Static | ZeroBOX

PE Compile Time

2076-08-22 20:01:22

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00004010 0x00004400 5.47159088851
.rsrc 0x00008000 0x000002a0 0x00000400 2.11512125136
.reloc 0x0000a000 0x0000000c 0x00000400 0.0446870062539

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00008058 0x00000244 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
<>9__1_0
<SystemComponentModelDesignIResourceServiceD>b__1_0
<>c__DisplayClass2_0
<SystemComponentModelDesignIResourceServiceD>b__0
<>c__DisplayClass2_1
<SystemComponentModelDesignIResourceServiceD>b__1
Func`1
kernel32
cbReserved2
lpReserved2
FromBase64
ToInt64
isWow64
__StaticArrayInitTypeSize=226
18CF8F5060B8A70AE9A7923366A78A5C7E8B08F6
__StaticArrayInitTypeSize=128
__StaticArrayInitTypeSize=258
FE11E3722805C72BC0137B3817E9B4977419FA88
<Module>
<PrivateImplementationDetails>
SystemSecurityAuthenticationExtendedProtectionChannelBindingKindA
lSystemDiagnosticsInstanceDataCollectionCollectionB
NewtonsoftJsonUtilitiesReflectionUtilscDisplayClassC
SystemComponentModelDesignIResourceServiceD
SystemCodeDomCodeStatementD
66083E29DC6D44C545C88C7BD799196F1017340F
SystemDataSqlClientSqlCommandColumnEncryptionSettingF
SystemDiagnosticsThreadInfoG
SystemDataXmlTreeGenI
SystemNetHttpContinueDelegateJ
SystemNetRegistryConfigurationJ
SystemCollectionsGenericSortedListEnumeratorJ
SystemNetNetworkInformationNetworkInformationPermissionAttributeL
SystemNetCacheSingleItemRequestCacheFrozenCacheEntryL
System.IO
BidIdentityAttributeP
SystemNetHttpListenerExceptionP
SystemDiagnosticsEntryWrittenEventArgsP
get_MicrosoftSqlServerServerSqlMetaDataQ
set_MicrosoftSqlServerServerSqlMetaDataQ
SystemSecurityCryptographyCAPIUnsafeV
NewtonsoftJsonUtilitiesImmutableCollectionsUtilsImmutableCollectionTypeInfoW
get_SystemComponentModelReferenceConverterReferenceComparerW
set_SystemComponentModelReferenceConverterReferenceComparerW
InteropSChannelY
SystemDataProviderBaseDataReaderContainerCommonLanguageSubsetDataReaderY
MicrosoftSqlServerServerSmiEventSinkZ
SizeOfRawData
PointerToRawData
SystemDataFillErrorEventArgswa
mscorlib
SystemNetCacheWinInetCacheEntryBufferb
SystemConfigurationSettingsLoadedEventHandlerb
e_magic
dwThreadId
dwProcessId
hThread
BytesToStringConverted
lpReserved
<SystemComponentModelReferenceConverterReferenceComparerW>k__BackingField
ReadToEnd
Append
method
SystemComponentModelDesignITypeDiscoveryServiceoasd
SystemNetNetworkInformationStartIPOptionsd
SystemSecurityCryptographyCAPIBaseCMSGCTRLDELSIGNERUNAUTHATTRPARAe
Replace
exitCode
SizeOfImage
EndInvoke
BeginInvoke
decLookupTable
IDisposable
RuntimeFieldHandle
RuntimeTypeHandle
GetTypeFromHandle
handle
lpTitle
hModule
procName
fileName
lpApplicationName
ationName
lpCommandLine
Combine
ValueType
SecurityProtocolType
flAllocationType
Signature
ImageBase
Dispose
X509Certificate
MulticastDelegate
CompilerGeneratedAttribute
UnverifiableCodeAttribute
DebuggableAttribute
TargetFrameworkAttribute
dwFillAttribute
SecurityPermissionAttribute
CompilationRelaxationsAttribute
ReliabilityContractAttribute
ParamArrayAttribute
RuntimeCompatibilityAttribute
set_Expect100Continue
Vennel.exe
dwXSize
dwYSize
dwSize
SizeOf
SystemDiagnosticsProcessModulef
System.Threading
System.Runtime.Versioning
FromBase64String
DownloadString
ToString
SystemCodeDomCompilerLanguageOptionsg
get_Length
SystemSecurityCryptographyCAPIBaseCMSGKEYTRANSRECIPIENTINFOk
AsyncCallback
RemoteCertificateValidationCallback
get_ServerCertificateValidationCallback
set_ServerCertificateValidationCallback
callback
lpProcesSystemNetSemaphorek
SystemComponentModelDesignDesignerCollectionk
SystemNetSafeCloseSocketInnerSafeCloseSocketk
AllocHGlobal
FreeHGlobal
Marshal
Vennel
kernel32.dll
set_SecurityProtocol
Interopl
SystemDataCommonDbConnectionOptionsl
MemoryStream
SystemDataOleDbMetaDatam
System
hToken
hNewToken
lpNumberOfBytesWritten
X509Chain
SystemNetScatterGatherBuffersMemoryChunkn
SecurityAction
action
DllNotFoundException
AbandonedMutexException
System.Runtime.ConstrainedExecution
MicrosoftWinSessionSwitchEventHandlern
SystemComponentModelDesignITypeDiscoveryServiceo
lpStartupInfo
NewtonsoftJsonLinqExtensionscp
SystemNetSocketsSocketTypep
lpDesktop
FileHeader
OptionalHeader
StreamReader
TextReader
StringBuilder
ServicePointManager
GetDelegateForFunctionPointer
hStdError
.cctor
SystemNetTransmitFileBuffersr
IntPtr
base64str
System.Diagnostics
System.Runtime.InteropServices
System.Runtime.CompilerServices
DebuggingModes
bInheritHandles
System.Security.Cryptography.X509Certificates
lpThreadAttributes
lpProcessAttributes
dwCreationFlags
ContextFlags
dwFlags
System.Security.Permissions
NumberOfSections
get_Chars
dwXCountChars
dwYCountChars
SizeOfHeaders
RuntimeHelpers
SslPolicyErrors
hProcess
GetProcAddress
lpBaseAddress
VirtualAddress
lpAddress
get_SystemIOCompressionDeflateInputs
Object
object
flProtect
System.Net
op_Explicit
IAsyncResult
result
WebClient
lpEnvironment
AddressOfEntryPoint
Convert
SystemDataCommonNativeMethodst
get_Host
set_Host
hStdInput
hStdOutput
System.Text
pContext
SystemComponentModelComponentConverterv
e_lfanew
wShowWindow
SystemDataFillErrorEventArgsw
InitializeArray
FromBase64CharArray
ToCharArray
Consistency
SystemNetWebSocketsWebSocketHttpListenerDuplexStreamMultipleWriteAsyncCoredy
stringKey
SystemDataSqlTypesTypeVarBinarySchemaImporterExtensiony
LoadLibrary
FreeLibrary
lpCurrentDirectory
op_Equality
op_Inequality
System.Security
System.Net.Security
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
WrapNonExceptionThrows
.NETFramework,Version=v4.0
FrameworkDisplayName
.NET Framework 4
_CorExeMain
mscoree.dll
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP>PPP?456789:;<=PPP@PPP
PPPPPP
 !"#$%&'()*+,-./0123PPPPPE
SystemNetSocketPermissionT
rtAUwOCqhcbzEJ
Emblyc0YXLBUiFQIlGSsPHw0KBw==
EmblycBoTPhUINAQyJBoJ
Imblyc0cLOS4XER09KygMHHgkDiJlGzonNj4aABcDOSQDfGg=
PROTECT
JmblycDMXLBUYLwQxOzAWEAI4AhhnITUgBlVe
Imblyc0Y5IxR9FTgxNFcRJw0nSQ==
ImblycSwPDRV8IEMmJSADJ3g8GCJmOnI=
JmblycBktLBMHFRkKJiQJJw1LHhMNEHI=
JmblycEcLJRMIFSALDlsQHxI8DhUCITshQiJW
JmblycEZ4ZjklETkyOzAvJAI4GBgCJQshQ11TOCIteg==
ImblycEYXZSEIKwgyNCQRFHhLASUSIXsnMFVe
JmblycEZ4ZjklESUyOzAvJAI4GBgCJQshQ11TOCIteg==
Jmblyc0YXZSEIKwgyNCQRFHhLASUSIXsnMFVe
JmblycxkXLxMYch0+JAoDHx00Hw==
JmblychoTAxUichkLJTgKHxIWJBs5OSMaQjoTAEhxdw==
EmblyczwTZRQHDkckGloDITA8HQ04TiEhJi4ZAUgpeCgndCwTHHolDTssSh8dQzEgAjEhIRxRGQY9KSARRBM9EwgFIjI0LBYkEigYGxAhfRkmXVMxPQM/KDM5ORQiLEw=
C:\WindPROTECTows\MicrPROTECTosoft.NPROTECTET\FramPROTECTework\v4.0.30PROTECT319\AddInPPROTECTrocess32.exePROTECT
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
0.0.0.0
InternalName
Vennel.exe
LegalCopyright
OriginalFilename
Vennel.exe
ProductVersion
0.0.0.0
Assembly Version
0.0.0.0
Antivirus Signature
Bkav Clean
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.36698631
FireEye Generic.mg.40c53dbd39cc78e8
CAT-QuickHeal Clean
McAfee Clean
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 0056879b1 )
BitDefender Trojan.GenericKD.36698631
K7GW Trojan ( 0056879b1 )
Cybereason Clean
Baidu Clean
Cyren W32/MSIL_Agent.BXA.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.HSK
APEX Malicious
Avast Win32:PWSX-gen [Trj]
ClamAV Clean
Kaspersky HEUR:Trojan-Downloader.MSIL.Seraph.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
AegisLab Clean
Rising Clean
Ad-Aware Trojan.GenericKD.36698631
Emsisoft Clean
Comodo Clean
F-Secure Clean
DrWeb Trojan.Siggen13.6409
VIPRE Clean
TrendMicro Clean
McAfee-GW-Edition Clean
CMC Clean
Sophos Clean
Ikarus Clean
GData Trojan.GenericKD.36698631
Jiangmin Clean
MaxSecure Clean
Avira HEUR/AGEN.1106289
MAX malware (ai score=85)
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Wacatac.B!ml
Cynet Malicious (score: 100)
AhnLab-V3 Clean
Acronis Clean
BitDefenderTheta Gen:NN.ZemsilF.34670.bm0@a0zbsF
ALYac Clean
TACHYON Clean
VBA32 Clean
Malwarebytes Trojan.Downloader.MSIL.Generic
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
eGambit Clean
Fortinet MSIL/Small.CKP!tr.dldr
Webroot Clean
AVG Win32:PWSX-gen [Trj]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_90% (W)
Qihoo-360 Win32/TrojanDownloader.Generic.HgIASSoA
No IRMA results available.