Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AndroidSideloader (1).exe

Overview

General Information

Sample name:AndroidSideloader (1).exe
Analysis ID:1468053
MD5:b7fa8a83dd1c92d93679c58d06691369
SHA1:0cff7bb71ff43ee92172f30566d8ee1b043129fc
SHA256:6cf2bcdb1a463fc69eddb125eba8cc12854ee23effcd7c65b968667c668a7f0b
Tags:exe
Infos:
Errors
  • Unable to connect to analysis machine: w10x64, esxi07-W10x64_Office_03, timeout exceeded, no analysis of the sample was performed
  • No process behavior to analyse as no analysis process or sample was found

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Binary contains a suspicious time stamp
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

No configs have been found
SourceRuleDescriptionAuthorStrings
AndroidSideloader (1).exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    AndroidSideloader (1).exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: AndroidSideloader (1).exeReversingLabs: Detection: 15%
      Source: AndroidSideloader (1).exeVirustotal: Detection: 21%Perma Link
      Source: AndroidSideloader (1).exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: AndroidSideloader (1).exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: costura.costura.pdb.compressed source: AndroidSideloader (1).exe
      Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed7microsoft.web.webview2.coreecostura.microsoft.web.webview2.core.dll.compressed?microsoft.web.webview2.winformsmcostura.microsoft.web.webview2.winforms.dll.compressed5microsoft.web.webview2.wpfccostura.microsoft.web.webview2.wpf.dll.compressed source: AndroidSideloader (1).exe
      Source: Binary string: C:\Sideloader\AndroidSideloader.pdb4 source: AndroidSideloader (1).exe
      Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: AndroidSideloader (1).exe
      Source: Binary string: C:\Sideloader\AndroidSideloader.pdb source: AndroidSideloader (1).exe

      Networking

      barindex
      Source: Yara matchFile source: AndroidSideloader (1).exe, type: SAMPLE
      Source: AndroidSideloader (1).exeString found in binary or memory: VR trailer[https://www.youtube.com/results?search_query=KNo video URL found in search results.MYou are not connected to the Internet!=Do you want to upload {0} now? equals www.youtube.com (Youtube)
      Source: AndroidSideloader (1).exeString found in binary or memory: Do you wish to copy Package Name of games selected from list to clipboard?5Copy package to clipboard?;url"\:\"/watch\?v\=(.*?(?="))=https://www.youtube.com/embed/c?autoplay=1&mute=1&enablejsapi=1&modestbranding=1 equals www.youtube.com (Youtube)
      Source: AndroidSideloader (1).exeString found in binary or memory: http://127.0.0.1:5572/
      Source: AndroidSideloader (1).exeString found in binary or memory: http://127.0.0.1:5572/core/stats
      Source: AndroidSideloader (1).exeString found in binary or memory: https://downloads.rclone.org/v
      Source: AndroidSideloader (1).exeString found in binary or memory: https://github.com/VRPirates/rookie
      Source: AndroidSideloader (1).exeString found in binary or memory: https://github.com/VRPirates/rookie/raw/master/7z
      Source: AndroidSideloader (1).exeString found in binary or memory: https://github.com/VRPirates/rookie/raw/master/Rookie%20Offline.cmdQ
      Source: AndroidSideloader (1).exeString found in binary or memory: https://github.com/VRPirates/rookie/raw/master/Sideloader%20Launcher.exe
      Source: AndroidSideloader (1).exeString found in binary or memory: https://github.com/VRPirates/rookie/raw/master/dependencies.7z
      Source: AndroidSideloader (1).exeString found in binary or memory: https://raw.githubusercontent.com/VRPirates/rookie
      Source: AndroidSideloader (1).exeString found in binary or memory: https://raw.githubusercontent.com/VRPirates/rookie/master/codenamesEUnable
      Source: AndroidSideloader (1).exeString found in binary or memory: https://raw.githubusercontent.com/vrpyou/quest/main/vrp-public.jsonahttps://vrpirates.wiki/downloads
      Source: AndroidSideloader (1).exeString found in binary or memory: https://rclone.org/
      Source: AndroidSideloader (1).exeString found in binary or memory: https://stackoverflow.com/users/57611/erike
      Source: AndroidSideloader (1).exeString found in binary or memory: https://vrpirates.wiki/
      Source: AndroidSideloader (1).exeString found in binary or memory: https://vrpirates.wiki/downloads/runtimes.7z
      Source: AndroidSideloader (1).exeString found in binary or memory: https://vrpirates.wiki/downloads/vrp.download.config?Retrieved
      Source: AndroidSideloader (1).exeString found in binary or memory: https://vrpirates.wiki/downloads/vrp.upload.config#vrp.upload.configGUpload
      Source: AndroidSideloader (1).exeString found in binary or memory: https://vrpirates.wiki/en/Howto/sponsored-mirrors)
      Source: AndroidSideloader (1).exeString found in binary or memory: https://www.7-zip.org/
      Source: AndroidSideloader (1).exeString found in binary or memory: https://www.c-sharpcorner.com/members/mike-gold2
      Source: AndroidSideloader (1).exeString found in binary or memory: https://www.youtube.com/embed/c?autoplay=1&mute=1&enablejsapi=1&modestbranding=1
      Source: AndroidSideloader (1).exeString found in binary or memory: https://www.youtube.com/results?search_query=KNo
      Source: AndroidSideloader (1).exeBinary or memory string: OriginalFilenameAndroidSideloader.exeD vs AndroidSideloader (1).exe
      Source: AndroidSideloader (1).exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: classification engineClassification label: mal60.troj.evad.winEXE@0/0@0/0
      Source: AndroidSideloader (1).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: AndroidSideloader (1).exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: AndroidSideloader (1).exeReversingLabs: Detection: 15%
      Source: AndroidSideloader (1).exeVirustotal: Detection: 21%
      Source: AndroidSideloader (1).exeString found in binary or memory: Refresh connected devices, installed apps, and update game list-progressDLbtnContainer3downloadInstallGameButtonSDownload and Install Game/Add To Queue
      Source: AndroidSideloader (1).exeString found in binary or memory: Are you sure you want to exit?;Still downloading/installing.
      Source: AndroidSideloader (1).exeString found in binary or memory: x2-Starting Game DownloadM--transfers 1 --multi-thread-streams 0
      Source: AndroidSideloader (1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: AndroidSideloader (1).exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: AndroidSideloader (1).exeStatic file information: File size 4312576 > 1048576
      Source: AndroidSideloader (1).exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3b7e00
      Source: AndroidSideloader (1).exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: AndroidSideloader (1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: costura.costura.pdb.compressed source: AndroidSideloader (1).exe
      Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed7microsoft.web.webview2.coreecostura.microsoft.web.webview2.core.dll.compressed?microsoft.web.webview2.winformsmcostura.microsoft.web.webview2.winforms.dll.compressed5microsoft.web.webview2.wpfccostura.microsoft.web.webview2.wpf.dll.compressed source: AndroidSideloader (1).exe
      Source: Binary string: C:\Sideloader\AndroidSideloader.pdb4 source: AndroidSideloader (1).exe
      Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: AndroidSideloader (1).exe
      Source: Binary string: C:\Sideloader\AndroidSideloader.pdb source: AndroidSideloader (1).exe

      Data Obfuscation

      barindex
      Source: AndroidSideloader (1).exe, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
      Source: Yara matchFile source: AndroidSideloader (1).exe, type: SAMPLE
      Source: AndroidSideloader (1).exeStatic PE information: 0xCBE5165D [Thu May 26 10:58:37 2078 UTC]
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      Path InterceptionPath Interception1
      Software Packing
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Timestomp
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      AndroidSideloader (1).exe16%ReversingLabsWin32.Trojan.Generic
      AndroidSideloader (1).exe22%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://rclone.org/0%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie/raw/master/dependencies.7z0%Avira URL Cloudsafe
      https://www.youtube.com/results?search_query=KNo0%Avira URL Cloudsafe
      https://raw.githubusercontent.com/VRPirates/rookie0%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie0%Avira URL Cloudsafe
      https://www.youtube.com/embed/c?autoplay=1&mute=1&enablejsapi=1&modestbranding=10%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie/raw/master/dependencies.7z0%VirustotalBrowse
      https://stackoverflow.com/users/57611/erike0%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie0%VirustotalBrowse
      https://github.com/VRPirates/rookie/raw/master/Sideloader%20Launcher.exe0%Avira URL Cloudsafe
      https://raw.githubusercontent.com/vrpyou/quest/main/vrp-public.jsonahttps://vrpirates.wiki/downloads0%Avira URL Cloudsafe
      https://vrpirates.wiki/downloads/vrp.download.config?Retrieved0%Avira URL Cloudsafe
      https://www.youtube.com/results?search_query=KNo0%VirustotalBrowse
      https://rclone.org/0%VirustotalBrowse
      https://stackoverflow.com/users/57611/erike0%VirustotalBrowse
      https://downloads.rclone.org/v0%Avira URL Cloudsafe
      https://raw.githubusercontent.com/VRPirates/rookie1%VirustotalBrowse
      https://vrpirates.wiki/downloads/runtimes.7z0%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie/raw/master/Rookie%20Offline.cmdQ0%Avira URL Cloudsafe
      https://raw.githubusercontent.com/vrpyou/quest/main/vrp-public.jsonahttps://vrpirates.wiki/downloads0%VirustotalBrowse
      http://127.0.0.1:5572/core/stats0%Avira URL Cloudsafe
      https://downloads.rclone.org/v1%VirustotalBrowse
      https://vrpirates.wiki/0%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie/raw/master/Sideloader%20Launcher.exe0%VirustotalBrowse
      https://vrpirates.wiki/en/Howto/sponsored-mirrors)0%Avira URL Cloudsafe
      https://vrpirates.wiki/downloads/vrp.download.config?Retrieved2%VirustotalBrowse
      https://vrpirates.wiki/downloads/runtimes.7z2%VirustotalBrowse
      http://127.0.0.1:5572/0%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie/raw/master/Rookie%20Offline.cmdQ0%VirustotalBrowse
      http://127.0.0.1:5572/core/stats0%VirustotalBrowse
      https://raw.githubusercontent.com/VRPirates/rookie/master/codenamesEUnable0%Avira URL Cloudsafe
      https://vrpirates.wiki/4%VirustotalBrowse
      https://www.7-zip.org/0%Avira URL Cloudsafe
      https://vrpirates.wiki/downloads/vrp.upload.config#vrp.upload.configGUpload0%Avira URL Cloudsafe
      https://www.youtube.com/embed/c?autoplay=1&mute=1&enablejsapi=1&modestbranding=10%VirustotalBrowse
      https://www.c-sharpcorner.com/members/mike-gold20%Avira URL Cloudsafe
      https://github.com/VRPirates/rookie/raw/master/7z0%Avira URL Cloudsafe
      http://127.0.0.1:5572/1%VirustotalBrowse
      https://raw.githubusercontent.com/VRPirates/rookie/master/codenamesEUnable0%VirustotalBrowse
      https://vrpirates.wiki/downloads/vrp.upload.config#vrp.upload.configGUpload3%VirustotalBrowse
      https://www.c-sharpcorner.com/members/mike-gold20%VirustotalBrowse
      https://www.7-zip.org/0%VirustotalBrowse
      https://github.com/VRPirates/rookie/raw/master/7z0%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/VRPirates/rookieAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://github.com/VRPirates/rookie/raw/master/dependencies.7zAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://raw.githubusercontent.com/VRPirates/rookieAndroidSideloader (1).exefalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://rclone.org/AndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://www.youtube.com/results?search_query=KNoAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://www.youtube.com/embed/c?autoplay=1&mute=1&enablejsapi=1&modestbranding=1AndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://stackoverflow.com/users/57611/erikeAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://github.com/VRPirates/rookie/raw/master/Sideloader%20Launcher.exeAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://raw.githubusercontent.com/vrpyou/quest/main/vrp-public.jsonahttps://vrpirates.wiki/downloadsAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://vrpirates.wiki/downloads/vrp.download.config?RetrievedAndroidSideloader (1).exefalse
      • 2%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://downloads.rclone.org/vAndroidSideloader (1).exefalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://vrpirates.wiki/downloads/runtimes.7zAndroidSideloader (1).exefalse
      • 2%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://github.com/VRPirates/rookie/raw/master/Rookie%20Offline.cmdQAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://127.0.0.1:5572/core/statsAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://vrpirates.wiki/AndroidSideloader (1).exefalse
      • 4%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://vrpirates.wiki/en/Howto/sponsored-mirrors)AndroidSideloader (1).exefalse
      • Avira URL Cloud: safe
      unknown
      http://127.0.0.1:5572/AndroidSideloader (1).exefalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://raw.githubusercontent.com/VRPirates/rookie/master/codenamesEUnableAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://www.7-zip.org/AndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://vrpirates.wiki/downloads/vrp.upload.config#vrp.upload.configGUploadAndroidSideloader (1).exefalse
      • 3%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://www.c-sharpcorner.com/members/mike-gold2AndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://github.com/VRPirates/rookie/raw/master/7zAndroidSideloader (1).exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1468053
      Start date and time:2024-07-05 09:37:35 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 2s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:0
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Sample name:AndroidSideloader (1).exe
      Detection:MAL
      Classification:mal60.troj.evad.winEXE@0/0@0/0
      • Unable to connect to analysis machine: w10x64, esxi07-W10x64_Office_03, timeout exceeded, no analysis of the sample was performed
      • No process behavior to analyse as no analysis process or sample was found
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):4.247226825112656
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:AndroidSideloader (1).exe
      File size:4'312'576 bytes
      MD5:b7fa8a83dd1c92d93679c58d06691369
      SHA1:0cff7bb71ff43ee92172f30566d8ee1b043129fc
      SHA256:6cf2bcdb1a463fc69eddb125eba8cc12854ee23effcd7c65b968667c668a7f0b
      SHA512:d74f8450f1fda260d0176ceba347bde6ad58b24a09eaac3cc921e20236a11707cab2f5eaee3bb10907c387d67efbcb66d823ae052b1317f3e953c4984a2b94b8
      SSDEEP:24576:JUjV//Ppn/JcDJ7bdukqjVnlqud+/2P+AXg:S5//Rn/QJ7bYkqXfd+/9AQ
      TLSH:5F161783EEA40A24C2D43A74AA5EC6374F6C8C8103F5D772AAD19E873C852D5BF9D531
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]............."...0..~;..N......^.;.. ........@.. ....................... B...........`................................
      Entrypoint:0x7b9d5e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0xCBE5165D [Thu May 26 10:58:37 2078 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x3b9d0c0x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3ba0000x64bf4.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4200000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x3b9c980x38.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x3b7d640x3b7e00603336f551f770829ce2aef4ba18dfdcunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x3ba0000x64bf40x64c0079a15f56e6943023355552a25311b71cFalse0.17219244339330025data2.762838039207606IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x4200000xc0x200ca145cb3b090657469c78edf00e74435False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x3ba1e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5647163120567376
      RT_ICON0x3ba6580x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.4799180327868853
      RT_ICON0x3baff00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.4179174484052533
      RT_ICON0x3bc0a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.33278008298755185
      RT_ICON0x3be6600x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.2858408124704771
      RT_ICON0x3c28980x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.2320527643472777
      RT_ICON0x3cbd500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.19778481012658228
      RT_ICON0x3dc5880x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2703360.13858848418498684
      RT_GROUP_ICON0x41e5c00x76data0.7288135593220338
      RT_VERSION0x41e6480x3acdata0.3861702127659574
      RT_MANIFEST0x41ea040x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain
      No network behavior found
      No statistics
      No system behavior
      No disassembly