690472fd378df1f96be9d642f9de36d8

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2048-Oct-11 00:44:05
Debug artifacts G_Active_Key.pdb
Comments
CompanyName
FileDescription G_Active_Key
FileVersion 1.1.1.1
InternalName G_Active_Key.exe
LegalCopyright Copyright © 2023
LegalTrademarks
OriginalFilename G_Active_Key.exe
ProductName G_Active_Key
ProductVersion 1.1.1.1
Assembly Version 1.0.0.5

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
Info Interesting strings found in the binary: Contains domain names:
  • http://tempuri.org
  • tempuri.org
Info Cryptographic algorithms detected in the binary: Uses constants related to MD5
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 690472fd378df1f96be9d642f9de36d8
SHA1 42f619cdabc1f94af01ca6bba2294518d97010ab
SHA256 92e5331947676bb4d5e53f37b602a393d9243c00bbce5665902855fb8ab710ed
SHA3 f95aa85d80ba8fe40c7d9095e445f430cc1d98479a017c13ea51ec0c5203652a
SSDeep 6144:9vctEGPjqnxmFMTg43Il2gSViMGX28IaXRQ6zT065Ng:WtVjL4IhSVRGX2MT7g
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2048-Oct-11 00:44:05
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x5ec00
SizeOfInitializedData 0x800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00060A3E (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x62000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x66000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 15

.text

MD5 aaf0958fd10a9929b63a65b8b23f7280
SHA1 e7c02f8e572a12801fcf7c0cdffbd881ee8a39c0
SHA256 19ad38e48131bd814b384c5546f9b5a3ddd9a5eaba782a6819b93f82a72b3512
SHA3 e53e4d8a51db8e6c7d465df897fc736060f11d219ac6f7ff95cee5f646ec062d
VirtualSize 0x5ea44
VirtualAddress 0x2000
SizeOfRawData 0x5ec00
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.96541

.rsrc

MD5 7d9b662518732379de2e8e0d83d6aa4a
SHA1 9c5664d808637e3a8f2014968dddbf76b3c7e4e2
SHA256 1b6b8dfb316f66f075e26dc3e787ec3a73ca241ad226ca45b37fe3475a00e31c
SHA3 2e715888b239f673b8a4fd43e917daab60868efca60e138b0f6d526b9d1683fa
VirtualSize 0x5c8
VirtualAddress 0x62000
SizeOfRawData 0x600
PointerToRawData 0x5ee00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.16205

.reloc

MD5 f2d5cd17a8589aff620f9a73f19001e5
SHA1 bcf2a8efc3039a54a80d719e0bd72b60cd9359e2
SHA256 9863b0914537aaeb0e39138b3f28aed7c34b9a61597a3bdd44e31a0ea8f1aeb7
SHA3 a2f719e66dc86883207c29031dbdb354852d0379ec32a5c6825aff422b95137d
VirtualSize 0xc
VirtualAddress 0x64000
SizeOfRawData 0x200
PointerToRawData 0x5f400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0815394

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x33c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.35276
MD5 df86586c75fed4e040fe5a95d67e41eb
SHA1 21eda62e699063d0b6f1f23b44f1db351e2cc1bd
SHA256 458a7ceb22f8298c131fb3f68ffdfdb4c01f53cf951a48f361446a832adc7436
SHA3 d0629eabd16091030279e50786bdc10783c108ab5c4a23bf2546ced8d83c594c

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.1.1.1
ProductVersion 1.1.1.1
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription G_Active_Key
FileVersion (#2) 1.1.1.1
InternalName G_Active_Key.exe
LegalCopyright Copyright © 2023
LegalTrademarks
OriginalFilename G_Active_Key.exe
ProductName G_Active_Key
ProductVersion (#2) 1.1.1.1
Assembly Version 1.0.0.5
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
SizeofData 41
AddressOfRawData 0x609ba
PointerToRawData 0x5ebba
Referenced File G_Active_Key.pdb

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->