d7d592833ea46bb6a1402873a7456fc5

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2066-Feb-18 01:54:17
Debug artifacts C:\Users\s0ropt\Downloads\vnzclicker-master (1)\vnzclicker-master\obj\Release\vnzclicker.pdb
Comments
CompanyName
FileDescription S0H4 Clicker
FileVersion 1.0.0.0
InternalName vnzclicker.exe
LegalCopyright Copyright © 2025
LegalTrademarks
OriginalFilename vnzclicker.exe
ProductName S0H4 Clicker
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Hashes

MD5 d7d592833ea46bb6a1402873a7456fc5
SHA1 44f52d1eaa7de5a369d95f2144a256e5fce6ad10
SHA256 1508c554959afebf91452e3ac0a63b235222e9ce029d4b5dce2b8c72eef62ae0
SHA3 dce0838a46a5670cd024131e1950831f31a54007f78cc8e9c6a7d6390960da5d
SSDeep 49152:2GAIKyo+HgbY8DkRmaZ8V7FyxCSA/Bkj0:dA7yB4FSA
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2066-Feb-18 01:54:17
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x30ca00
SizeOfInitializedData 0x7600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0030E80A (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x310000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x31a000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 ff3a9e8f744b127fe5fc8cfee5c679a9
SHA1 d4d0166670699cb353d86934578655577c075e55
SHA256 3f73a96699056f8e5b77279bffcb3369841a88f9aff9b322712dcde80337b529
SHA3 693e7695f1f6b773983f243c335334d54bf7e32d5a95a3f462a8d11f1639f3b4
VirtualSize 0x30c810
VirtualAddress 0x2000
SizeOfRawData 0x30ca00
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.00792

.rsrc

MD5 579ac7904c53c129e32a83f3b4cdb0d6
SHA1 965c699d265aed4feeeb84c4f126afaa5af21269
SHA256 c746b98fab4107145d72e305450a701c720ceac58923a7512a6d2eb2c40918f1
SHA3 852bdcfb8b7fb2987582f6529cc055a81f11bb3abd2c059623291a713e553d50
VirtualSize 0x7288
VirtualAddress 0x310000
SizeOfRawData 0x7400
PointerToRawData 0x30cc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.85045

.reloc

MD5 0320ddefb021657e27b2a609c1ceaea1
SHA1 0387bdafba5582e751f9a82b68479107848af063
SHA256 fadbf53fe1c262eec836d959cb6a58493f09b68c2a9186563784091fdbb49630
SHA3 c48f413a3ec61a570a4b8583da37febd747f7b17952ed9408eca4f6aed3f40a8
VirtualSize 0xc
VirtualAddress 0x318000
SizeOfRawData 0x200
PointerToRawData 0x314000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0980042

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x6940
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.94762
MD5 023c3fb029723ac8bfd443758d39c131
SHA1 5d81640ef1d9b5a821503d05485ab0ef0980d4e0
SHA256 ff6a04d71b8fd205c7a42ebca3aef8bb34dde26c8278424975648e51f1f83329
SHA3 45eacf4ad65e228d07060ead7b8198eb8a23111fc5fa8dc0272bf9ce490b56de

32512

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.51664
MD5 42fb47885c8f0b75b172268c5c05e967
SHA1 a054ef81fc234fabb1e575dfc2f6d1907b47d0b0
SHA256 75b1bb194606e321d1d3f96d6011a0a7a5b1d759ffaa950b44800058ad0b2e56
SHA3 3c0df4c054f5ca1c7f1c19ee2350efb784fc65b8457adea5d33e2166389b1c51

1 (#2)

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x334
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.27809
MD5 70032a916846132f29d64c4a03e230a2
SHA1 b91d80bace7a615f8a070c96ea711c4cf9ef890d
SHA256 825d13b6ba351fdc23780e4f95c9d6c66b9947705e86292ec0aa37c1ae1bd13b
SHA3 f84ebdc5ef1a5194cb1448996639dc6537005f96a6bbf1783f16a3a80496fbf0

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x4c9
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00389
MD5 b65c20d7cd0bc1890db81c198ea14dae
SHA1 f313dc46cceab1c2c5faacd803afb107be585fcf
SHA256 594b5b5c4c1feec12b3057d116958fea1504c338e55624fd8d7106947ba2c3ff
SHA3 2597951e83b932a84bc5948fb17581a0b7b494962eaf364f82e13564d1ceaea3

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription S0H4 Clicker
FileVersion (#2) 1.0.0.0
InternalName vnzclicker.exe
LegalCopyright Copyright © 2025
LegalTrademarks
OriginalFilename vnzclicker.exe
ProductName S0H4 Clicker
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2070-Sep-11 11:33:46
Version 0.0
SizeofData 117
AddressOfRawData 0x30e740
PointerToRawData 0x30c940
Referenced File C:\Users\s0ropt\Downloads\vnzclicker-master (1)\vnzclicker-master\obj\Release\vnzclicker.pdb

UNKNOWN

Characteristics 0
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

RICH Header

Errors

[*] Warning: Please edit the configuration file with your VirusTotal API key. [!] Error: Could not load yara_rules/bitcoin.yara! Could not load company_names.yara! [!] Error: Could not load yara_rules/monero.yara! [!] Error: Could not load yara_rules/compilers.yara! [!] Error: Could not load yara_rules/findcrypt.yara! [!] Error: Could not load yara_rules/suspicious_strings.yara! [!] Error: Could not load yara_rules/domains.yara! [!] Error: Could not load yara_rules/peid.yara!