696a70113e945b7118b26e421861c836

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2063-Nov-24 10:26:50
Debug artifacts C:\Users\moham\source\repos\Challenge\Challenge\obj\Release\Challenge.pdb
Comments
CompanyName
FileDescription Challenge
FileVersion 1.0.0.0
InternalName Challenge.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename Challenge.exe
ProductName Challenge
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
Suspicious VirusTotal score: 1/70 (Scanned on 2020-12-09 16:53:52) APEX: Malicious

Hashes

MD5 696a70113e945b7118b26e421861c836
SHA1 8e0cfd0372b7f3d30989c812d656ca99c6ba6ef5
SHA256 1d8fcc46a6dee13c2eb1fa022a49aac94895e31fc07f733f56854da8950584e8
SHA3 9b8adb34d66718b88524462fc1d515477db6a005b98234be193345a384e83613
SSDeep 192:m+Sx976Ypz9nIo9Ps6HKQFZj9fPS1pXRs:mf76wz9nJPs6HKQPpfPS1pXR
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2063-Nov-24 10:26:50
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x1800
SizeOfInitializedData 0x800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000371A (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x4000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x8000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 a7f94ca970dcbf33db2f62cd393f3883
SHA1 936f7a6c9c246dda2b1654e71e3a918442b47028
SHA256 138239340a1b7ba9ae88e68e62c01525b32ce147a0a47cdf5712e6c5b739f377
SHA3 56b5f59d317afdce911bd789ef5d295a8227fdaae356b2aa80145a9aed3b63d6
VirtualSize 0x1720
VirtualAddress 0x2000
SizeOfRawData 0x1800
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.37664

.rsrc

MD5 a262858a301c411044f9d0bd6da2aaab
SHA1 9cb13b30088cdb31c4597808e365176922a2fdac
SHA256 acae356d2d3cc0c085f8b7d42e933dcdc808000b38b0fdcf0195948a0dfde14e
SHA3 dfeb8aa1d40b2177fa328f57fbe73932151e88534405019c5d11e79179c13a3e
VirtualSize 0x5ac
VirtualAddress 0x4000
SizeOfRawData 0x600
PointerToRawData 0x1a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.06023

.reloc

MD5 2e7ddd4bcdbdc4168b4df3094ba9729e
SHA1 0b9dfead06354e847b87ba27b3e8873fe90e688c
SHA256 8aa91db93aa65a7da2979705cc08325d787e8c572b512f86ef42489b561587a1
SHA3 fbb7122435283eeab103afcd2a623d14b9f36d3de3c5d9037538a6c904497969
VirtualSize 0xc
VirtualAddress 0x6000
SizeOfRawData 0x200
PointerToRawData 0x2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0815394

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x31c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.24817
MD5 d616c8eb6d1e676a8fa30cee004f1cdb
SHA1 c926d14ea658001a21fb231cd429c6baf2c0ebc6
SHA256 59241773f588ad2dfe6ac652b9baa49c0f52238cf316c38309b37423973e189c
SHA3 46f0edf6d323bca4414e9eeac269285ae2678514e3caed19e9e2142deff3d98a

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription Challenge
FileVersion (#2) 1.0.0.0
InternalName Challenge.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename Challenge.exe
ProductName Challenge
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2051-Feb-23 00:07:12
Version 0.0
SizeofData 98
AddressOfRawData 0x3664
PointerToRawData 0x1864
Referenced File C:\Users\moham\source\repos\Challenge\Challenge\obj\Release\Challenge.pdb

UNKNOWN

Characteristics 0
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->