×
This file seems to be a .NET executable .
Sadly, Manalyzer's analysis techniques were designed for native code, so it's likely that this report won't tell you much.
Sorry!
Architecture
IMAGE_FILE_MACHINE_I386
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date
2041-May-28 20:41:39
Debug artifacts
C:\Excel_Dev25\SpreadSheet\UnzipWatcher\obj\Release\UnzipWatcher.pdb
Comments
CompanyName
FileDescription
UltimateFileViewer
FileVersion
1.0.0.0
InternalName
UnzipWatcher.exe
LegalCopyright
Copyright © 2023
LegalTrademarks
OriginalFilename
UnzipWatcher.exe
ProductName
UltimateFileViewer
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
MD5
8db6ee1d722775263dd3ae5ee273badb
SHA1
11e0b4cc2287ea27928ee80dfc06126f2bef86e6
SHA256
1781b78bcdab1fb168a4f56dd5f2ed9c50025be92731edb8d2eb54d861fd31de
SHA3
60f57c839b7e752c7921f819464639ccb1f03b62ff0b531edebe96323f0ca658
SSDeep
3072:8jE7UQbvvLykqAATHDCo2mhxIuPuTMEwVz:IQbHLy7AIeOIuPf
Imports Hash
f34d5f2d4577ed6d9ceec516c1f5a744
e_magic
MZ
e_cblp
0x90
e_cp
0x3
e_crlc
0
e_cparhdr
0x4
e_minalloc
0
e_maxalloc
0xffff
e_ss
0
e_sp
0xb8
e_csum
0
e_ip
0
e_cs
0
e_ovno
0
e_oemid
0
e_oeminfo
0
e_lfanew
0x80
Signature
PE
Machine
IMAGE_FILE_MACHINE_I386
NumberofSections
3
TimeDateStamp
2041-May-28 20:41:39
PointerToSymbolTable
0
NumberOfSymbols
0
SizeOfOptionalHeader
0xe0
Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Magic
PE32
LinkerVersion
48.0
SizeOfCode
0x1c800
SizeOfInitializedData
0x800
SizeOfUninitializedData
0
AddressOfEntryPoint
0x0001E61E (Section: .text)
BaseOfCode
0x2000
BaseOfData
0x20000
ImageBase
0x400000
SectionAlignment
0x2000
FileAlignment
0x200
OperatingSystemVersion
4.0
ImageVersion
0.0
SubsystemVersion
6.0
Win32VersionValue
0
SizeOfImage
0x24000
SizeOfHeaders
0x200
Checksum
0
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve
0x100000
SizeofStackCommit
0x1000
SizeofHeapReserve
0x100000
SizeofHeapCommit
0x1000
LoaderFlags
0
NumberOfRvaAndSizes
16
MD5
ef152263cc8ff9c08de05e34985d3257
SHA1
f996222a8d5ebf5b196ad577fdfd28add25605dd
SHA256
10c5b93e5617d91c48baa15c18389041bd0686069507d6e511c9aa32f9c2511f
SHA3
6c3baa87eb688be4f699b65bfb07b0e8233e199044a1a74ecd5ce93ceac34012
VirtualSize
0x1c624
VirtualAddress
0x2000
SizeOfRawData
0x1c800
PointerToRawData
0x200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy
7.84092
MD5
9fbe1ae808119eeadfe369d241be3e90
SHA1
230ee980bc03716a95a963963919710573eb60d9
SHA256
e3226345857af9a548ee630b92436678a1cdbe7f817b9c70b45c890b2b198c26
SHA3
a7521db294d43f56d3a6c17a28067213dd51b07597fa00c0a63f49c53d666c11
VirtualSize
0x5e4
VirtualAddress
0x20000
SizeOfRawData
0x600
PointerToRawData
0x1ca00
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy
4.16379
MD5
83b176ffbcc763ba22834db847ed43bf
SHA1
307f93ae7fb469c2c75bbe1830a58d7981be8382
SHA256
675b587bef8cf46e68a625bf7fc6e730b30d79f344d55764694021f473cb75a0
SHA3
751f6129ba38ffb56e51d3f5b0b9cee79a104551ac871a0bdb81062194dbdf9f
VirtualSize
0xc
VirtualAddress
0x22000
SizeOfRawData
0x200
PointerToRawData
0x1d000
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy
0.10191
Type
RT_VERSION
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x354
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
3.27408
MD5
1706054db386c52f6fc67e49cc13a425
SHA1
15298f7f16dd4a1d30d12db6517907cc2ec62411
SHA256
db776fbaf963a853fa4b8c248027378c46fda3e6fe9f717e0cc02da37eb2c3fc
SHA3
c2c3e25247ff634c713268998faeac84a3f072a3f69484e5a8a7691b3bd5fc70
Type
RT_MANIFEST
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x1ea
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
5.00112
MD5
b7db84991f23a680df8e95af8946f9c9
SHA1
cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256
539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3
4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff
Signature
0xfeef04bd
StructVersion
0x10000
FileVersion
1.0.0.0
ProductVersion
1.0.0.0
FileFlags
(EMPTY)
FileOs
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType
VFT_APP
Language
UNKNOWN
Comments
CompanyName
FileDescription
UltimateFileViewer
FileVersion (#2)
1.0.0.0
InternalName
UnzipWatcher.exe
LegalCopyright
Copyright © 2023
LegalTrademarks
OriginalFilename
UnzipWatcher.exe
ProductName
UltimateFileViewer
ProductVersion (#2)
1.0.0.0
Assembly Version
1.0.0.0
Characteristics
0
TimeDateStamp
2082-Mar-12 09:28:30
Version
0.0
SizeofData
93
AddressOfRawData
0x1e56c
PointerToRawData
0x1c76c
Referenced File
C:\Excel_Dev25\SpreadSheet\UnzipWatcher\obj\Release\UnzipWatcher.pdb
Characteristics
0
TimeDateStamp
1970-Jan-01 00:00:00
Version
0.0
SizeofData
0
AddressOfRawData
0
PointerToRawData
0
[*] Warning: Please edit the configuration file with your VirusTotal API key.
[!] Error: Could not load yara_rules/bitcoin.yara!
Could not load company_names.yara!
[!] Error: Could not load yara_rules/monero.yara!
[!] Error: Could not load yara_rules/compilers.yara!
[!] Error: Could not load yara_rules/findcrypt.yara!
[!] Error: Could not load yara_rules/suspicious_strings.yara!
[!] Error: Could not load yara_rules/domains.yara!
[!] Error: Could not load yara_rules/peid.yara!