Static | ZeroBOX

PE Compile Time

2023-07-17 12:08:41

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00031128 0x00031200 7.88760017952
.rsrc 0x00034000 0x0006a118 0x0006a200 4.83572924449
.reloc 0x000a0000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_ICON 0x0009d54c 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL GLS_BINARY_LSB_FIRST
RT_GROUP_ICON 0x0009da02 0x00000084 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_VERSION 0x0009dac2 0x00000430 LANG_BELARUSIAN SUBLANG_NEUTRAL data
RT_MANIFEST 0x0009df2e 0x000001ea LANG_BELARUSIAN SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
-r&&&&&&
-a&&&&&&~5
-X&&&~7
-G&+3~B
,k+'~B
91`~g
-;&&*~B
-~&&&~
-{&&&~
v4.0.30319
#Strings
oIig.exe
<Module>
mscorlib
System
Sampafsle
Object
MulticastDelegate
ValueType
Attribute
GetString
SmartAssembly.Delegates
MemberRefsProxy
SmartAssembly.HouseOfCards
Strings
PoweredByAttribute
SmartAssembly.Attributes
value__
YELLOW
ModuleHandle
Dictionary`2
System.Collections.Generic
Encoding
System.Text
get_ASCII
get_UTF8
GetBytes
HashAlgorithm
System.Security.Cryptography
ComputeHash
Buffer
BlockCopy
SymmetricAlgorithm
set_Key
set_Mode
CipherMode
set_Padding
PaddingMode
CreateDecryptor
ICryptoTransform
TransformFinalBlock
DateTime
get_UtcNow
TimeZoneInfo
FindSystemTimeZoneById
ConvertTimeFromUtc
String
Concat
Console
WriteLine
System.Collections
TextReader
System.IO
ReadToEnd
Exception
get_Message
ToString
Assembly
System.Reflection
get_Location
Stream
IDisposable
Dispose
Directory
GetDirectories
GetTypeFromHandle
RuntimeTypeHandle
GetName
Marshal
System.Runtime.InteropServices
SizeOf
Convert
ToUInt32
IsNullOrEmpty
Exists
BitConverter
ToInt32
IntPtr
get_Size
op_Explicit
ToInt16
GetExecutingAssembly
GetEntryAssembly
GetDirectoryName
Intern
op_Equality
op_Inequality
get_Chars
EnumerateDirectories
IEnumerable`1
get_Length
BinaryReader
ReadInt32
get_Assembly
ResourceManager
System.Resources
GetObject
Thread
System.Threading
Environment
GetFolderPath
SpecialFolder
CreateDirectory
DirectoryInfo
FileStream
FileMode
FromBase64String
ProcessStartInfo
System.Diagnostics
set_Verb
set_FileName
set_Arguments
set_WindowStyle
ProcessWindowStyle
set_UseShellExecute
set_CreateNoWindow
set_RedirectStandardOutput
set_RedirectStandardError
Process
WaitForExit
GetManifestResourceStream
ParameterInfo
.cctor
object
method
Invoke
hfsdkffddfghseffdfaffdchd
fghhfgsfffrfddfdffddshfdasdfh
cdfffdfadfdfrsfsshdkfffgh
BeginInvoke
IAsyncResult
AsyncCallback
callback
EndInvoke
result
hjfdffhgfadffdfdcdffffskhj
ffghrgfdffffffkhsjd
sfdfffdshdffgfefdfkfghj
sddddffhedfgddffffgjfsfkdgsacsafp
sgfhjffffgdhjsrfhddfhfffadfsfsscfgdb
dfjffsfhgdffafcfdssfkfhgj
ffchkffdafhfdssfsfj
jffgadffcffgfgfshfskffj
jcfsdfrfdfdsdgkfff
fdfcffrdgfdffsfssffj
jffffgffrfdffcsdsgkffj
jffffgfdsadfsdgkffff
gdddffdhfsfgh
fhfsdsfhfdfhhs
hfgggd
ffffffh
shssgfasd
sdffgfsf
sdffffss
sffdfggfs
ffdgfdshs
gsffddsd
gsddss
gfhfsfs
gdffdg
gsdffssg
gdadag
hdsffafs
adsfdads
jddssf
ggfssddfh
jfsgffdfhg
jffdfdffgfdgs
jsfdsfffdf
jdffdfa
gdfdsfffddj
kfdsgffh
fsffdfg
sfffaf
ffdssfs
sfffdsd
jdfffssk
wsfsssv
gsfffsds
gffssfdsx
startupInfo
nmmmiim
jdhfdffsffsdkfj
hdffhfafsfsdkfsh
hdffhdffffffkdf
affdshhh
sdfffhdhff
hffdfffshdhs
hhhfgfffdfh
fffffffdhs
fdffss
hffdsffsf
jhfdfdfdh
CreateMemberRefsDelegates
typeID
CreateGetStringDelegate
ownerType
fsffgfgfafad
UnverifiableCodeAttribute
System.Security
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
AssemblyFileVersionAttribute
SuppressIldasmAttribute
AttributeUsageAttribute
AttributeTargets
CompilerGeneratedAttribute
oIig.resources
{f9e64a8b-6490-4555-b072-a174116b88e4}
System.Windows.Forms
Application
get_ExecutablePath
AppDomain
get_CurrentDomain
AssemblyName
DefineDynamicAssembly
AssemblyBuilder
System.Reflection.Emit
AssemblyBuilderAccess
DefineDynamicModule
ModuleBuilder
DefineType
TypeBuilder
TypeAttributes
GetMethod
MethodInfo
MethodBase
GetParameters
Func`2
System.Core
Enumerable
System.Linq
Select
ToArray
get_ReturnType
DefinePInvokeMethod
MethodBuilder
MethodAttributes
CallingConventions
CallingConvention
CharSet
GetMethodImplementationFlags
MethodImplAttributes
SetImplementationFlags
CreateType
Delegate
CreateDelegate
get_ParameterType
RijndaelManaged
MD5CryptoServiceProvider
StreamReader
FileNotFoundException
InvalidCastException
TripleDESCryptoServiceProvider
ResolveTypeHandle
GetFields
FieldInfo
BindingFlags
MemberInfo
get_Name
ResolveMethodHandle
RuntimeMethodHandle
GetMethodFromHandle
get_IsStatic
get_FieldType
DynamicMethod
GetILGenerator
ILGenerator
OpCodes
Ldarg_0
OpCode
Ldarg_1
Ldarg_2
Ldarg_3
Ldarg_S
Tailcall
Callvirt
SetValue
GetModules
Module
get_ModuleHandle
RuntimeHelpers
InitializeArray
RuntimeFieldHandle
get_Module
GetMethods
Ldc_I4
get_MetadataToken
TryGetValue
WrapNonExceptionThrows
6.9.0.114
"Powered by SmartAssembly 6.9.0.114
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADPmQr|
jc2U-x
eT3&lq
gZ\2,L
N7[ Vh0
Z`L|% .
FekX`Ff
a\?4uZQ9
&WEgc`$
\1&)?fg8!
'0=yG|xEf
*_<.n/
?'}woK3S
b0J53_5
:Z(jSp
er~_3I
~WniL
?~G)rkv
{Je'L`
jY ,7-2m
^@}{syK
{$z12w
ULT%bYm
~47AtA
Roe/<b5PC
>xR{ZgV
QrG~XL
FZBm`g,T
k!F39[
L,Kj"yd
WPVR$%P
?$V2/C
}T-LV(
EQ2mKcT
J&Wd%v
&=9\(Y
aZmiL]
WA*o#V
@20;'$
\H:_d[
;30"Lj
{kvH2LFO
p~S"vw
k3lW{@E
[k;J[b
5qX$?|
Be(/~TTe
ZE@*Uy/
\N0kZK
L2YN+PS
-j@`]<H
-Nz;l/:1g
eM+6v>C
B(}AQCpF
!PyO5t
3_ddN,4
nUp!c@
v@4<~W0f!
L@<"MJ@
A(r.Ni#&
@S{*=|
_B|RL/1h
yaIUq-O
&1gj(&=6
i$@]@K`
6Hf+7Z]c
&8flDeO
6[*H'Z8l
&P=A`d
+Kui_/
m&}F0+
;wF^)Gq
4-I{5
N|}v,/xQ
e{MpWH
q]RXB.r@!R
^P.P"
WM@}w=
f/RH{^
(E>;%Rm
$B1p)f
#6Z+1j
5rr.#uG
w> s"
t~!C+DU9g
8AN]Qu
%n\sc_
f%JlFr6
rL[D@J*NN
V=FF%UE
|85K0z
/bsI+_
-nNS8Ve
%OHar-R
.<7~2)
p[$hRu
za'Qw,
0s.bmn5
=L}:zf
wTp.(!
w0-q^\
X=Ss;sb
J0AIY
*i=DS|
`vd$=d
X,C@jtc
txJx{e
Rx\Qj}
|"s\~6
(wT Q
HL4dTJy
GL/gX3
HL4dTJy
]qEn%rJ
U^VX9;
^[_)6I
T*]EA
k<f@dn
@ :Mj
OPyO5t
2QM^d]
=y|{vS
<BQID,
!v[is]
*y{QFryG@_'
H`zB?i
;*yKo<i
yN+"rX
u~qyj#
#CU+WX
?I>v!\H
g<o3E`V
b2z0G
8ks\YYC
L<+nxGx\
LJdIc>
c<YEc5
c!\$;G_k
gsm1v!n
B'C8Y*
Bm+<'
'r4afI
Poj-vr
AK!^%.
bN.1VS
bd%xYg
(_ub.}}~
R(9C><6;y
o#)3ZHD
X(/G.WD
9d'lc9
<\}}0.rjJ
nX17fD
kH6}w$+I
_>A/}g
;Cou~>o
4CW2k+
1?#Qtf
>TVkvY
B:q{DH
l]8$]^G
g01*H`K
GwF>}Mym
.zMG)V
q"({g8
dHZx D
($10|9
M8n*GS+^
E;}w<1I~
S}>GL$cf
\sIQVJXj
97%h`[>
8lt."NO
RrD={
>XlKYq](
}07bX.
`uaVw{h
6GoCKR
%iEs8CR
Xca2*A
tL^Sq!}
KefILp
fCg-&u4u
dh>'M@
gF^dM%b
|^74Prl
jg]#KBX
6)>epVTfo
$Jc& ?
59~\)-A1w
MdiX}y
JIvH*ug;
zPfoUE
6XdhoF6
yoYF(sN
,?fkm.
^4w]nC74
vH{"H=
l)su/k
TC&le[
#m4o?<GO
Ao^0L'P
@HX,4*
[v"BN"+C
2ZdgW[
dkyd[(X
L)Fx&)
o1FV??
bhyM@>
Ny v0.
0sa('^
6&>45C"
x9/z ?
\{(VHTx^!*
q+[n|ut
ne{Nxc:vY
L8zhc-
HU0i!O
/Va[dh
\f6"|~
2)IaPfl<|
JA`Axr
.Kh@F}n
Cf}g3
Aqh7*l
'gm'26
h-yM9?uA
![N0m~
>2o*_4W
vFB"1C
JZ;%JU
m5FU1s
3n4!#p
~EGW;L)
ck%BX^
NV*p:G
-AA=\x
E@0Tl
1h;70Rk
3my?4F
"ESmEKU
('kYIs`
e_]9y{y
kQ-gy}
i;99~=f
(3Y{d.9
6,gs2Av
;<<|2!#Sv
A6,9^r
\-]k 
KuVQa?
)+Ee3S
:#|6V7
Y-B|a^
nwrdZ5
Q"jllh
X,v64z
&3X{<'
NZP5kO8`
uZ]wK}^v
3(Fcn-
|SBbUJ
*us<K3
a0Vf{$
z\Tge(S'
h+O8l=T
%'&<CT49
1%^bgm
psUTcO
xYs3hG
S>3>k[~~
nd1Mu;
|~K~19B
RWFzdGVybiBTdGFuZGFyZCBUaW1l RWFzdGVybiBTdGFuZGFyZCBUaW1lOiA=
SW5kaWEgU3RhbmRhcmQgVGltZQ==
SW5kaWEgU3RhbmRhcmQgVGltZTog
Q2VudHJhbCBTdGFuZGFyZCBUaW1l Q2VudHJhbCBTdGFuZGFyZCBUaW1lOiA=
UG9wcGVkIEVsZW1lbnQ6IA==
RDovU2FtcGxl
U3ViIGRpcmVjdG9yaWVzIGFyZTo=
CQ==$VW4tYm94aW5nIGEgaW50ZWdlciBudW1iZXI=
VGhlIHZhbHVlIGlzOiA=
(TmFtZSBpcyBub3QgYXZhaWxhYmxlIGluIEVOVU0=
TmFtZSA6IA==
ZGFkYWg=
ZGRkZGRkZGRkZA==
b0lpZw==
XGZpcmVmb3g=
ZmlyZWZveA==
bWtkaXIgIg==
ZmlyZWZveCI=hQzFKazJBdjVpQlNnbG56VDNSNXA1T0N1NW11eG4rS2hac2JnM0Z0Z2MzaXhORENncjE4dHVOZit0S1pNeU5ybTJtTnhNZDdzdXZFPQ== ZmlyZWZveFxmaXJlZm94LmV4ZSciIC9m
WkhMd2ZXRHJ6M2M9
ZmlyZWZveFxmaXJlZm94LmV4ZSI=
c2FhZGFhYWFmeHQ=
U2QgICAgICAgOiA=
ZDovZmlsZTEudHh0
ZDovZmlsZTIudHh0$Q29udGVudCBvZiBmaWxlcyBpcyBzaW1pbGFy,Q29udGVudCBvZiBmaWxlcyBpcyBub3Qgc2ltaWxhcg==
cnVuYXM=
Y21kLmV4ZQ==
L0Mg,NU5TSlIyMDlybDhVRUJIQkdXb3FEY1hsSzlJbDEvTWQ=,NU5TSlIyMDlybDlnRG1FUlR6OUR3c1hsSzlJbDEvTWQ=
RHluYW1pY0RsbEludm9rZVR5cGU=
bFZkdjcyQnlpbTg9 My9VcVRnUTMvRFBnZjU1aENHYmZVQT09,MUdwQWtSOGNRd21jV3FKWm1jQ1hUei9ZcTByaGFpWVU=,UUdUeXNVblpSMFpQeHByVUNjRjlYY1hsSzlJbDEvTWQ=,b2Z0SExOVTduelVlOE91Tkp6S080VGQ0OGFQMTlVMEU= S3gwcUJTOEF6Mk5KTGFUNVRudm1sdz09,bWQ2M2FFQ1BnWVZqVy9WQXFXQ1kzcGM5Tnl2a0FTVnU=,TkxiVkxzamVXYWFjV3FKWm1jQ1hUei9ZcTByaGFpWVU=,b3VrOUtsWktuajFQeHByVUNjRjlYY1hsSzlJbDEvTWQ= NUZ3eGRSUC9mTWZkVytYeVkvYjc3UT09 b3NZRUVwY2w5UEhnZjU1aENHYmZVQT09,Si9yekl0amI5VHJqRlEwVkpyeC9JOW5hUzlsYWFCbWU=
_CorExeMain
mscoree.dll
Pvvvuhhh
+2jH#*c
(/hFuy
(0j:@Ew
in{DLTj^CLd
JSh^hmzDs
^ctABJb
^csApz
hm~?`fy
gl|?lz
-.Je"#B
#.mKU^
"+hy-=
QXvn!&V
hhh%\\\
LQf0:Aq
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
{f9e64a8b-6490-4555-b072-a174116b88e4}
MAINICON
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
FANTECH
FileDescription
Setup Launcher Unicode
FileVersion
1.00.0000
InternalName
LegalCopyright
Copyright (c) 2015 Flexera Software LLC. All Rights Reserved.
OriginalFilename
InstallShield Setup.exe
ProductName
FANTECH VX7 Gaming Mouse
ProductVersion
1.00.0000
Internal Build Number
154432
ISInternalVersion
22.0.284
ISInternalDescription
Setup Launcher Unicode
VarFileInfo
Translation
Antivirus Signature
Bkav W32.Common.FA0AB075
Lionic Trojan.Win32.Stealer.12!c
Elastic malicious (high confidence)
DrWeb BackDoor.SpyBotNET.62
MicroWorld-eScan Gen:Variant.Ransom.Loki.8883
ClamAV Clean
FireEye Generic.mg.0f853625fbfedb9b
CAT-QuickHeal Clean
ALYac Gen:Variant.Ransom.Loki.8883
Malwarebytes Trojan.Crypt.MSIL
VIPRE Gen:Variant.Ransom.Loki.8883
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 0059e0d61 )
BitDefender Gen:Variant.Ransom.Loki.8883
K7GW Trojan ( 0059e0d61 )
Cybereason malicious.6f2e43
BitDefenderTheta Gen:NN.ZemsilF.36318.Mm0@ay!fXBoG
VirIT Trojan.Win32.GenusT.DOKS
Cyren W32/MSIL_Kryptik.JLT.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Kryptik.AHUA
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.MSIL.Stealer.gen
Alibaba TrojanPSW:MSIL/Stealer.86a4702f
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Ransom.636928
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:Z3JAQA5se019FchXfgE3xQ)
Emsisoft Gen:Variant.Ransom.Loki.8883 (B)
F-Secure Trojan.TR/Kryptik.rwxsr
Baidu Clean
Zillya Clean
TrendMicro TrojanSpy.Win32.REDLINE.YXDGTZ
McAfee-GW-Edition BehavesLike.Win32.Infected.jh
Trapmine malicious.high.ml.score
CMC Clean
Sophos Mal/Generic-S
Ikarus Win32.Outbreak
GData Gen:Variant.Ransom.Loki.8883
Jiangmin Clean
Webroot Clean
Avira TR/Kryptik.rwxsr
MAX malware (ai score=83)
Antiy-AVL Trojan/MSIL.Kryptik
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Ransom.Loki.D22B3
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealer.gen
Microsoft Trojan:Win32/Leonem
Google Detected
AhnLab-V3 Trojan/Win.MSILZilla.C5442250
Acronis suspicious
McAfee Artemis!0F853625FBFE
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.REDLINE.YXDGTZ
Tencent Malware.Win32.Gencirc.13ea4a35
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Kryptik.AHBB!tr
AVG Win32:PWSX-gen [Trj]
Avast Win32:PWSX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.