PE Compile Time

2025-11-05 02:45:02

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00002f44 0x00002f44 6.97962087047
.rsrc 0x00006000 0x000004f0 0x000004f0 4.47753235457
.reloc 0x00008000 0x0000000c 0x0000000c 0.0

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000060a0 0x0000025c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00006300 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0xc42000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
q6[[Y.
IUD.i0i
VK&0e
bm:~RGT
.`Q|N$R/H.
AD>P# (1
@"o&
v4.0.30319
#Strings
<Module>
mscorlib
System
Object
Random
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
<Main>b__2
Func`2
CS$<>9__CachedAnonymousMethodDelegate5
CompilerGeneratedAttribute
<Main>b__3
CS$<>9__CachedAnonymousMethodDelegate6
<Main>b__4
CS$<>9__CachedAnonymousMethodDelegate7
ToLower
System.Core
System.Linq
Enumerable
System.Collections.Generic
IEnumerable`1
Contains
ToString
<PrivateImplementationDetails>{9698DB3A-B82B-42A3-B2DA-2631CF0F8DD4}
ValueType
__StaticArrayInitTypeSize=1664
$$method0x6000001-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
System.Reflection
Assembly
GetTypes
MethodInfo
GetMethod
MethodBase
Invoke
String
Concat
System.CodeDom.Compiler
CodeDomProvider
CreateProvider
CompilerParameters
set_GenerateExecutable
set_GenerateInMemory
System.Windows.Forms
Application
get_StartupPath
System.IO
Combine
set_OutputAssembly
set_CompilerOptions
System.Collections.Specialized
StringCollection
get_ReferencedAssemblies
System.Text
Encoding
get_UTF8
__StaticArrayInitTypeSize=2256
$$method0x6000001-2
GetString
IndexOf
Substring
get_Length
Replace
TakeWhile
ToArray
GetBytes
Select
CompilerResults
CompileAssemblyFromSource
WriteAllText
System.Diagnostics
ProcessStartInfo
set_FileName
get_ExecutablePath
set_Arguments
set_CreateNoWindow
ProcessWindowStyle
set_WindowStyle
Process
MemoryStream
System.IO.Compression
GZipStream
Stream
CompressionMode
set_Position
Buffer
BlockCopy
BitConverter
ToInt32
System.Security.Cryptography
Create
SymmetricAlgorithm
GenerateIV
get_IV
set_Key
get_Key
ICryptoTransform
CreateEncryptor
CryptoStream
CryptoStreamMode
set_IV
CreateDecryptor
<>c__DisplayClass9
<>c__DisplayClassc
get_Chars
CS$<>9__CachedAnonymousMethodDelegatef
.cctor
Environment
get_TickCount
S~SySxS{SzSuStSwSvSqSpSsSrSmSlSoSnSiShSkSjSeSdSgSfSaS`ScSbS
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
_E_G_S
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
0.0.0.0
InternalName
LegalCopyright
OriginalFilename
ProductVersion
0.0.0.0
Assembly Version
0.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Clean
Elastic malicious (high confidence)
ClamAV Win.Malware.Beebone-8273946-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Clean
Cylance Unsafe
Zillya Clean
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
Alibaba Clean
K7GW Trojan ( 700000201 )
K7AntiVirus Trojan ( 700000201 )
huorong VirTool/MSIL.Obfuscator.abh
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.A
Paloalto Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Kryptik.ONC
APEX Malicious
Avast Win32:MalwareX-gen [Misc]
Cynet Clean
Kaspersky HEUR:Trojan-Ransom.Win32.Blocker.gen
BitDefender Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Clean
Sophos Troj/Krypt-LQ
F-Secure Trojan.TR/Dropper.MSIL.Gen
DrWeb Trojan.PackedNET.165
VIPRE Clean
TrendMicro Clean
McAfeeD Real Protect-LS!B4F3E85546E7
Trapmine malicious.high.ml.score
CTX Clean
Emsisoft Clean
Ikarus Trojan.MSIL.Crypt
GData Clean
Jiangmin Clean
Webroot Clean
Varist W32/MSIL_Agent.HJ.gen!Eldorado
Avira TR/Dropper.MSIL.Gen
Antiy-AVL GrayWare/MSIL.Kryptik.onc
Kingsoft malware.kb.c.996
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Troj/Krypt-LQ
Microsoft Trojan:MSIL/AgentTesla.DW!MTB
Google Detected
AhnLab-V3 Trojan/Win32.RL_Generic.C3452737
Acronis Clean
VBA32 Clean
TACHYON Clean
Malwarebytes Malware.Heuristic.2060
Panda Clean
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.VSX.PE04C9n
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:wlFvhMcS1cbDAGW3nowl5A)
Yandex Clean
TrellixENS Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/TrojanDropper.LY!tr
AVG Win32:MalwareX-gen [Misc]
DeepInstinct MALICIOUS
alibabacloud Clean
IRMA Signature
Trend Micro SProtect (Linux) Clean
Avast Core Security (Linux) Win32:MalwareX-gen [Misc]
C4S ClamAV (Linux) Win.Malware.Beebone-8273946-0
Trellix (Linux) Clean
Sophos Anti-Virus (Linux) Troj/Krypt-LQ
Bitdefender Antivirus (Linux) Application.Generic.4489489
G Data Antivirus (Windows) Virus: Application.Generic.4489489 (Engine A)
WithSecure (Linux) Trojan.TR/Dropper.MSIL.Gen
ESET Security (Windows) a variant of MSIL/Kryptik.ONC trojan
DrWeb Antivirus (Linux) Trojan.PackedNET.165
ClamAV (Linux) Win.Malware.Beebone-8273946-0
eScan Antivirus (Linux) Application.Generic.4489489(DB)
Kaspersky Standard (Windows) HEUR:Trojan-Ransom.Win32.Blocker.gen
Emsisoft Commandline Scanner (Windows) Clean
Cuckoo

We're processing your submission... This could take a few seconds.