94392aaeecfb59d9ed73fea8817e47c5

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2018-Jan-02 16:02:43
Debug artifacts C:\1Stuff\Programming\WinLIRC\c sharp remote\LIRCRemoteGUI\LIRCRemoteGUI\obj\Release\LIRCRemoteGUI.pdb
Comments
CompanyName Hewlett-Packard
FileDescription LIRCRemoteGUI
FileVersion 1.0.0.0
InternalName LIRCRemoteGUI.exe
LegalCopyright Copyright © Hewlett-Packard 2014
LegalTrademarks
OriginalFilename LIRCRemoteGUI.exe
ProductName LIRCRemoteGUI
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Malicious The program tries to mislead users about its origins. The PE pretends to be from Hewlett-Packard but is not signed!
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 94392aaeecfb59d9ed73fea8817e47c5
SHA1 457c2322154531fef09791546ac2359aebd6f2d3
SHA256 e38823aba98264c250447f3754057e7997deda914ad55d94bf1fde0fb90918f4
SHA3 dbc4abb1f969addb79284e8a94c0616027598594f4fa63a41d1822a3f7c802e6
SSDeep 384:r2+dgNS3ORu3c4B8a6Z3kvwKwq6uQ0hA:6gxD6N
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2018-Jan-02 16:02:43
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x2a00
SizeOfInitializedData 0xe00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000483A (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x6000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0xa000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 4b0461423cb12d6e8bdb65730174dc9e
SHA1 62ff3b0ce738036e3e8d0805c24c00c857e9f0ec
SHA256 219ab5f54fca9596ee8b3af9afeff8242bad3dc98fa3642e511e68429af56062
SHA3 7bdcbc23f4325cb9f7c259d8359997cb40b7eb699da7577be4dd472a6e4e404b
VirtualSize 0x2840
VirtualAddress 0x2000
SizeOfRawData 0x2a00
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.40126

.rsrc

MD5 555a1cbb47f463377658de7909e1506d
SHA1 37ab09f3c22cfc9548cc5ac7355dc8c10201bc8d
SHA256 2cba036bec288f9cbc7d610d7c8f697e13219becbc476b4df2dd477e2296b3d9
SHA3 f01086015331cbd7cfc630cc0c94105ea564792eb8c5a58a86a323681e9d7717
VirtualSize 0xb14
VirtualAddress 0x6000
SizeOfRawData 0xc00
PointerToRawData 0x2c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.7472

.reloc

MD5 a43561352223a3ffff60ccece91af28f
SHA1 76712c1a2ee7770877253a29cbde242259967b6b
SHA256 6765d02961208ed32bc8cb5d5a331a1dc5cbaef5971bd4bf71904318e8de9512
SHA3 3b9c67ce627c50079f5eb9145efc9c06bf49eb227614847fe245431ea6ed8f3b
VirtualSize 0xc
VirtualAddress 0x8000
SizeOfRawData 0x200
PointerToRawData 0x3800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0815394

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.8031
MD5 1ed1b880145280f557c6d321c03cf988
SHA1 792c620bfe279d780f92b7cecfe3aef2b8201b03
SHA256 01a71b864b5f2b9bd5594f29dc317892f1d5d9297022967a12621c34a2acdc41
SHA3 e6df2a4ade6c1c78572fd538c5581fa9c5e9e15ba260582cdf1602248be7495f

32512

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.91924
Detected Filetype Icon file
MD5 78bb727f88e9a797284b4261136ce56b
SHA1 5ed1d3100502c999ae46a84582b2978c9a4b4802
SHA256 404e02d011bc669c67ead03b175f7eaab8a01e00c044f6aed26dc0fb1ffef4f5
SHA3 f57de7a7e2c8e0c277f68d3240579431255bc793cf2c015ec7daed9f06b55d13

1 (#2)

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x378
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.35361
MD5 f52cb8554858cc8c35a2aab0edfd85ef
SHA1 1a59d46297af48f028ddaa9e33947e56be99c925
SHA256 891f0190d2b39eeaaf90c3eeb582abe305dfbf69f68cc81c0aac1081447b9096
SHA3 0c3bd0afbeb68a1b7bb7b6c9a9384d708a50181bac85ecf26c57df65743c7036

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName Hewlett-Packard
FileDescription LIRCRemoteGUI
FileVersion (#2) 1.0.0.0
InternalName LIRCRemoteGUI.exe
LegalCopyright Copyright © Hewlett-Packard 2014
LegalTrademarks
OriginalFilename LIRCRemoteGUI.exe
ProductName LIRCRemoteGUI
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2018-Jan-02 16:02:43
Version 0.0
SizeofData 284
AddressOfRawData 0x46cc
PointerToRawData 0x28cc
Referenced File C:\1Stuff\Programming\WinLIRC\c sharp remote\LIRCRemoteGUI\LIRCRemoteGUI\obj\Release\LIRCRemoteGUI.pdb

TLS Callbacks

Load Configuration

RICH Header

Errors