Static | ZeroBOX

PE Compile Time

2023-07-17 12:07:40

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0003123c 0x00031400 7.88289385203
.rsrc 0x00034000 0x0006a118 0x0006a200 4.8357338873
.reloc 0x000a0000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0009da02 0x00000084 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0009dac2 0x00000430 None SUBLANG_NEUTRAL data
RT_MANIFEST 0x0009df2e 0x000001ea None SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
-~&&&~T
-{&&&~V
-;&&*~A
-r&&&&&&
-a&&&&&&~l
-X&&&~n
91_~J
,k+'~A
-G&+3~A
v4.0.30319
#Strings
FnmboIdo.exe
FnmboIdo
<Module>
mscorlib
System
Sampafsle
Object
MulticastDelegate
ValueType
Attribute
GetString
SmartAssembly.Delegates
MemberRefsProxy
SmartAssembly.HouseOfCards
Strings
PoweredByAttribute
SmartAssembly.Attributes
value__
YELLOW
ModuleHandle
Dictionary`2
System.Collections.Generic
String
Concat
GetTypeFromHandle
RuntimeTypeHandle
Marshal
System.Runtime.InteropServices
SizeOf
Convert
ToUInt32
IsNullOrEmpty
Directory
System.IO
Exists
BitConverter
ToInt32
IntPtr
get_Size
op_Explicit
ToInt16
Buffer
BlockCopy
GetBytes
ToString
Assembly
System.Reflection
get_Location
Exception
get_Message
TextReader
ReadToEnd
Console
WriteLine
Thread
System.Threading
Environment
GetFolderPath
SpecialFolder
GetEntryAssembly
GetExecutingAssembly
GetDirectoryName
Intern
op_Inequality
op_Equality
CreateDirectory
DirectoryInfo
ProcessStartInfo
System.Diagnostics
set_Verb
set_FileName
set_Arguments
set_WindowStyle
ProcessWindowStyle
set_UseShellExecute
set_CreateNoWindow
set_RedirectStandardOutput
set_RedirectStandardError
Process
WaitForExit
get_Assembly
ResourceManager
System.Resources
GetObject
Encoding
System.Text
get_ASCII
get_UTF8
HashAlgorithm
System.Security.Cryptography
ComputeHash
SymmetricAlgorithm
set_Key
set_Mode
CipherMode
set_Padding
PaddingMode
CreateDecryptor
ICryptoTransform
TransformFinalBlock
get_Chars
EnumerateDirectories
IEnumerable`1
get_Length
BinaryReader
ReadInt32
GetName
System.Collections
FileStream
FileMode
IDisposable
Dispose
Stream
GetDirectories
FromBase64String
DateTime
get_UtcNow
TimeZoneInfo
FindSystemTimeZoneById
ConvertTimeFromUtc
GetManifestResourceStream
ParameterInfo
.cctor
object
method
Invoke
hfsdkffddfghseffdfaffdchd
fghhfgsfffrfddfdffddshfdasdfh
cdfffdfadfdfrsfsshdkfffgh
BeginInvoke
IAsyncResult
AsyncCallback
callback
EndInvoke
result
hjfdffhgfadffdfdcdffffskhj
ffghrgfdffffffkhsjd
sfdfffdshdffgfefdfkfghj
sddddffhedfgddffffgjfsfkdgsacsafp
sgfhjffffgdhjsrfhddfhfffadfsfsscfgdb
dfjffsfhgdffafcfdssfkfhgj
ffchkffdafhfdssfsfj
jffgadffcffgfgfshfskffj
jcfsdfrfdfdsdgkfff
fdfcffrdgfdffsfssffj
jffffgffrfdffcsdsgkffj
jffffgfdsadfsdgkffff
gdddffdhfsfgh
fhfsdsfhfdfhhs
hfgggd
ffffffh
shssgfasd
sdffgfsf
sdffffss
sffdfggfs
ffdgfdshs
gsffddsd
gsddss
gfhfsfs
gdffdg
gsdffssg
gdadag
hdsffafs
adsfdads
jddssf
ggfssddfh
jfsgffdfhg
jffdfdffgfdgs
jsfdsfffdf
jdffdfa
gdfdsfffddj
kfdsgffh
fsffdfg
sfffaf
ffdssfs
sfffdsd
jdfffssk
wsfsssv
gsfffsds
gffssfdsx
startupInfo
dkroildcf
jdhfdffsffsdkfj
hdffhfafsfsdkfsh
hdffhdffffffkdf
affdshhh
sdfffhdhff
hffdfffshdhs
hhhfgfffdfh
fffffffdhs
fdffss
hffdsffsf
jhfdfdfdh
CreateMemberRefsDelegates
typeID
CreateGetStringDelegate
ownerType
fsffgfgfafad
UnverifiableCodeAttribute
System.Security
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
AssemblyFileVersionAttribute
SuppressIldasmAttribute
AttributeUsageAttribute
AttributeTargets
CompilerGeneratedAttribute
FnmboIdo.resources
{7d6b7607-16cc-4e21-b42d-e4e8aeb5d6cb}
System.Windows.Forms
Application
get_ExecutablePath
AppDomain
get_CurrentDomain
AssemblyName
DefineDynamicAssembly
AssemblyBuilder
System.Reflection.Emit
AssemblyBuilderAccess
DefineDynamicModule
ModuleBuilder
DefineType
TypeBuilder
TypeAttributes
GetMethod
MethodInfo
MethodBase
GetParameters
Func`2
System.Core
Enumerable
System.Linq
Select
ToArray
get_ReturnType
DefinePInvokeMethod
MethodBuilder
MethodAttributes
CallingConventions
CallingConvention
CharSet
GetMethodImplementationFlags
MethodImplAttributes
SetImplementationFlags
CreateType
Delegate
CreateDelegate
get_ParameterType
ResolveTypeHandle
GetFields
FieldInfo
BindingFlags
MemberInfo
get_Name
ResolveMethodHandle
RuntimeMethodHandle
GetMethodFromHandle
get_IsStatic
get_FieldType
DynamicMethod
GetILGenerator
ILGenerator
OpCodes
Ldarg_0
OpCode
Ldarg_1
Ldarg_2
Ldarg_3
Ldarg_S
Tailcall
Callvirt
SetValue
GetModules
Module
get_ModuleHandle
RuntimeHelpers
InitializeArray
RuntimeFieldHandle
get_Module
GetMethods
Ldc_I4
get_MetadataToken
RijndaelManaged
MD5CryptoServiceProvider
InvalidCastException
StreamReader
FileNotFoundException
TripleDESCryptoServiceProvider
TryGetValue
WrapNonExceptionThrows
6.9.0.114
"Powered by SmartAssembly 6.9.0.114
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
$X=+x9
CwPb ,Cd
m'tH-N$
"S&,o|
^{+bjV
4$XSms+"F
Ez?p2R
~;AmeO
`b)y~
6z#ed4
Ip9t6z|
yLXQ,
uLz^pD
CUb2GJ9i
/9V$N2
"}y/6
Q3X3LeS)
\{B&@
E<u:,ef
[kv@(R
%9oU\cX
g9Ig1M2
##JWze
[y`KZ)
>>_w/K8
~(\?wB
v?0r";
] >W`t
jeV375
cCGrZ{
7Z*H@o
?ZAYzZ
r: puC
:iHCzn(
$ueVba
zo{hco=
8E-@<
+-feVU
K)EiFp
j/;*k;
!O3!`r
{ch96v<
jKOs}J
1+7#xR
:\.KEB1k
QoR5Og
]ky8:U
@nwXVd
#ggXY3
G;^`_FF
(#Q`Ys
mU?}mF
P&lC_J
2G7I)?
q.3=~[
wV&Psz
("j]50
jGRiQ
e`Prp-
;{3o<}
G((|nyw
[VI]aSc$M:]
C<fa\D
DB=A?,
s<=T^.
]vj%H;u[
R;+y5i
'}d-KD
2H'z;2
II5Ax)
}! 08A
gr~;rS
r~vP5a
EXN-SOP
lI\bD1*
Rz~K:]E
!NW=v"
FAxht#L
x0d\dP
wUFeMKY
yjP?R,
4|~5@eu
PRYGE=
:_m`uS
zO[6Zn^)
k~jJUQ
@pIY$9
e6`OrD
a,mCFm
37TTx6
tjElh,
.S6C+@
fL1\cH
Z~AHmK
:=mKNE;2@
\gXC$<u
n[m"jP
,r]F;9
f5WD#T9
ioH43Ji
,r]F;9
kxh5#}
~UWzS,
q8Fik|
,r]F;9
)D]a.@
*Uay$>fU
3pBxX
/)2u9WW
U-RVzjH@
b`9<sY
9kPsR^*
2i|uu
.y(}9r
TQp|_,;
sJU^nc`
LTbUrK
0IkDVX
n|v "A|
e-}(l=
5hHv>0
qj-&IT
DMdGWa
tf;VykL`,
-^<#dUF
$sT^Gk4>
PYPt<g
z+.Pi-
)09pCJ
}pg%^+Z
)$ XZY
,%sr=p
x2(U#v
u<k6|O\l
L2ak1w
u,n-k4
<R%.ek
<OkM"6
z';HNO
oZS8-fkqd
vh&IR+
!rpP-S+
ps}kf)
UqWt/GUz
#~#4U~~
~/qk$4
-ON&#"X
%eWw|r
522/h:*
ec`fi8
f{94QZ4N(i
TW[cBx
)0KY.3.D
yA3p3Qlaj
(_}]nTa
=3%m~8
LxER%y1
S DUKx
d`pT~Y
(ua"Tr
jELhK,p
AApD8%h
amck)I
OdjO&4Z|
7::3z9
lR;btL
@ae#<|J
d/([d1
3l:wrL4
}x6rx=M7
HhJ6^z
XT73u*
)%s~$-;
Bqqd-8
BJV!y
%MSo5.}
S;Su 1d
,+-bkrC3
X?JeK_/
e!Y5_R&
]$9N0:AR
=q\`25
)t,*Wcp
$@<(1i>}
HXV*f6N
10bm6'
_</oq'!cY
M~Z8Y
AL7k6UQ
9liurk.!x
vA({!,I
ug,#zD
~zQ8>[\
o#T++i
H|.bw:6Q
lDe ^w$wa
G('f.c
eH8N8S
b;x\g0
dB=3~V
grPQB| =
2)Bzfk
[P+Bc-e
/oqrO6
MJa>+y-
T~mBHr
j$#t:}
I/q~ *
WEm3Z
9a:'AG
MGis-x`
:z$c`K
}[p`|0
lB2\|r
nJ/g#:
X_{uJD
@Bt~83
<}M:l#Zj
(z`nJt
jRCg.n
(*#\}SlE
~lygT:r
@y,B*S
FoO[]x
t&5%j\
I6YBPz~!
5^kn c
S ,}u6
Q7cdi
La!%LF3
~<2(}*
Psd hk
`(^/'w
'-nP[e
$HmOvs
Mq:P~.
Am~!F:7V
<)`xDIu
m'RSSF
qQ[k7(
ZG+SH\x5^
\ wh:6Zf
G&lb/[
Zvhp5&q
8*\+d2b!H
H{AOcP
oe]l"v
SOE1wQ
vYS<zT
Q?"'fF
D{#=6b
4Y4z^^
*%/KOv
a}WFHVA
&G_q_)
t$I9Q_~
rTd%J#
hUi%3<
=rI=z
-FBVh!
Y:`BmBH
,#?o5Z
A"geS2>
_Sd\=C
)-M"Xg
xGag`B
i677s]E_b
""FV0_
}#H'ctDt
L[A5rQ\
s>|V$m
.?_1Fk2
kQ**n/
?$GTR
KvKN2#7*{
TT6$7G$@
S`PxNxXK
!VX(S2
}pY);57
Kkvi8&
|~.RC
E1T\1<0
b*qI)V
,$lrag~7
JtTKAN
oH_<IO
}c:}Aa!c
(Re(8r
V\YkX>Db
.b2PcO
,LytxeW1pT1BsdkN0SXFwbnpzaHkrT29JVjJEb0lsMXY=
Rm5tYm9JZG8=,LytxeW1pT1BsdkQ4TGwyNStreWY1T29JVjJEb0lsMXY=
RHluYW1pY0RsbEludm9rZVR5cGU=
dU1vYXdSMUxOMkE9 bCtqRzFQL1VRSElic2NEQnJyMDJ4UT09,NjdUR09WTldydnYwZUVnMXdkTmJDS1lvdm9LTGZQaDE=,NW9tRVdFVVozOVdBUVhtdVg3ajZtZW9JVjJEb0lsMXY=,K1ZKN2hGMW5hbER4Z0Vla1RMc0RZN1JIV1JVYm85bmE= aUVoV1k3QmhvbHh5dUw5eVoxQWtudz09,R0UvRGpPUXYzNjJlelRZNlcwS3BNRS9sU2xTejNSa0Y=,dG1OQmRNTXkxZ1AwZUVnMXdkTmJDS1lvdm9LTGZQaDE=,R2IwNHEvZXljRWlBUVhtdVg3ajZtZW9JVjJEb0lsMXY= d3FuVk1LdmxvTllKMFJETHdMenh1Zz09 SzdlWFArbXVtT29ic2NEQnJyMDJ4UT09,VFY4VWgvcTV5UG52cDhvODMrcTlXdzFSOHlwb0lWMDk=
XGZpcmVmb3g=
ZmlyZWZveA==
bWtkaXIgIg==
ZmlyZWZveCI=hVVZxSWEzVFZYbW5mZVlQREcrYmthQk9tR0VhMk1iYTJua0tPbmZMakNoYlFmNUNWN3V4R0JjZHEyblEvRUtUZ2VieHNKcEZJY2ljPQ== ZmlyZWZveFxmaXJlZm94LmV4ZSciIC9m
bjdNOFExbU9rNFE9
ZmlyZWZveFxmaXJlZm94LmV4ZSI=
cnVuYXM=
Y21kLmV4ZQ==
ZDovZmlsZTEudHh0
ZDovZmlsZTIudHh0$Q29udGVudCBvZiBmaWxlcyBpcyBzaW1pbGFy,Q29udGVudCBvZiBmaWxlcyBpcyBub3Qgc2ltaWxhcg==
VGhlIHZhbHVlIGlzOiA=
ZGFkYWg=
ZGRkZGRkZGRkZA==(TmFtZSBpcyBub3QgYXZhaWxhYmxlIGluIEVOVU0=
TmFtZSA6IA==
UG9wcGVkIEVsZW1lbnQ6IA==$VW4tYm94aW5nIGEgaW50ZWdlciBudW1iZXI=
c2FhZGFhYWFmeHQ=
U2QgICAgICAgOiA=
RDovU2FtcGxl
U3ViIGRpcmVjdG9yaWVzIGFyZTo=
RWFzdGVybiBTdGFuZGFyZCBUaW1l RWFzdGVybiBTdGFuZGFyZCBUaW1lOiA=
SW5kaWEgU3RhbmRhcmQgVGltZQ==
SW5kaWEgU3RhbmRhcmQgVGltZTog
Q2VudHJhbCBTdGFuZGFyZCBUaW1l Q2VudHJhbCBTdGFuZGFyZCBUaW1lOiA=
_CorExeMain
mscoree.dll
Pvvvuhhh
+2jH#*c
(/hFuy
(0j:@Ew
in{DLTj^CLd
JSh^hmzDs
^ctABJb
^csApz
hm~?`fy
gl|?lz
-.Je"#B
#.mKU^
"+hy-=
QXvn!&V
hhh%\\\
LQf0:Aq
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
{7d6b7607-16cc-4e21-b42d-e4e8aeb5d6cb}
FnmboIdo
MAINICON
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
FANTECH
FileDescription
Setup Launcher Unicode
FileVersion
1.00.0000
InternalName
LegalCopyright
Copyright (c) 2015 Flexera Software LLC. All Rights Reserved.
OriginalFilename
InstallShield Setup.exe
ProductName
FANTECH VX7 Gaming Mouse
ProductVersion
1.00.0000
Internal Build Number
154432
ISInternalVersion
22.0.284
ISInternalDescription
Setup Launcher Unicode
VarFileInfo
Translation
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic malicious (high confidence)
DrWeb Clean
MicroWorld-eScan Gen:Variant.Ransom.Loki.8883
FireEye Generic.mg.ad81a4455bc146b9
CAT-QuickHeal Clean
ALYac Gen:Variant.Ransom.Loki.8883
Cylance unsafe
VIPRE Gen:Variant.Ransom.Loki.8883
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Variant.Ransom.Loki.8883
K7GW Clean
K7AntiVirus Clean
BitDefenderTheta Gen:NN.ZemsilF.36318.Mm0@ae6J15mG
VirIT Clean
Cyren W32/MSIL_Kryptik.JLT.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Kryptik.AHUA
APEX Malicious
Paloalto Clean
ClamAV Clean
Kaspersky HEUR:Trojan-PSW.MSIL.Stealer.gen
Alibaba Clean
NANO-Antivirus Clean
SUPERAntiSpyware Clean
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:XzCfpL9qPnEFfS4vKLayaQ)
Sophos ML/PE-A
F-Secure Clean
Baidu Clean
Zillya Clean
TrendMicro Clean
McAfee-GW-Edition Clean
Trapmine malicious.high.ml.score
CMC Clean
Emsisoft Gen:Variant.Ransom.Loki.8883 (B)
Ikarus Trojan.Agent
GData Gen:Variant.Ransom.Loki.8883
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
MAX malware (ai score=80)
Antiy-AVL Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Ransom.Loki.D22B3
ViRobot Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealer.gen
Microsoft Clean
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.C5458972
Acronis suspicious
McAfee Clean
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Malwarebytes Trojan.Crypt.MSIL
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Kryptik.AHBB!tr
AVG Win32:PWSX-gen [Trj]
Cybereason malicious.4f9331
Avast Win32:PWSX-gen [Trj]
No IRMA results available.