×
This file seems to be a .NET executable .
Sadly, Manalyzer's analysis techniques were designed for native code, so it's likely that this report won't tell you much.
Sorry!
Architecture
IMAGE_FILE_MACHINE_I386
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date
2048-Oct-11 00:44:05
Debug artifacts
G_Active_Key.pdb
Comments
CompanyName
FileDescription
G_Active_Key
FileVersion
1.1.1.1
InternalName
G_Active_Key.exe
LegalCopyright
Copyright © 2023
LegalTrademarks
OriginalFilename
G_Active_Key.exe
ProductName
G_Active_Key
ProductVersion
1.1.1.1
Assembly Version
1.0.0.5
Info
Matching compiler(s):
Microsoft Visual C# v7.0 / Basic .NET
Info
Interesting strings found in the binary:
Contains domain names:
http://tempuri.org
tempuri.org
Info
Cryptographic algorithms detected in the binary:
Uses constants related to MD5
Suspicious
No VirusTotal score.
This file has never been scanned on VirusTotal.
MD5
690472fd378df1f96be9d642f9de36d8
SHA1
42f619cdabc1f94af01ca6bba2294518d97010ab
SHA256
92e5331947676bb4d5e53f37b602a393d9243c00bbce5665902855fb8ab710ed
SHA3
f95aa85d80ba8fe40c7d9095e445f430cc1d98479a017c13ea51ec0c5203652a
SSDeep
6144:9vctEGPjqnxmFMTg43Il2gSViMGX28IaXRQ6zT065Ng:WtVjL4IhSVRGX2MT7g
Imports Hash
f34d5f2d4577ed6d9ceec516c1f5a744
e_magic
MZ
e_cblp
0x90
e_cp
0x3
e_crlc
0
e_cparhdr
0x4
e_minalloc
0
e_maxalloc
0xffff
e_ss
0
e_sp
0xb8
e_csum
0
e_ip
0
e_cs
0
e_ovno
0
e_oemid
0
e_oeminfo
0
e_lfanew
0x80
Signature
PE
Machine
IMAGE_FILE_MACHINE_I386
NumberofSections
3
TimeDateStamp
2048-Oct-11 00:44:05
PointerToSymbolTable
0
NumberOfSymbols
0
SizeOfOptionalHeader
0xe0
Characteristics
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
Magic
PE32
LinkerVersion
48.0
SizeOfCode
0x5ec00
SizeOfInitializedData
0x800
SizeOfUninitializedData
0
AddressOfEntryPoint
0x00060A3E (Section: .text)
BaseOfCode
0x2000
BaseOfData
0x62000
ImageBase
0x400000
SectionAlignment
0x2000
FileAlignment
0x200
OperatingSystemVersion
4.0
ImageVersion
0.0
SubsystemVersion
4.0
Win32VersionValue
0
SizeOfImage
0x66000
SizeOfHeaders
0x200
Checksum
0
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve
0x100000
SizeofStackCommit
0x1000
SizeofHeapReserve
0x100000
SizeofHeapCommit
0x1000
LoaderFlags
0
NumberOfRvaAndSizes
15
MD5
aaf0958fd10a9929b63a65b8b23f7280
SHA1
e7c02f8e572a12801fcf7c0cdffbd881ee8a39c0
SHA256
19ad38e48131bd814b384c5546f9b5a3ddd9a5eaba782a6819b93f82a72b3512
SHA3
e53e4d8a51db8e6c7d465df897fc736060f11d219ac6f7ff95cee5f646ec062d
VirtualSize
0x5ea44
VirtualAddress
0x2000
SizeOfRawData
0x5ec00
PointerToRawData
0x200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy
5.96541
MD5
7d9b662518732379de2e8e0d83d6aa4a
SHA1
9c5664d808637e3a8f2014968dddbf76b3c7e4e2
SHA256
1b6b8dfb316f66f075e26dc3e787ec3a73ca241ad226ca45b37fe3475a00e31c
SHA3
2e715888b239f673b8a4fd43e917daab60868efca60e138b0f6d526b9d1683fa
VirtualSize
0x5c8
VirtualAddress
0x62000
SizeOfRawData
0x600
PointerToRawData
0x5ee00
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy
4.16205
MD5
f2d5cd17a8589aff620f9a73f19001e5
SHA1
bcf2a8efc3039a54a80d719e0bd72b60cd9359e2
SHA256
9863b0914537aaeb0e39138b3f28aed7c34b9a61597a3bdd44e31a0ea8f1aeb7
SHA3
a2f719e66dc86883207c29031dbdb354852d0379ec32a5c6825aff422b95137d
VirtualSize
0xc
VirtualAddress
0x64000
SizeOfRawData
0x200
PointerToRawData
0x5f400
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy
0.0815394
Type
RT_VERSION
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x33c
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
3.35276
MD5
df86586c75fed4e040fe5a95d67e41eb
SHA1
21eda62e699063d0b6f1f23b44f1db351e2cc1bd
SHA256
458a7ceb22f8298c131fb3f68ffdfdb4c01f53cf951a48f361446a832adc7436
SHA3
d0629eabd16091030279e50786bdc10783c108ab5c4a23bf2546ced8d83c594c
Type
RT_MANIFEST
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x1ea
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
5.00112
MD5
b7db84991f23a680df8e95af8946f9c9
SHA1
cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256
539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3
4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff
Signature
0xfeef04bd
StructVersion
0x10000
FileVersion
1.1.1.1
ProductVersion
1.1.1.1
FileFlags
(EMPTY)
FileOs
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType
VFT_APP
Language
UNKNOWN
Comments
CompanyName
FileDescription
G_Active_Key
FileVersion (#2)
1.1.1.1
InternalName
G_Active_Key.exe
LegalCopyright
Copyright © 2023
LegalTrademarks
OriginalFilename
G_Active_Key.exe
ProductName
G_Active_Key
ProductVersion (#2)
1.1.1.1
Assembly Version
1.0.0.5
Characteristics
0
TimeDateStamp
1970-Jan-01 00:00:00
Version
0.0
SizeofData
41
AddressOfRawData
0x609ba
PointerToRawData
0x5ebba
Referenced File
G_Active_Key.pdb