×
This file seems to be a .NET executable .
Sadly, Manalyzer's analysis techniques were designed for native code, so it's likely that this report won't tell you much.
Sorry!
Architecture
IMAGE_FILE_MACHINE_I386
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date
2020-Jul-10 04:32:30
Debug artifacts
F:\Temp\source_code\ssmms_v13\obj\Release\Web_Browser.pdb
Comments
CompanyName
FileDescription
Web_Browser
FileVersion
1.0.0.0
InternalName
Web_Browser.exe
LegalCopyright
Copyright © 2015
LegalTrademarks
OriginalFilename
Web_Browser.exe
ProductName
Web_Browser
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Info
Matching compiler(s):
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Info
Interesting strings found in the binary:
Contains domain names:
dosomethingman.com
gmail.com
https://lb3.dosomethingman.com
https://lb3.dosomethingman.com/axjqw93d387asd23/ea053942f1d37f1ef334005b26f758e8?v
https://onlinebooking.sand.telangana.gov.in
https://onlinebooking.sand.telangana.gov.in/Masters/Home.aspx
lb3.dosomethingman.com
onlinebooking.sand.telangana.gov
sand.telangana.gov
telangana.gov
Suspicious
No VirusTotal score.
This file has never been scanned on VirusTotal.
MD5
67d733f9c7f1ccd3be8cd1c70b320eb2
SHA1
eb2a570aa0099bac3f303de32a7a9a49a19ed649
SHA256
afddaa5809ea37087fa24e21b76f4f8ad9f570b161a71d5404767ce8b84d8d94
SHA3
df917262340f425fa452fec1b1f80f8df9bbd05f295b2b7a720afb62fef3663a
SSDeep
3072:usqoZqdDi9fzbYsIzzhyZewYG1g+Zh89LHwdSOy/dSpi:u8VvYs2zhyZZgogk8dSp
Imports Hash
f34d5f2d4577ed6d9ceec516c1f5a744
e_magic
MZ
e_cblp
0x90
e_cp
0x3
e_crlc
0
e_cparhdr
0x4
e_minalloc
0
e_maxalloc
0xffff
e_ss
0
e_sp
0xb8
e_csum
0
e_ip
0
e_cs
0
e_ovno
0
e_oemid
0
e_oeminfo
0
e_lfanew
0x80
Signature
PE
Machine
IMAGE_FILE_MACHINE_I386
NumberofSections
3
TimeDateStamp
2020-Jul-10 04:32:30
PointerToSymbolTable
0
NumberOfSymbols
0
SizeOfOptionalHeader
0xe0
Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Magic
PE32
LinkerVersion
48.0
SizeOfCode
0x26000
SizeOfInitializedData
0x800
SizeOfUninitializedData
0
AddressOfEntryPoint
0x00027FD6 (Section: .text)
BaseOfCode
0x2000
BaseOfData
0x28000
ImageBase
0x400000
SectionAlignment
0x2000
FileAlignment
0x200
OperatingSystemVersion
4.0
ImageVersion
0.0
SubsystemVersion
6.0
Win32VersionValue
0
SizeOfImage
0x2c000
SizeOfHeaders
0x200
Checksum
0
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve
0x100000
SizeofStackCommit
0x1000
SizeofHeapReserve
0x100000
SizeofHeapCommit
0x1000
LoaderFlags
0
NumberOfRvaAndSizes
16
MD5
8137e63709a0fbc115233a4f4bca4514
SHA1
342e1f69a5d8ecee2f45edf75730cbfebed88b1a
SHA256
5b48a985531b93bdca25bd5acd2caaf433b56e48767d597eedb771d45ba60374
SHA3
235d191e8ae3cbc759d9b3d18acbf176699d77cc28c2022e66708d8f9c28b27b
VirtualSize
0x25fdc
VirtualAddress
0x2000
SizeOfRawData
0x26000
PointerToRawData
0x200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy
7.33469
MD5
4ceeca0e07e388472d5e77611211c82c
SHA1
d5b630476e4d753787ec70b296634e32f12fb36f
SHA256
8d362ba123ad9e9e1470678cce78f1445acf9daf4812c506776fd08232a7e11a
SHA3
d06a3d597b8290124015990c142e983a289cce51ad9d8950137f84367d293263
VirtualSize
0x5bc
VirtualAddress
0x28000
SizeOfRawData
0x600
PointerToRawData
0x26200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy
4.13227
MD5
26043f6d2a03330f24e145686a6dbca0
SHA1
b4af165241aed1f939722296c4499fad9688c816
SHA256
ec8a4b546c78c1c7d60e034cff01d1d0ef8f741060808fc0d9e6de7ff9c33e4b
SHA3
e80d3f57f2e5828a0e9b5811478d373be58a96c741f34b8327d940b9494304a9
VirtualSize
0xc
VirtualAddress
0x2a000
SizeOfRawData
0x200
PointerToRawData
0x26800
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy
0.10191
Type
RT_VERSION
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x32c
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
3.30133
MD5
64f10b261727642c49303c03eb1f2f64
SHA1
e3a71cce1159ab3dfc28e02a3c8f95957de5f7d5
SHA256
5fc3a5f153d799d374b259349f4c607449dc323606bfe5be4be89535e97c009a
SHA3
66ab6feff27feae797cb897dcf5c67621e5d54ad0221b548c44a1dbc202a6a0f
Type
RT_MANIFEST
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x1ea
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
5.00112
MD5
b7db84991f23a680df8e95af8946f9c9
SHA1
cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256
539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3
4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff
Signature
0xfeef04bd
StructVersion
0x10000
FileVersion
1.0.0.0
ProductVersion
1.0.0.0
FileFlags
(EMPTY)
FileOs
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType
VFT_APP
Language
UNKNOWN
Comments
CompanyName
FileDescription
Web_Browser
FileVersion (#2)
1.0.0.0
InternalName
Web_Browser.exe
LegalCopyright
Copyright © 2015
LegalTrademarks
OriginalFilename
Web_Browser.exe
ProductName
Web_Browser
ProductVersion (#2)
1.0.0.0
Assembly Version
1.0.0.0
Characteristics
0
TimeDateStamp
2020-Jul-10 04:32:30
Version
0.0
SizeofData
284
AddressOfRawData
0x27e68
PointerToRawData
0x26068
Referenced File
F:\Temp\source_code\ssmms_v13\obj\Release\Web_Browser.pdb