yc+aTmBDQg==
LDgEVc9Ot1G4ICC8Hx/TNA==
0Y2qodMLaEcJ48kP0wnI2g==
Q6QXs3CM0drEuir0
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WScript.Shell
CreateShortcut
TargetPath
WorkingDirectory
Microsoft
Service Pack
dd/MM/yyy
\root\SecurityCenter2
Select * from AntivirusProduct
displayName
SELECT * FROM Win32_VideoController
Win32_Processor.deviceid="CPU0"
Core(TM)
uninstall
update
Urlopen
Urlhide
PCShutdown
shutdown.exe /f /s /t 0
PCRestart
shutdown.exe /f /r /t 0
PCLogoff
shutdown.exe -L
RunShell
StartDDos
StopDDos
StartReport
StopReport
\drivers\etc\hosts
Shosts
HostsMSG
Modified successfully!
HostsErr
plugin
sendPlugin
savePlugin
RemovePlugins
Plugins Removed!
OfflineGet
OfflineKeylogger Not Enabled
Plugin
Invoke
RunRecovery
Recovery
RunOptions
injRun
UACFunc
Plugin Error!
ToLower
Open [
powershell.exe
-ExecutionPolicy Bypass -File "
POST / HTTP/1.1
Host:
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
User-Agent:
Content-length: 5235
@echo off
timeout 3 > NUL
" /f /q
Software\
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
abcdefghijklmnopqrstuvwxyz
Err HWID
ToArray
abcdefghijklmnopqrstuvwxyz
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
XC.exe
LegalCopyright
OriginalFilename
XC.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.XWorm.m!c
Elastic malicious (high confidence)
ClamAV Win.Packed.njRAT-10002074-1
CMC Clean
CAT-QuickHeal Trojan.GenericFC.S29960909
Skyhigh BehavesLike.Win32.Trojan.nm
ALYac Gen:Variant.Jalapeno.12124
Cylance Unsafe
Zillya Clean
CrowdStrike win/malicious_confidence_100% (D)
Alibaba Backdoor:MSIL/AsyncRAT.6633f27c
K7GW Trojan ( 005aa5f01 )
K7AntiVirus Trojan ( 005aa5f01 )
huorong Backdoor/MSIL.DDos.b
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.A
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Agent.DWN
APEX Malicious
Avast Win32:RATX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Backdoor.MSIL.XWorm.gen
BitDefender Gen:Variant.Jalapeno.12124
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Jalapeno.35840.EG
MicroWorld-eScan Gen:Variant.Jalapeno.12124
Tencent Worm.Msil.Xworm.16001238
Sophos Troj/RAT-FJ
F-Secure Heuristic.HEUR/AGEN.1370976
DrWeb BackDoor.Comet.152
VIPRE Gen:Variant.Jalapeno.12124
TrendMicro Clean
McAfeeD Real Protect-LS!1B76C0D5D1D6
Trapmine malicious.high.ml.score
CTX exe.trojan.msil
Emsisoft Gen:Variant.Jalapeno.12124 (B)
Ikarus Trojan.MSIL.Injector
FireEye Generic.mg.1b76c0d5d1d6a519
Jiangmin Clean
Webroot Clean
Varist W32/MSIL_Agent.BUD.gen!Eldorado
Avira HEUR/AGEN.1370976
Fortinet MSIL/Bladabindi.SSNY!tr
Antiy-AVL Clean
Kingsoft malware.kb.c.1000
Gridinsoft Malware.Win32.XWorm.tr
Xcitium Clean
Arcabit Trojan.Jalapeno.D2F5C
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Backdoor.MSIL.XWorm.gen
Microsoft Trojan:MSIL/AsyncRAT!atmn
Google Detected
AhnLab-V3 Backdoor/Win.AsyncRat.C5372433
Acronis Clean
McAfee Trojan-FVYT!1B76C0D5D1D6
TACHYON Clean
VBA32 Backdoor.MSIL.XWorm.gen
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Clean
Rising Backdoor.XWorm!1.E338 (CLASSIC)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
GData MSIL.Backdoor.XWorm.C
AVG Win32:RATX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Rat:Win/AsyncRAT.Stub
No IRMA results available.