×
This file seems to be a .NET executable .
Sadly, Manalyzer's analysis techniques were designed for native code, so it's likely that this report won't tell you much.
Sorry!
Architecture
IMAGE_FILE_MACHINE_I386
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date
2066-Feb-18 01:54:17
Debug artifacts
C:\Users\s0ropt\Downloads\vnzclicker-master (1)\vnzclicker-master\obj\Release\vnzclicker.pdb
Comments
CompanyName
FileDescription
S0H4 Clicker
FileVersion
1.0.0.0
InternalName
vnzclicker.exe
LegalCopyright
Copyright © 2025
LegalTrademarks
OriginalFilename
vnzclicker.exe
ProductName
S0H4 Clicker
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
MD5
d7d592833ea46bb6a1402873a7456fc5
SHA1
44f52d1eaa7de5a369d95f2144a256e5fce6ad10
SHA256
1508c554959afebf91452e3ac0a63b235222e9ce029d4b5dce2b8c72eef62ae0
SHA3
dce0838a46a5670cd024131e1950831f31a54007f78cc8e9c6a7d6390960da5d
SSDeep
49152:2GAIKyo+HgbY8DkRmaZ8V7FyxCSA/Bkj0:dA7yB4FSA
Imports Hash
f34d5f2d4577ed6d9ceec516c1f5a744
e_magic
MZ
e_cblp
0x90
e_cp
0x3
e_crlc
0
e_cparhdr
0x4
e_minalloc
0
e_maxalloc
0xffff
e_ss
0
e_sp
0xb8
e_csum
0
e_ip
0
e_cs
0
e_ovno
0
e_oemid
0
e_oeminfo
0
e_lfanew
0x80
Signature
PE
Machine
IMAGE_FILE_MACHINE_I386
NumberofSections
3
TimeDateStamp
2066-Feb-18 01:54:17
PointerToSymbolTable
0
NumberOfSymbols
0
SizeOfOptionalHeader
0xe0
Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Magic
PE32
LinkerVersion
48.0
SizeOfCode
0x30ca00
SizeOfInitializedData
0x7600
SizeOfUninitializedData
0
AddressOfEntryPoint
0x0030E80A (Section: .text)
BaseOfCode
0x2000
BaseOfData
0x310000
ImageBase
0x400000
SectionAlignment
0x2000
FileAlignment
0x200
OperatingSystemVersion
4.0
ImageVersion
0.0
SubsystemVersion
6.0
Win32VersionValue
0
SizeOfImage
0x31a000
SizeOfHeaders
0x200
Checksum
0
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve
0x100000
SizeofStackCommit
0x1000
SizeofHeapReserve
0x100000
SizeofHeapCommit
0x1000
LoaderFlags
0
NumberOfRvaAndSizes
16
MD5
ff3a9e8f744b127fe5fc8cfee5c679a9
SHA1
d4d0166670699cb353d86934578655577c075e55
SHA256
3f73a96699056f8e5b77279bffcb3369841a88f9aff9b322712dcde80337b529
SHA3
693e7695f1f6b773983f243c335334d54bf7e32d5a95a3f462a8d11f1639f3b4
VirtualSize
0x30c810
VirtualAddress
0x2000
SizeOfRawData
0x30ca00
PointerToRawData
0x200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy
6.00792
MD5
579ac7904c53c129e32a83f3b4cdb0d6
SHA1
965c699d265aed4feeeb84c4f126afaa5af21269
SHA256
c746b98fab4107145d72e305450a701c720ceac58923a7512a6d2eb2c40918f1
SHA3
852bdcfb8b7fb2987582f6529cc055a81f11bb3abd2c059623291a713e553d50
VirtualSize
0x7288
VirtualAddress
0x310000
SizeOfRawData
0x7400
PointerToRawData
0x30cc00
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy
7.85045
MD5
0320ddefb021657e27b2a609c1ceaea1
SHA1
0387bdafba5582e751f9a82b68479107848af063
SHA256
fadbf53fe1c262eec836d959cb6a58493f09b68c2a9186563784091fdbb49630
SHA3
c48f413a3ec61a570a4b8583da37febd747f7b17952ed9408eca4f6aed3f40a8
VirtualSize
0xc
VirtualAddress
0x318000
SizeOfRawData
0x200
PointerToRawData
0x314000
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy
0.0980042
Type
RT_ICON
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x6940
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
7.94762
MD5
023c3fb029723ac8bfd443758d39c131
SHA1
5d81640ef1d9b5a821503d05485ab0ef0980d4e0
SHA256
ff6a04d71b8fd205c7a42ebca3aef8bb34dde26c8278424975648e51f1f83329
SHA3
45eacf4ad65e228d07060ead7b8198eb8a23111fc5fa8dc0272bf9ce490b56de
Type
RT_GROUP_ICON
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x14
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
1.51664
MD5
42fb47885c8f0b75b172268c5c05e967
SHA1
a054ef81fc234fabb1e575dfc2f6d1907b47d0b0
SHA256
75b1bb194606e321d1d3f96d6011a0a7a5b1d759ffaa950b44800058ad0b2e56
SHA3
3c0df4c054f5ca1c7f1c19ee2350efb784fc65b8457adea5d33e2166389b1c51
Type
RT_VERSION
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x334
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
3.27809
MD5
70032a916846132f29d64c4a03e230a2
SHA1
b91d80bace7a615f8a070c96ea711c4cf9ef890d
SHA256
825d13b6ba351fdc23780e4f95c9d6c66b9947705e86292ec0aa37c1ae1bd13b
SHA3
f84ebdc5ef1a5194cb1448996639dc6537005f96a6bbf1783f16a3a80496fbf0
Type
RT_MANIFEST
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x4c9
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
5.00389
MD5
b65c20d7cd0bc1890db81c198ea14dae
SHA1
f313dc46cceab1c2c5faacd803afb107be585fcf
SHA256
594b5b5c4c1feec12b3057d116958fea1504c338e55624fd8d7106947ba2c3ff
SHA3
2597951e83b932a84bc5948fb17581a0b7b494962eaf364f82e13564d1ceaea3
Signature
0xfeef04bd
StructVersion
0x10000
FileVersion
1.0.0.0
ProductVersion
1.0.0.0
FileFlags
(EMPTY)
FileOs
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType
VFT_APP
Language
UNKNOWN
Comments
CompanyName
FileDescription
S0H4 Clicker
FileVersion (#2)
1.0.0.0
InternalName
vnzclicker.exe
LegalCopyright
Copyright © 2025
LegalTrademarks
OriginalFilename
vnzclicker.exe
ProductName
S0H4 Clicker
ProductVersion (#2)
1.0.0.0
Assembly Version
1.0.0.0
Characteristics
0
TimeDateStamp
2070-Sep-11 11:33:46
Version
0.0
SizeofData
117
AddressOfRawData
0x30e740
PointerToRawData
0x30c940
Referenced File
C:\Users\s0ropt\Downloads\vnzclicker-master (1)\vnzclicker-master\obj\Release\vnzclicker.pdb
Characteristics
0
TimeDateStamp
1970-Jan-01 00:00:00
Version
0.0
SizeofData
0
AddressOfRawData
0
PointerToRawData
0
[*] Warning: Please edit the configuration file with your VirusTotal API key.
[!] Error: Could not load yara_rules/bitcoin.yara!
Could not load company_names.yara!
[!] Error: Could not load yara_rules/monero.yara!
[!] Error: Could not load yara_rules/compilers.yara!
[!] Error: Could not load yara_rules/findcrypt.yara!
[!] Error: Could not load yara_rules/suspicious_strings.yara!
[!] Error: Could not load yara_rules/domains.yara!
[!] Error: Could not load yara_rules/peid.yara!