Static | ZeroBOX

PE Compile Time

2022-08-23 17:27:40

PDB Path

C:\Users\Administrator\Documents\CryptoObfuscator_Output\FHFJRY.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00037f94 0x00038000 7.96665490424
.reloc 0x0003a000 0x0000000c 0x00000200 0.0980041756627
.rsrc 0x0003c000 0x000014b0 0x00001600 5.13643742252

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0003c0e8 0x000010a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294440951, next used block 4294440951
RT_GROUP_ICON 0x0003d190 0x00000014 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0003d1a4 0x0000030c LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.reloc
B.rsrc
%&&<(
%&n.!
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
=vB-]?Z
#]lc[$S
!%i&X#
nyZ[,@=
sz6U(g
F>Z{O.4
*~Y%@1
$u1t9#Y&
&@A\t"
ph^_E6h
A+&13/
?]`U)%
LAZi,`g
cci(KL
\=;go'
ze{Dm-B
3nG5Zu
WjEcDE
jn%$v#b
z'pwzw
<6Yid!S
qq1w%a
euGdX/
Pl?CYU
wvWzA!
_p=U;c)
hC4$$i
59MV5X
^kJw]3
yrI"m]
mz^E=
g|tZtx
YJ1m""W
>nuj$
je5q)=
~s"."i$
pz(8\:
PTw^^JG
4B6jMI
jp!n<g[
^>0t=e1
tJ`s1zm
2p<~}8v
nltrl#
k26Z;]
Gb'YsW
K+'~ot`
wDY[?e
cjq!TA]on
YKB_N?
Ug)z^8
D`j-.gY}
qpyhUz
w<.mj
/\x<@S
b\yVih;i<
+g4`Z5k8
1ao$-U|
XRia0W
uzQLWju&F
=9QO6V=eZ
a2q`{i
um5V 6pb"
Z^=RM7r
%=-Z.i
PpA^8
\lFEe`~!
T8415?
3F4e}n
<^L"3=U
42H').
gR\;#jn
C5{?={
PgbT-'RK
9x-3ST
3TUR4'
j0z_{K'
C#wmc
20HxBB
#eg@p8
jWuBC$
j@+DK>Z
zA[>Xv
wC9}&
ZaJhx0
+KFz~
C]9wzf1&0v
sIOuC\-
L7KF`l
qH|I}o>
tcBV"m4
(+<N_pbX[
}h3QvL
1?@.~b
g?ynoU
U~%dUGO
c\>^C\
CUbud7
60vSh:
2~WP2_
yjW>v8
~@/cySY
EQD=wl
q5!&cZ=
R)YQ4c
$^nI@$9j
,5~G"T
PR7a#$
pIv#`g
u~X-.y^G
-|UWyNB*?B
i@!"zKa{e&
q=4)YI
p/":md
eWu!D/
3y~l1ji
dcy=0{
6n2x\;i
[EJK]"
t!L&gP8
ZXgWi:
)!M&'$M
pR,Jgec
Nu&/><h
H3:MAu
V}@mzY
j$D>r
F:B5|B
I9fMd,
n`?g&o!9
ip5!4*
ZlF:kqA
9s/c{Y
<A(%1{9
GMRF<]
)/zm,9e
Ee={G7s
'h]$'{
dm}r2J[
<8:41ESQ
#(6E_4
Hihvy.
pZX0ry
u%"WR_5
H&3w.Hn?
>&AoeNI
K`q!BQ
%%r1tW
/#]\%s
[xb+$=
mgqSu/
V+("2T
VGCHUE(
u@q4ULJ
*t%<n&$?
^&/H=2n
32lM>#
LuBV "\3
WN*ZrM
NcPaJXx
Q8Zr^H
4wO9>a
ed>Nzk7
T(\s<WY
u_L>"cl
= fs'
xa|ah`
$zv{V\
:j,}pf
FF|S=pI
Q$=sUl
=lI~b)
K9Z\.G[
>~ga8=
FMo@ \
`_#udqJ
f1#/ID
emM.x;'
A4NrO2
Af7rBs
_]O6"L
x@@E&?
gfsxbk
!bu08C(
I^,uL{'qs;"
?vmC}{
+1iuO8
8Z:,}`
.{|`A>
@-#@9?
l8x~=Td
PsU6X
* THfO
6)JWvT<
x@ZFl*Krwx
~s'6OM
LO>7O+
c4PT8:
.c83b/v*
ZR" uG
^^d5Bj
Jo@G!VI
iPWx_1L
=&k\|V
vbSrY6Fg
Ve%kwzj
zx*vhE
P{p,oG
Pj'VM,`
! $-;#
KMO{;k=
:+GV>TU&$Y"
@2l",u
CkY[(zM
*Dz)U
M{R)qN2"zp
y+vtTN
lye9UI
T%o^DD
T,E'Sx
-@C']#
LY-yRM]
Irl :AX
BO[X0Q
m0uhGf
_6/(}&
Z$.t(~T
\Dth2a
1bvKLR
Z @`Jb
;enD0E
FN@t@xa
wyr{!bv
EhV|h$k7i
J"X7hx
0VR/S|K
@xy6%6
-W,wmZ
XExAkz<
DR/Eht\
)/P[(IKY
tJyOvn.
z'}W*1
4iP$"r
kgRbZm
cJ5%y-
x!aOJ"
6DX^:9
K=PJYx<
[VZB""
Mz'11]^U
j'F^{P1
*Iheu
lm7)B=D
JW6Aj
_F;{c#
jV&kKfy
6/y%LW
%5r@;
IFkfR^Xs
5?t,
|/fJT?
a%pHU^
=oHnvU
!6m@GTu(3
K>p{fME
?\Px"Cs/X
d0]MV9
4sI/ZJ3
T@54x_
K662y'-
i[Ab]g.O
z)ur:s]
Owj)=O?
O-UUKei
$'jOaj
wgo~$
~CoL4(
,.xfF`zK
5>rg3g|
"$fyH[
gj3H4\^
)KcH|W
1GyAoA
"|! >[
*OTkS%[z=]
Cr|n'^y
r;,#7
si|$~(-
m(t8y7
e].NG$
q#QUCYm?
c#dI:[
}{/H v
P4U pFu_tk
"62U'`
WO6Y=+
C JPkb
: EvQ.
WWaipI#
&6eR@;
e<x~rCJ
4tj_?R$
E;/YW~O
R~l''yM
#Z<=pF
6{ hd0fMI
= 7}pJ
p!>ZM'W
0~)b4a{
7v/psy]
!lrQ3*
Le/U$g
]5_&N
@Ef)QS
W6j=Y/*,Sjsm(
OBHhzC#u
Fb)~*'
$yabZqr]
ToC\R|a
d`pc*z
C5WQ}^
TPE= 7
{%ub4t:
GXSSZ%
f.~dSrAv
#pvgf%
y(U;kd
hI\LwI
;zn~u~
^u"2
3q3(NcK@
&l&D};
+Nv.1a
DM[<j_
LCk_#T
VTSLui[
klT"y+
lz?*Tv5l
uM_CO>
eh:1>J
vh=<-+
u'Qz~]
6[[2.Df9
?\h*@y
23<m+>
bQ'NC^I
A:K`C<
6gEU]'
Jp1bRm
v];2cddT=
<4vnq3c
0HS^5'
!q?&;Q
#~of7xV
/tKHdo
qrd^G,
uze<k)
Nrrzw_
B[R%V&=
p6,K+F
<gs;^$
y6~aWp
5h!SOI#
A#3h4'pT
x)W9+<
9vX*EK3]
Xfyk<1A
U'Id7\E@
*45<={6
tx#F!_
N,4Yaq/
CjKp?s
jlH+Og
;IMXTr
qpp[[-
dWy&K0
ZUZWU3
:&cW_C[X
g\@W(rO
.gA\{M
Wf<-YP
H6JR=w
T-aB0k
e`s_T&
[!+3f{!S
]-cZ*B&
ZDm{!Ca9
c`8\c|W
F@mp5e
Q/][#8
RSDS/Agy
C:\Users\Administrator\Documents\CryptoObfuscator_Output\FHFJRY.pdb
v4.0.30319
#Strings
FHFJRY
FHFJRY.exe
mscorlib
System
kernel32.dll
user32.dll
A.c29ce76f370284ccce81711a6c73bcabd.resources
FHFJRY$
FHFJRY%
AsyncCallback
Attribute
BitConverter
Boolean
Buffer
GeneratedCodeAttribute
System.CodeDom.Compiler
EditorBrowsableAttribute
System.ComponentModel
EditorBrowsableState
ApplicationSettingsBase
System.Configuration
SettingsBase
Convert
DebuggableAttribute
System.Diagnostics
DebuggingModes
Debugger
DebuggerNonUserCodeAttribute
Double
Exception
CultureInfo
System.Globalization
NumberStyles
IAsyncResult
IntPtr
CompressionMode
System.IO.Compression
DeflateStream
MemoryStream
System.IO
Stream
MulticastDelegate
Object
Assembly
System.Reflection
AssemblyCompanyAttribute
AssemblyConfigurationAttribute
AssemblyCopyrightAttribute
AssemblyDescriptionAttribute
AssemblyFileVersionAttribute
AssemblyProductAttribute
AssemblyTitleAttribute
AssemblyTrademarkAttribute
Binder
BindingFlags
ResourceManager
System.Resources
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
CompilerGeneratedAttribute
RuntimeCompatibilityAttribute
SuppressIldasmAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
RuntimeTypeHandle
DESCryptoServiceProvider
System.Security.Cryptography
ICryptoTransform
SymmetricAlgorithm
Single
STAThreadAttribute
String
Encoding
System.Text
StringBuilder
Monitor
System.Threading
UInt16
UInt32
<Module>
c1b50f0554a6542640dda3a5b4914f79c
AssemblyInfoAttribute
c5f6e60d2bff96418e03a2d9c3ebe4ec3
c29ce76f370284ccce81711a6c73bcabd
Settings
FHFJRY.Properties
c94b91dd94859c86f5e6cb8d01ddca1bf
c1ab70084bdc1a8d087dd0c5bf4be037e
c6e7d84dd0b80324ad23aa9f4e860081d
cc786deb45eb2564477c0f45f35485aaf
ca4822a7fd11233af1e9087bdc241e01b
c4f0f2fecd7da7a8761791ea2b04a5c37
cd56912a3703d29598bc5526a163a0661
ceb0dc708eb6fe0a0714a31b696697664
cbf4b02e52394de2d9701ea7ac4da0abf
c73c355631d89a39c534bbfc30f85b4f5
c56b3628cae3195b492c4651d8da11a92
cccfc3f620fc92f1be88f44bb07360a01
c018828cb8f82c784715a1e1cb1dd5112
c42ae5badcf43bb5b200d450957de1539
c81713574dd1bc1a766fab3ad5ff0eb33
c8eb5f913c7229a0fa056978fccf93149
ca26366ebaa5fefcd3deebff25922479f
cd7c84f3541acd6f46f0dfa88c6dd47a4
ced0b027fe52bbaf56714928ac6ac8e0e
ce3acbf6d8b0b4cb9f11a0ee307cdd275
c985d38d59d1196d2908b79398a1242bb
cd5e8abbb7161ae1d9b8b887bcbfc8481
c3873587ab47c263fb2d58ba54a886b20
c51228d8af1e26d06e6a8f2adfd290c24
c1b576cb154a890599afdd3225b4c46a0
c90b766118b6b9dd456fd639f83be3c4a
c8b3e2156e58a77b92103528f2eb36522
pDlH3nfFG
RZO2sornC
UxuRO6y6F
ce24012c68869151411a7f1e239e158bf
cde522164501681a37fc34ae25e2050e5
cea2cca28d1eba09229abc4fc3389d8bf
defaultInstance
.cctor
get_Default
BODCV8uAhm4Hqb5RGZ
clroT9Vvx5ZEHlbQnd
c8ec654f729a53b5aef3621cfccd92f21
c6a292d3bff3db4ea5cd4a9bf4221f0a9
c76b9c8eb90288cc04bac9464be14e3ab
cbbfc92696f10fed8605f7f1adebb1654
c5901704a8ff571b51851ca15ca4b494d
c12d252344222e2412a85bdf3ff4f8d51
c774dd8434fe22e81c5cfe87522e4f7d6
cf638c1facdd53d5fefb08009e7f897be
c9d89acd661b028fd2a44f198d83209e7
ce3724bb5c231eabdbd76ecde1c5713d4
ce7a56b03dc4ca9ee5c5bbf12db967c83
ca6caa4cf448e8d942a3668abb0584964
c6ff820689cb55ae270f18a840eec38f7
cc30aa5caa4aea0193e95587bba073e4e
c022ca52964bca59c50b1067211acaccc
cc1014fa220a2ee0a4fa60ef597db5f4f
ca5762dbf34a93c4ac18e11c62c247c8e
ce4332301ac5518ca6c9c05a08af4090e
cbdfa9085bf2a6c0b721789d4b6f0af18
cc98dd44d93a36e6d7f98ed21f2b409e4
cb9c32a3439f6a694acf113caa5b8aa10
c6f544b4de3a4b8cce5b88be5366b8294
c707e00ec730765b63a159daea0e82ae1
ce1e2fc52b8205811fdcc4e217f14ddeb
ca724ceb3e775e72f5aa0541b8a6bf128
c6bf4e2378aecdb16306992b42db0fd24
c5c49b911ef3ab735b8b439b1f81854f2
cb169d8778fd9cabfc4b52420c38f7af7
cc68fb6837b67027c5b432c2d916f1f3c
c2461f598c80c7f6d8597b1e89ae361d9
c62fac217ef944b250d3e70140328260b
c93dde1591f1b88820d03f45ff697b845
cf7b3bf341726fc2ac564dca0d4e2cd57
c79a6df7aefd4a81a80dc5cfe4e8b5f62
c401285ee34b63e1f68d0875694ffe42e
c70b5d128c5f139993e74bbd6e1de3f8b
c8ca31ffa0429ed618fb3b491722e8031
c6b34d24b36eeef1026de2535b2ba2cf7
cf87ac620574291cb95b8bcafceec3581
c8fae9d5e23880f030b8532994016ae14
c9aa1809df7adcdbe1105b29d8915a32e
ceb868871739edb0dbbd33d1883b11ecb
c5372a88f1e509e9d4647a114465f70bd
ca5c766a6f2400efd12f20603ef126555
c0f55d65f26115fb1f7c36b60da8eb867
c5a7133be1ff2043db0234a3e68145288
c1d1ec175578b5cfbf0d8bb02257fbd89
c447eec6687af44b3e3a66c836ff26234
c25206bd9f89868f7e84a4cfea6e34a66
c67f53b93f3c96d2e73670f4a2594b0f8
ca8e67b22d5fedb8707edbb9b16c34161
c8015f739bf5523a9d95728af381c1d46
c58db35f16816e4a46a3bfab3fe848911
cd0e4ccb80bef9f810fcc7d991b539cf9
c54c0775fd8cf016b5bfd18a5059bcf11
c9042c2e1facea55dc8f54e067d1a8d4c
cb477348a86fcf0df023281f90e7e5223
c95590081cbdd5845953dcd620341afb6
caeab039346f29c43fca7b10101487ef3
c0d3ae6b7ca689d605dab0e393c6b3f3d
cc7d455949f0f579316d77ae03494e774
c8640557abdd8757aea50785c96110187
cb2d04fd7b169e5d1aad6381c8588a71c
cd2fc7d736bf36db925433d48e92ff3a0
object
method
Invoke
ProcessHandle
ProcessInformationClass
ProcessInformation
ProcessInformationLength
ReturnLength
BeginInvoke
callback
EndInvoke
result
debugPort
lpOutputString
hProcess
pbDebuggerPresent
lParam
lpEnumFunc
c4c7f73ad220d1d6673840fcd50c60e7e
c02e15073800ef02f13061a6a34a34dfa
c48fdd731a51ca9c34a0b63374403928c
cbd8a4fb377e7307fe08d61939acd5537
SetLastError
CloseHandle
OpenProcess
GetCurrentProcessId
LoadLibrary
GetProcAddress
GetClassName
iCIj9jRBx
WHXsSsR3A
Default
Replace
FromBase64String
GetType
InvokeMember
get_Assembly
GetTypeFromHandle
Synchronized
get_UTF8
GetString
GetExecutingAssembly
GetManifestResourceStream
ToInt32
ToInt64
ToSingle
ToDouble
BlockCopy
get_Unicode
Intern
get_FullName
IndexOf
Substring
get_Chars
GetBytes
Reverse
ReadByte
set_IV
set_Key
get_Length
set_Capacity
set_Position
CreateDecryptor
get_InputBlockSize
get_OutputBlockSize
get_Position
TransformBlock
TransformFinalBlock
ToArray
Compare
get_Capacity
ToString
Format
get_IsAttached
op_Inequality
3System.Resources.Tools.StronglyTypedResourceBuilder
4.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
11.0.0.0
Copyright
2022
.NETFramework,Version=v4.6.1
FrameworkDisplayName
.NET Framework 4.6.1
1.0.0.0
$d770a50c-d6fe-428d-add7-603846857441
FHFJRY
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
Greater Manchester1
Salford1
COMODO CA Limited1705
.COMODO RSA Extended Validation Code Signing CA0
191007000000Z
221006235959Z0
943491
Private Organization1
Dubai1
Dubai1;09
2Business Central Towers, Tower A, Office 2301 23031
Telegram FZ-LLC1
Telegram FZ-LLC0
https://sectigo.com/CPS0U
Dhttp://crl.comodoca.com/COMODORSAExtendedValidationCodeSigningCA.crl0
Dhttp://crt.comodoca.com/COMODORSAExtendedValidationCodeSigningCA.crt0$
http://ocsp.comodoca.com0#
AE-943490
Greater Manchester1
Salford1
COMODO CA Limited1+0)
"COMODO RSA Certification Authority0
141203000000Z
291202235959Z0
Greater Manchester1
Salford1
COMODO CA Limited1705
.COMODO RSA Extended Validation Code Signing CA0
=U5W5H
https://secure.comodo.com/CPS0L
;http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
/http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
http://ocsp.comodoca.com0
Greater Manchester1
Salford1
COMODO CA Limited1705
.COMODO RSA Extended Validation Code Signing CA
20220816071544Z
Manchester1
Sectigo Limited1,0*
#Sectigo RSA Time Stamping Signer #3
Greater Manchester1
Salford1
Sectigo Limited1%0#
Sectigo RSA Time Stamping CA0
220511000000Z
330810235959Z0j1
Manchester1
Sectigo Limited1,0*
#Sectigo RSA Time Stamping Signer #30
/l}.aQ
https://sectigo.com/CPS0
3http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
3http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
http://ocsp.sectigo.com0
New Jersey1
Jersey City1
The USERTRUST Network1.0,
%USERTrust RSA Certification Authority0
190502000000Z
380118235959Z0}1
Greater Manchester1
Salford1
Sectigo Limited1%0#
Sectigo RSA Time Stamping CA0
?http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl0v
3http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt0%
http://ocsp.usertrust.com0
rRj;B7|
[C]e=P
Greater Manchester1
Salford1
Sectigo Limited1%0#
Sectigo RSA Time Stamping CA
220816071544Z0?
New Jersey1
Jersey City1
The USERTRUST Network1.0,
%USERTrust RSA Certification Authority
1k%mKBI%
"3D9B94A98B-76A8-4810-B1A0-4BE7C4F9C98DA2#
RkhGSlJZJQ==
RkhGSlJZJA==
PublicKeyToken=
publickeytoken=
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
FHFJRY
FileVersion
1.0.0.0
InternalName
FHFJRY.exe
LegalCopyright
Copyright
2022
LegalTrademarks
OriginalFilename
FHFJRY.exe
ProductName
FHFJRY
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
No antivirus signatures available.
No IRMA results available.