Static | ZeroBOX

PE Compile Time

2068-04-24 01:38:01

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00992974 0x00992a00 3.90218484909
.rsrc 0x00996000 0x0000085a 0x00000a00 4.72742218981
.reloc 0x00998000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x009960f4 0x00000568 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0099665c 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x00996670 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
BinderStub.exe
<Module>
Program
BinderStub
mscorlib
Object
System
random
Random
RandomString
length
IsAdministrator
.cctor
<>9__2_0
Func`2
<RandomString>b__2_0
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
AssemblyTitleAttribute
System.Reflection
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
CompilerGeneratedAttribute
Dictionary`2
System.Collections.Generic
System.Windows.Forms
MessageBoxIcon
List`1
Enumerator
Boolean
Process
GetCurrentProcess
get_MainModule
ProcessModule
get_FileName
ProcessStartInfo
set_Verb
set_Arguments
Environment
String
GetFolderPath
SpecialFolder
System.IO
GetTempPath
ExpandEnvironmentVariables
Directory
GetDirectories
Convert
FromBase64String
Concat
WriteAllBytes
Console
WriteLine
Thread
System.Threading
GetEnumerator
get_Current
MoveNext
IDisposable
Dispose
get_Item
MessageBox
DialogResult
MessageBoxButtons
System.Core
Enumerable
System.Linq
Repeat
IEnumerable`1
Select
ToArray
WindowsIdentity
System.Security.Principal
GetCurrent
WindowsPrincipal
IsInRole
WindowsBuiltInRole
get_Length
get_Chars
WrapNonExceptionThrows
BinderStub
Copyright
2021
$5ea83a02-dd40-4e15-ba38-974d30d3d423
1.0.0.0
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
s|W8B3kz
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
;.#w.;
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
[msgTitle]
[msgBody]
[msgType]
restart
warning
%ProgramData%
Sleeping...
ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789
ICON1(
Antivirus Signature
Bkav Clean
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Heur.MSIL.Binder.13
FireEye Generic.mg.ec333982af0977d8
CAT-QuickHeal Clean
ALYac Gen:Heur.MSIL.Binder.13
Cylance unsafe
Zillya Clean
Sangfor Dropper.Win32.Agent.Vja7
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Heur.MSIL.Binder.13
K7GW Clean
K7AntiVirus Clean
Baidu Clean
VirIT Clean
Cyren Clean
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of MSIL/TrojanDropper.Agent.FEG
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Trojan:MSIL/MsilDrop.1341bf38
NANO-Antivirus Clean
ViRobot Clean
Emsisoft Gen:Heur.MSIL.Binder.13 (B)
F-Secure Trojan.TR/Dropper.Gen2
DrWeb Clean
VIPRE Gen:Heur.MSIL.Binder.13
TrendMicro TROJ_GEN.R002C0RIE23
McAfee-GW-Edition BehavesLike.Win32.Generic.tz
Trapmine Clean
CMC Clean
Sophos Mal/MsilDrop-A
Ikarus Win32.Outbreak
GData Gen:Heur.MSIL.Binder.13
Jiangmin Trojan.MSIL.twon
Webroot Clean
Google Detected
Avira TR/Dropper.Gen2
MAX malware (ai score=89)
Antiy-AVL Clean
Gridinsoft Trojan.Win32.Gen.bot
Xcitium TrojWare.MSIL.Agent.GH@60rvah
Arcabit Trojan.MSIL.Binder.13
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan.Win32.Generic
Microsoft Trojan:MSIL/FormBook.CD!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.C5486266
Acronis Clean
McAfee Artemis!EC333982AF09
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Dropper.MSIL.gen
Malwarebytes Malware.AI.1049614910
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0RIE23
Rising Dropper.Generic!8.35E (TFE:dGZlOgwTO/kFakrH0A)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
Fortinet MSIL/Agent.FEG!tr
BitDefenderTheta Gen:NN.ZemsilF.36662.@pW@aWtH8Rp
AVG Win32:DropperX-gen [Drp]
Cybereason malicious.c64767
Avast Win32:DropperX-gen [Drp]
No IRMA results available.