×
This file seems to be a .NET executable .
Sadly, Manalyzer's analysis techniques were designed for native code, so it's likely that this report won't tell you much.
Sorry!
Architecture
IMAGE_FILE_MACHINE_I386
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date
2018-Jan-02 16:02:43
Debug artifacts
C:\1Stuff\Programming\WinLIRC\c sharp remote\LIRCRemoteGUI\LIRCRemoteGUI\obj\Release\LIRCRemoteGUI.pdb
Comments
CompanyName
Hewlett-Packard
FileDescription
LIRCRemoteGUI
FileVersion
1.0.0.0
InternalName
LIRCRemoteGUI.exe
LegalCopyright
Copyright © Hewlett-Packard 2014
LegalTrademarks
OriginalFilename
LIRCRemoteGUI.exe
ProductName
LIRCRemoteGUI
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Info
Matching compiler(s):
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Malicious
The program tries to mislead users about its origins.
The PE pretends to be from Hewlett-Packard but is not signed!
Suspicious
No VirusTotal score.
This file has never been scanned on VirusTotal.
MD5
94392aaeecfb59d9ed73fea8817e47c5
SHA1
457c2322154531fef09791546ac2359aebd6f2d3
SHA256
e38823aba98264c250447f3754057e7997deda914ad55d94bf1fde0fb90918f4
SHA3
dbc4abb1f969addb79284e8a94c0616027598594f4fa63a41d1822a3f7c802e6
SSDeep
384:r2+dgNS3ORu3c4B8a6Z3kvwKwq6uQ0hA:6gxD6N
Imports Hash
f34d5f2d4577ed6d9ceec516c1f5a744
e_magic
MZ
e_cblp
0x90
e_cp
0x3
e_crlc
0
e_cparhdr
0x4
e_minalloc
0
e_maxalloc
0xffff
e_ss
0
e_sp
0xb8
e_csum
0
e_ip
0
e_cs
0
e_ovno
0
e_oemid
0
e_oeminfo
0
e_lfanew
0x80
Signature
PE
Machine
IMAGE_FILE_MACHINE_I386
NumberofSections
3
TimeDateStamp
2018-Jan-02 16:02:43
PointerToSymbolTable
0
NumberOfSymbols
0
SizeOfOptionalHeader
0xe0
Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Magic
PE32
LinkerVersion
48.0
SizeOfCode
0x2a00
SizeOfInitializedData
0xe00
SizeOfUninitializedData
0
AddressOfEntryPoint
0x0000483A (Section: .text)
BaseOfCode
0x2000
BaseOfData
0x6000
ImageBase
0x400000
SectionAlignment
0x2000
FileAlignment
0x200
OperatingSystemVersion
4.0
ImageVersion
0.0
SubsystemVersion
4.0
Win32VersionValue
0
SizeOfImage
0xa000
SizeOfHeaders
0x200
Checksum
0
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve
0x100000
SizeofStackCommit
0x1000
SizeofHeapReserve
0x100000
SizeofHeapCommit
0x1000
LoaderFlags
0
NumberOfRvaAndSizes
16
MD5
4b0461423cb12d6e8bdb65730174dc9e
SHA1
62ff3b0ce738036e3e8d0805c24c00c857e9f0ec
SHA256
219ab5f54fca9596ee8b3af9afeff8242bad3dc98fa3642e511e68429af56062
SHA3
7bdcbc23f4325cb9f7c259d8359997cb40b7eb699da7577be4dd472a6e4e404b
VirtualSize
0x2840
VirtualAddress
0x2000
SizeOfRawData
0x2a00
PointerToRawData
0x200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy
5.40126
MD5
555a1cbb47f463377658de7909e1506d
SHA1
37ab09f3c22cfc9548cc5ac7355dc8c10201bc8d
SHA256
2cba036bec288f9cbc7d610d7c8f697e13219becbc476b4df2dd477e2296b3d9
SHA3
f01086015331cbd7cfc630cc0c94105ea564792eb8c5a58a86a323681e9d7717
VirtualSize
0xb14
VirtualAddress
0x6000
SizeOfRawData
0xc00
PointerToRawData
0x2c00
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy
3.7472
MD5
a43561352223a3ffff60ccece91af28f
SHA1
76712c1a2ee7770877253a29cbde242259967b6b
SHA256
6765d02961208ed32bc8cb5d5a331a1dc5cbaef5971bd4bf71904318e8de9512
SHA3
3b9c67ce627c50079f5eb9145efc9c06bf49eb227614847fe245431ea6ed8f3b
VirtualSize
0xc
VirtualAddress
0x8000
SizeOfRawData
0x200
PointerToRawData
0x3800
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy
0.0815394
Type
RT_ICON
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x468
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
2.8031
MD5
1ed1b880145280f557c6d321c03cf988
SHA1
792c620bfe279d780f92b7cecfe3aef2b8201b03
SHA256
01a71b864b5f2b9bd5594f29dc317892f1d5d9297022967a12621c34a2acdc41
SHA3
e6df2a4ade6c1c78572fd538c5581fa9c5e9e15ba260582cdf1602248be7495f
Type
RT_GROUP_ICON
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x14
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
1.91924
Detected Filetype
Icon file
MD5
78bb727f88e9a797284b4261136ce56b
SHA1
5ed1d3100502c999ae46a84582b2978c9a4b4802
SHA256
404e02d011bc669c67ead03b175f7eaab8a01e00c044f6aed26dc0fb1ffef4f5
SHA3
f57de7a7e2c8e0c277f68d3240579431255bc793cf2c015ec7daed9f06b55d13
Type
RT_VERSION
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x378
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
3.35361
MD5
f52cb8554858cc8c35a2aab0edfd85ef
SHA1
1a59d46297af48f028ddaa9e33947e56be99c925
SHA256
891f0190d2b39eeaaf90c3eeb582abe305dfbf69f68cc81c0aac1081447b9096
SHA3
0c3bd0afbeb68a1b7bb7b6c9a9384d708a50181bac85ecf26c57df65743c7036
Type
RT_MANIFEST
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x1ea
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
5.00112
MD5
b7db84991f23a680df8e95af8946f9c9
SHA1
cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256
539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3
4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff
Signature
0xfeef04bd
StructVersion
0x10000
FileVersion
1.0.0.0
ProductVersion
1.0.0.0
FileFlags
(EMPTY)
FileOs
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType
VFT_APP
Language
UNKNOWN
Comments
CompanyName
Hewlett-Packard
FileDescription
LIRCRemoteGUI
FileVersion (#2)
1.0.0.0
InternalName
LIRCRemoteGUI.exe
LegalCopyright
Copyright © Hewlett-Packard 2014
LegalTrademarks
OriginalFilename
LIRCRemoteGUI.exe
ProductName
LIRCRemoteGUI
ProductVersion (#2)
1.0.0.0
Assembly Version
1.0.0.0
Characteristics
0
TimeDateStamp
2018-Jan-02 16:02:43
Version
0.0
SizeofData
284
AddressOfRawData
0x46cc
PointerToRawData
0x28cc
Referenced File
C:\1Stuff\Programming\WinLIRC\c sharp remote\LIRCRemoteGUI\LIRCRemoteGUI\obj\Release\LIRCRemoteGUI.pdb