Static | ZeroBOX

PE Compile Time

2092-01-15 01:25:31

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00001c08 0x00001e00 6.45117564701
.rsrc 0x00004000 0x0000059c 0x00000600 4.04980906621
.reloc 0x00006000 0x0000000c 0x00000200 0.0815394123432
.css 0x00008000 0x00022600 0x00022600 7.99874225749

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00004090 0x0000030c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000043ac 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
F N/2'
Z };7%
v4.0.30319
#Strings
AD446C34F2704865A9E424BE5755BC8F9140414FD7E1456F1A4581F8C2D778A0
__StaticArrayInitTypeSize=11
List`1
ToUInt32
ToInt32
6F8B6C8D8D4E5E20E07E3EB7427D146D6812E5C67C4979187757735552D85263
__StaticArrayInitTypeSize=1355
ToUInt16
__StaticArrayInitTypeSize=36
<Module>
<PrivateImplementationDetails>
CallWindowProcA
B86C921CDC504CE0C498E5F2E9548A01E33F930047FB5D22BF2DA2270E113ECD
get_ASCII
System.IO
inputData
ioAdhugxya
mscorlib
System.Collections.Generic
lpPrevWndFunc
TrimEnd
RuntimeFieldHandle
Console
WriteLine
ValueType
CompilerGeneratedAttribute
GuidAttribute
DebuggableAttribute
ComVisibleAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
TargetFrameworkAttribute
AssemblyFileVersionAttribute
AssemblyConfigurationAttribute
AssemblyDescriptionAttribute
CompilationRelaxationsAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyCompanyAttribute
RuntimeCompatibilityAttribute
SetValue
Brought.exe
dwSize
Encoding
System.Runtime.Versioning
ToString
GetString
get_ExecutablePath
kernel32.dll
user32.dll
GetActualProtocol
lParam
wParam
Program
get_Item
System
Application
System.Reflection
ArgumentNullException
ArgumentException
Brought
BitConverter
.cctor
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
ReadAllBytes
GetProtocolSettings
System.Windows.Forms
get_Chars
RuntimeHelpers
lpAdress
Object
lpflOldProtect
VirtualProtect
flNewProtect
iuogfht
sectionContent
Convert
System.Text
cjhgay
InitializeArray
Sygcydy
dataKey
WrapNonExceptionThrows
Brought
Copyright
2025
$5c249bfa-2dd8-4f1a-9314-11e3fed61454
1.0.0.0
.NETFramework,Version=v4.7.2
FrameworkDisplayName
.NET Framework 4.7.2
C:\Users\users\source\repos\Brought\Brought\obj\Release\Brought.pdb
_CorExeMain
mscoree.dll
o%2E`L
*#Cs9ve9
+q%FL`p9
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
,"Rp#V`
]K9n,t
q3O+(H1
LSgfj
2SS {>P
\FVF\b.E
jS*bR[V`_
K<#g31~.cH
%E_liH^M
gneMm=8
WYF<Ow;
,zsTur@8
e<<#AM0
RiT_5R
9>!`"y
1z@t!b)
>(/VX%a
n!fAG$=
5XFe&|
v3~ ~E!
KS=5dp
/Xm](+
v/0d-j
.RbO1"
% "jfb>(
m@u")*
) c':C
$Mj%x#
.NkS0|Y
<;Ug_$I
:-VR8M
~mb]]7
yTQ<28
DUIGSo
tc3 v)
ET'A b
Zjpfl
p~U;Ky
Pdbz.t
0&iW#v
'{4/:3\
0'L}J#m
b/KQ)]
vUuQU0
=HjY;1
'g^Jk`
)1amEq
y=<?g7GvP
HVQxZkZ
U2Z+ld
O3,L,0
.c(*d
?]&I1u
D|w3E<
kh{KIbz
:q#P3
FK `tS
x*?Q>h6
<G'm4[^
75rD/X
Z-L^59
n$,DJ9
s2}"A#
m9_tV5
Zl|&yS
-2RrH3
%F'{Sq
k7/7V-T
bLJR@d
|,gu[+GW,F
$~(d@=
s<r^J38
55:4k`Q
$\t<KXW
YY=l38
-Q&rM0
)NgI_[
(FhUR&uf;^
{wF{QQ]%
t5*mh67
h^Xihn
|i 967Y
F#l_tw
To79#G\
wiY0C^
FPmJsr
qm5KF_
q}Bu-7=
y|wohZ
>#5z<
Rz0Y s
v5{.#[
M;ge0G`@Q
2<+tS)K
i2(Y\dL?
%WccY:
,m8q= 6
hF{<Ys'k
@t_*"TYmRq
9kRgN
RgZwN_
.l:\#H
[~_\EN
xqTRV.
[} 4'MT
EyGF@/&q
"-CLL>1VC4
93<npUNQ(7,
,PF7q:
V&RIC>
"IJH6\
]AyUOO
;/2@/3
E[{p%*
M"Ln_jX
)t)A}i
RWg>4T
> bYdH
AoEEE>
o-dV7U
d<=<VG
{B$L1{
XU56Kk&
#6@'2ca
\n/5#/ v
'MTyV,
_KBCN@N'D,
caRudTI
:AY& R
RE&))
NS6jOB
hA=GVV
3F9wF{(
r$j^ jn
b6EJ2,J
;!$Q~a
Y"_uVI
;ZVwQh
e5#I7j#Y
#L3M<a<
.e5^x0
5<{Hh-~
HO$o.Rm
0u_qT[ZN
`b,@z
cWxv^Z
ul[P~Q
T|NQA}
AYkeK8y
+#%+vK
qn^)J{
H)}hz`
R=+^f-
z:MP-m
$k~Izd&
)m8^T~
&6o9ra
?fl4a}
_q/^*
5vl%}\
ctV^1?
:E[D7v2
rBGlY2
&ImbLN
Y D"lRt{4
}&6asd
`Y>,AR~7vUn
y6oBpi
0)dWfz
eM )[6
~&0@G"
Y`$ES*
^r/pV~
{pr&7+?
w_Jw8|
xkNm%22
esW6*qR
}zk9YGs
cz5]ZkxO
UnuGML
*X-"$i
@}~@3
Z3CXaXO
;=zz]^-
af -<"
_g?dB8
n*tQ(:
nZ/U|w2z
mYP)'q
Hs+Vg~V!>
o\i$vl0XI
MI55`wt~W$9
NYHcoA
RAO].,
AK&D^R
"?}_B
Ox! f'i
}^<[Q; N
>J;1>tQ
20[pR1
+n=<#0
[Rg:dA
XmaHJ\
Hp A5F
^7n!z
zJj_~r
Fy(I9N)$
[$oT6$
z|;Cf\
8/xsT|
%ye>!PU
b3!vu\
rn1|vy{
:}YoUL
<:o2m?
`]^g-q%F
33epOP&
C+|IB;
{U/dN~
Wc,| 6|
3-pyLE{k
d&=nzf
@O>pd`
s~<2C-C#
_i%yK"
.Wp|Y/yp
0lb#7}cN!
5F1"8
8u3B@k
#Er1zzD
e</a"u#
d?()0t@
{CfwtN%
I|Yp&dl&A
00YbuOH
UttVZd
=$$Ax*
OkYe*r
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Brought
FileVersion
1.0.0.0
InternalName
Brought.exe
LegalCopyright
Copyright
2025
LegalTrademarks
OriginalFilename
Brought.exe
ProductName
Brought
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stelpak.4!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Msilzilla-10042543-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Generic.cc
ALYac Gen:Variant.MSILHeracles.179021
Cylance Unsafe
Zillya Clean
Sangfor Clean
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Clean
K7GW Riskware ( 00584baa1 )
K7AntiVirus Clean
huorong Trojan/MSIL.Agent.vl
Baidu Clean
VirIT Trojan.Win32.MSIL_Heur.A
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 Win32/Vidar.A
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan.MSIL.Stelpak.gen
BitDefender Gen:Variant.MSILHeracles.179021
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.MSILHeracles.179021
Tencent Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Nekark.tokfw
DrWeb Clean
VIPRE Gen:Variant.MSILHeracles.179021
TrendMicro Clean
McAfeeD Real Protect-LS!4871C39A4A7C
Trapmine Clean
CTX exe.trojan.msil
Emsisoft Gen:Variant.MSILHeracles.179021 (B)
Ikarus Trojan.MSIL.Krypt
FireEye Generic.mg.4871c39a4a7c16a4
Jiangmin Clean
Webroot Clean
Varist W32/MSIL_Kryptik.MAV.gen!Eldorado
Avira TR/AD.Nekark.tokfw
Fortinet MSIL/Kryptik.ANCY!tr
Antiy-AVL Clean
Kingsoft malware.kb.c.999
Gridinsoft Trojan.Heur!.020120A1
Xcitium Clean
Arcabit Trojan.MSILHeracles.D2BB4D
SUPERAntiSpyware Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5731599
Acronis Clean
McAfee GenericRXWQ-QK!4871C39A4A7C
TACHYON Clean
VBA32 Clean
Malwarebytes Generic.Malware/Suspicious
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Malware.Obfus/MSIL@AI.87 (RDM.MSIL2:pquuXHkCF4jmWjNmdErbDg)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
GData Win32.Trojan.Kryptik.C3RR0F
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.