×
This file seems to be a .NET executable .
Sadly, Manalyzer's analysis techniques were designed for native code, so it's likely that this report won't tell you much.
Sorry!
Architecture
IMAGE_FILE_MACHINE_I386
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date
2016-Nov-18 23:00:14
Debug artifacts
c:\users\david\documents\visual studio 2015\Projects\Crackme 2\Crackme 2\obj\Release\Crackme 2.pdb
Comments
CompanyName
FileDescription
Crackme 2
FileVersion
1.0.0.0
InternalName
Crackme 2.exe
LegalCopyright
Copyright © 2016
LegalTrademarks
OriginalFilename
Crackme 2.exe
ProductName
Crackme 2
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Info
Matching compiler(s):
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Suspicious
VirusTotal score: 1/56 (Scanned on 2016-12-18 02:58:11)
Baidu:
Win32.Trojan.WisdomEyes.16070401.9500.9640
MD5
2e07e93b753ac881263f9caf8d191c11
SHA1
eb414bd4dc145d34a5462e8d488b58fe64daa493
SHA256
aa20250a7e4dbe29bacb58d3365a7e91b790ff6b6f708b6c44ae8238f7c00b2b
SHA3
a36a3c1447317a8900f2ad49b825247a022ec0c6b31e6487393eaac668cde5d1
SSDeep
192:5oYyYrrt0PGwsQos/yQ1LFoRnGrYsIW1Y8HGupDWpo3AMCR/TNWf2dC:9nRwbqiL4nGrY2HGu5j3Kbgf2d
Imports Hash
f34d5f2d4577ed6d9ceec516c1f5a744
e_magic
MZ
e_cblp
0x90
e_cp
0x3
e_crlc
0
e_cparhdr
0x4
e_minalloc
0
e_maxalloc
0xffff
e_ss
0
e_sp
0xb8
e_csum
0
e_ip
0
e_cs
0
e_ovno
0
e_oemid
0
e_oeminfo
0
e_lfanew
0x80
Signature
PE
Machine
IMAGE_FILE_MACHINE_I386
NumberofSections
3
TimeDateStamp
2016-Nov-18 23:00:14
PointerToSymbolTable
0
NumberOfSymbols
0
SizeOfOptionalHeader
0xe0
Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Magic
PE32
LinkerVersion
80.0
SizeOfCode
0x2e00
SizeOfInitializedData
0x800
SizeOfUninitializedData
0
AddressOfEntryPoint
0x00004D2A (Section: .text)
BaseOfCode
0x2000
BaseOfData
0x6000
ImageBase
0x400000
SectionAlignment
0x2000
FileAlignment
0x200
OperatingSystemVersion
4.0
ImageVersion
0.0
SubsystemVersion
6.0
Win32VersionValue
0
SizeOfImage
0xa000
SizeOfHeaders
0x200
Checksum
0
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve
0x100000
SizeofStackCommit
0x1000
SizeofHeapReserve
0x100000
SizeofHeapCommit
0x1000
LoaderFlags
0
NumberOfRvaAndSizes
16
MD5
a0fb0f5c4e966fb32db424636c11864f
SHA1
8ed02d656dcf1370d25e0386ea12692ac0d2b3ce
SHA256
c9b75f62d6a204c325a98a3dee3b23f258d892d8528633714c01f175940d314d
SHA3
179036c1d0b19c5548db6b78e97eb38dd94db7bda3949996ae6d65832c72206a
VirtualSize
0x2d30
VirtualAddress
0x2000
SizeOfRawData
0x2e00
PointerToRawData
0x200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy
5.62169
MD5
405ca322826ff6174463b944399465ba
SHA1
d3a3ddd7dc32e6bf544a14b9e22e5c2c312ed709
SHA256
0f3c6bfcaf4535f0873027212321713f2b32427a1ba731ce8d15696bbcee9913
SHA3
d10f42dde382851ff56d74de62f648923581288ed19cbe8000c0ef26be13979b
VirtualSize
0x5ac
VirtualAddress
0x6000
SizeOfRawData
0x600
PointerToRawData
0x3000
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy
4.07103
MD5
9b447f29fcba3ea392afdced086d439a
SHA1
7d76bab842187ee3abf5c072dee1a2eaa33bb5f7
SHA256
74eb972c0713fc6925d9c54bdecc4c771273eec244a7c159c1d4665acfda2aa6
SHA3
089692a8c8a4e6384f41736ae95f41dae38ae44752f63d6410062cd0ec0ae9dd
VirtualSize
0xc
VirtualAddress
0x8000
SizeOfRawData
0x200
PointerToRawData
0x3600
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy
0.0815394
Type
RT_VERSION
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x31c
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
3.28549
MD5
4edce84dc7cfafe49745a79227357493
SHA1
8d0384f1ff388e72391bf607c90e16895c598e66
SHA256
b6cb4bb2effed4bfe78c2ffd20acd22598050ddc086cd6e5ff2d59e3b9e65954
SHA3
dc7524ce474548ff5ffdc4a5b4dea887473babd1a52cb2370abeef28312cd3a7
Type
RT_MANIFEST
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x1ea
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
5.00112
MD5
b7db84991f23a680df8e95af8946f9c9
SHA1
cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256
539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3
4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff
Signature
0xfeef04bd
StructVersion
0x10000
FileVersion
1.0.0.0
ProductVersion
1.0.0.0
FileFlags
(EMPTY)
FileOs
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType
VFT_APP
Language
UNKNOWN
Comments
CompanyName
FileDescription
Crackme 2
FileVersion (#2)
1.0.0.0
InternalName
Crackme 2.exe
LegalCopyright
Copyright © 2016
LegalTrademarks
OriginalFilename
Crackme 2.exe
ProductName
Crackme 2
ProductVersion (#2)
1.0.0.0
Assembly Version
1.0.0.0
Characteristics
0
TimeDateStamp
2016-Nov-18 23:00:14
Version
0.0
SizeofData
284
AddressOfRawData
0x4bbc
PointerToRawData
0x2dbc
Referenced File
c:\users\david\documents\visual studio 2015\Projects\Crackme 2\Crackme 2\obj\Release\Crackme 2.pdb