Static | ZeroBOX

PE Compile Time

2025-02-01 08:16:39

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00006384 0x00006400 5.63055261825
.rsrc 0x0000a000 0x00000240 0x00000400 4.96877165952
.reloc 0x0000c000 0x0000000c 0x00000200 0.0776331623432

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x0000a058 0x000001e7 LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, ASCII text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
  (u
v2.0.50727
#Strings
Stub.exe
mscorlib
Microsoft.VisualBasic
System
System.Drawing
System.Windows.Forms
user32.dll
kernel32
avicap32.dll
<Module>
MyApplication
ApplicationBase
Microsoft.VisualBasic.ApplicationServices
GeneratedCodeAttribute
System.CodeDom.Compiler
EditorBrowsableAttribute
System.ComponentModel
EditorBrowsableState
MyComputer
Computer
Microsoft.VisualBasic.Devices
DebuggerHiddenAttribute
System.Diagnostics
MyProject
Object
m_ComputerObjectProvider
m_AppObjectProvider
m_UserObjectProvider
m_MyWebServicesObjectProvider
.cctor
get_GetInstance
get_Computer
get_Application
get_User
get_WebServices
HelpKeywordAttribute
System.ComponentModel.Design
Application
WebServices
HideModuleNameAttribute
StandardModuleAttribute
Microsoft.VisualBasic.CompilerServices
MyWebServices
RuntimeHelpers
System.Runtime.CompilerServices
GetObjectValue
Equals
GetHashCode
GetTypeFromHandle
RuntimeTypeHandle
GetType
ToString
Activator
CreateInstance
Create__Instance__
instance
Dispose__Instance__
MyGroupCollectionAttribute
ThreadSafeObjectProvider`1
m_ThreadStaticValue
CompilerGeneratedAttribute
ThreadStaticAttribute
GetInstance
ComVisibleAttribute
System.Runtime.InteropServices
lastcap
WindowsIdentity
System.Security.Principal
WindowsPrincipal
TcpClient
System.Net.Sockets
FileStream
System.IO
FileInfo
MemoryStream
Conversions
ToBoolean
GetCurrent
IsInRole
WindowsBuiltInRole
Boolean
String
Replace
Environment
GetFolderPath
SpecialFolder
Concat
Assembly
System.Reflection
GetEntryAssembly
get_Location
Exception
Interaction
CreateObject
NewLateBinding
LateGet
LateSet
LateCall
ProjectData
SetProjectError
ClearProjectError
STAThreadAttribute
_Lambda__2
SessionEndingEventArgs
Microsoft.Win32
GetWindowTextLength
GetWindowTextLengthA
IntPtr
op_Equality
op_Explicit
Strings
get_Length
Encoding
System.Text
get_UTF8
GetString
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
Thread
System.Threading
Monitor
Stream
Dispose
set_ReceiveBufferSize
set_SendBufferSize
get_Client
Socket
set_SendTimeout
set_ReceiveTimeout
ToInteger
Connect
Operators
ConditionalCompareObjectEqual
connect
Convert
FromBase64String
ServerComputer
get_Registry
RegistryProxy
Microsoft.VisualBasic.MyServices
get_CurrentUser
RegistryKey
OpenSubKey
DeleteValue
ToBase64String
GetForegroundWindow
GetVolumeInformation
lpRootPathName
lpVolumeNameBuffer
nVolumeNameSize
lpVolumeSerialNumber
lpMaximumComponentLength
lpFileSystemFlags
lpFileSystemNameBuffer
nFileSystemNameSize
GetVolumeInformationA
GetWindowText
WinTitle
MaxLength
GetWindowTextA
GetValue
Environ
Conversion
isCritical
refWasCritical
needSystemCriticalBreaks
Process
Bitmap
Rectangle
Graphics
CompareMethod
CompareString
get_StartInfo
ProcessStartInfo
set_WindowStyle
ProcessWindowStyle
get_ExecutablePath
set_FileName
set_UseShellExecute
set_Verb
set_Arguments
ConcatenateObject
get_Chars
ToArray
GetTempFileName
WriteAllBytes
get_Name
get_Message
CompareObjectEqual
OrObject
Screen
get_PrimaryScreen
get_Bounds
get_Width
get_Height
PixelFormat
System.Drawing.Imaging
FromImage
CopyFromScreen
CopyPixelOperation
Cursor
get_Position
Cursors
get_Default
DrawImage
ImageFormat
get_Jpeg
WriteByte
EndApp
FileSystemInfo
get_FullName
ChangeType
DateTime
get_UserName
get_LastWriteTime
get_Date
get_Info
ComputerInfo
get_OSFullName
Substring
get_OSVersion
OperatingSystem
get_ServicePack
Contains
CreateSubKey
RegistryKeyPermissionCheck
GetValueNames
StrReverse
Command
SetValue
get_Directory
DirectoryInfo
ThreadStart
SessionEndingEventHandler
SystemEvents
add_SessionEnding
DoEvents
GetCurrentProcess
set_MinWorkingSet
ConditionalCompareObjectNotEqual
get_LocalMachine
MD5CryptoServiceProvider
System.Security.Cryptography
HashAlgorithm
ComputeHash
NtSetInformationProcess
hProcess
processInformationClass
processInformation
processInformationLength
Module
GetModules
GetTypes
EndsWith
get_Assembly
Plugin
get_Handle
get_Available
SelectMode
GetStream
NetworkStream
ReadByte
ToLong
Receive
SocketFlags
ParameterizedThreadStart
GetBytes
RegistryValueKind
ToLower
get_Parent
CompDir
Exists
Delete
FileMode
ReadAllBytes
AppWinStyle
SetEnvironmentVariable
EnvironmentVariableTarget
WebClient
System.Net
NameValueCollection
System.Collections.Specialized
LateIndexSet
Discord
DeleteSubKey
GZipStream
System.IO.Compression
CompressionMode
set_Position
BitConverter
ToInt32
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
MyTemplate
8.0.0.0
My.Computer
My.Application
My.User
My.WebServices
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
PPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
Ydmzipw~
https://344
Windows
nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
SGFjS2Vk
https://ten.sndd.rotsehymosos
AppData
winX32.exe
Put discord title link to receive notifications !!
WScript.Shell
CreateShortcut
TargetPath
Software\
SystemDrive
Setting_Chat
getvalue
Execute ERROR
Executed As
Execute ERROR
: C [
yy-MM-dd
??-??-??
Microsoft
https://
attrib +h +r +s "
SEE_MASK_NOZONECHECKS
content
You have a running computer...
information ------------------------------
[+] Name :
[+] System :
[+] Host :
[+] Port :
UploadValues
netsh firewall delete allowedprogram "
Software
cmd.exe /c ping 0 -n 2 & del "
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Generic.lWjm
Elastic Windows.Trojan.Njrat
ClamAV Win.Dropper.Nanocore-10030076-0
CMC Clean
CAT-QuickHeal Trojan.GenericFC.S17873958
Skyhigh BehavesLike.Win32.BackdoorNJRat.mm
ALYac Generic.MSIL.Bladabindi.C7664687
Cylance Unsafe
Zillya Trojan.Bladabindi.Win32.23092
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Backdoor:MSIL/AsyncRat.e955479e
K7GW Trojan ( 004915961 )
K7AntiVirus Trojan ( 004915961 )
huorong Backdoor/Bladabindi.e
Baidu Clean
VirIT Backdoor.Win32.BladabindiNET.J
Paloalto Clean
Symantec Backdoor.Ratenjay
tehtris Clean
ESET-NOD32 a variant of MSIL/Bladabindi.AS
APEX Malicious
Avast Win32:KeyloggerX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Generic.MSIL.Bladabindi.C7664687
NANO-Antivirus Trojan.Win32.Bladabindi.kvmqvs
ViRobot Clean
MicroWorld-eScan Generic.MSIL.Bladabindi.C7664687
Tencent Trojan.Win32.Bladabindi.16000334
Sophos Mal/AsyncRat-B
F-Secure Trojan.TR/Dropper.Gen7
DrWeb BackDoor.BladabindiNET.9
VIPRE Generic.MSIL.Bladabindi.C7664687
TrendMicro BKDR_BLADABI.SMC
McAfeeD Real Protect-LS!EEE37F6F66EA
Trapmine malicious.moderate.ml.score
CTX exe.trojan.bladabindi
Emsisoft Generic.MSIL.Bladabindi.C7664687 (B)
Ikarus Trojan.MSIL.Agent
FireEye Generic.mg.eee37f6f66eafa13
Jiangmin AdWare.Amonetize.ammc
Webroot Clean
Varist W32/MSIL_Bladabindi.GD.gen!Eldorado
Avira TR/Dropper.Gen7
Fortinet MSIL/Bladabindi.AS!tr
Antiy-AVL Clean
Kingsoft malware.kb.c.1000
Gridinsoft Ransom.Win32.Bladabindi.sa
Xcitium Clean
Arcabit Generic.MSIL.Bladabindi.CD74F42F
SUPERAntiSpyware Clean
Microsoft Backdoor:MSIL/AsyncRat!atmn
Google Detected
AhnLab-V3 Backdoor/Win32.Bladabindi.R137413
Acronis Clean
McAfee BackDoor-NJRat!EEE37F6F66EA
TACHYON Clean
VBA32 Trojan.MSIL.Autorave.Heur
Malwarebytes Bladabindi.Backdoor.Bot.DDS
Panda Trj/GdSda.A
Zoner Trojan.Win32.118968
TrendMicro-HouseCall Clean
Rising Backdoor.njRAT!1.D4D6 (CLASSIC)
Yandex Trojan.Agent!QwHTj9qDKeg
SentinelOne Static AI - Malicious PE
MaxSecure Clean
GData MSIL.Trojan.Bladabindi.BW
AVG Win32:KeyloggerX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Malware:MSIL/NanoBot.A
No IRMA results available.