×
This file seems to be a .NET executable .
Sadly, Manalyzer's analysis techniques were designed for native code, so it's likely that this report won't tell you much.
Sorry!
Architecture
IMAGE_FILE_MACHINE_I386
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date
2012-Dec-03 09:32:38
Debug artifacts
c:\Users\isaac_000\Documents\Visual Studio 2012\Projects\File Pumper\File Pumper\obj\Debug\byte Pumper.pdb
FileDescription
File Pumper
FileVersion
1.0.0.0
InternalName
byte Pumper.exe
LegalCopyright
Copyright © 2012
OriginalFilename
byte Pumper.exe
ProductName
File Pumper
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Info
Matching compiler(s):
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Safe
VirusTotal score: 0/70 (Scanned on 2019-04-15 20:26:38)
All the AVs think this file is safe.
MD5
fc0a76499a0418028a9052a2330f9014
SHA1
848231f72a51373f1567d03f70918a511fdf3d12
SHA256
26760905e2a9e951384f85393a1bb3139e9643b553dbec6cefcd79cb90c48c66
SHA3
98ef45aef26e01fcf5b43e74fe279d4ba8dfaf7a96fd6737aaf2f90eab0bb671
SSDeep
384:ZUwFfQ2ykvwKwq6uq23BpH1/pnjSgVq6:B5jjq6
Imports Hash
f34d5f2d4577ed6d9ceec516c1f5a744
e_magic
MZ
e_cblp
0x90
e_cp
0x3
e_crlc
0
e_cparhdr
0x4
e_minalloc
0
e_maxalloc
0xffff
e_ss
0
e_sp
0xb8
e_csum
0
e_ip
0
e_cs
0
e_ovno
0
e_oemid
0
e_oeminfo
0
e_lfanew
0x80
Signature
PE
Machine
IMAGE_FILE_MACHINE_I386
NumberofSections
3
TimeDateStamp
2012-Dec-03 09:32:38
PointerToSymbolTable
0
NumberOfSymbols
0
SizeOfOptionalHeader
0xe0
Characteristics
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
Magic
PE32
LinkerVersion
11.0
SizeOfCode
0x2600
SizeOfInitializedData
0xe00
SizeOfUninitializedData
0
AddressOfEntryPoint
0x0000454E (Section: .text)
BaseOfCode
0x2000
BaseOfData
0x6000
ImageBase
0x400000
SectionAlignment
0x2000
FileAlignment
0x200
OperatingSystemVersion
4.0
ImageVersion
0.0
SubsystemVersion
6.0
Win32VersionValue
0
SizeOfImage
0xa000
SizeOfHeaders
0x200
Checksum
0
Subsystem
IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve
0x100000
SizeofStackCommit
0x1000
SizeofHeapReserve
0x100000
SizeofHeapCommit
0x1000
LoaderFlags
0
NumberOfRvaAndSizes
16
MD5
de3f65f6d810f7ccecc687f6221d6a8a
SHA1
c4ed26a1b62db3fedbf6762bdbeec67ff0ef5036
SHA256
bc151fc865fbb40d2468736091f76fd3e266745d0f677ef3d26b8d8b16a9b6af
SHA3
008e2cbdf89cc67c20d8e2cd9f4be42a46ec46f2ccafa0230cbc7dd9b84385ae
VirtualSize
0x2554
VirtualAddress
0x2000
SizeOfRawData
0x2600
PointerToRawData
0x200
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy
5.49662
MD5
8c11daaf5644bd5fe936750eb347a74b
SHA1
7e6f71dd1feeb9d0a65d5633f7314e31276d0978
SHA256
eec4074338117086937c1347329fbc4eec988bd26ce467d3c9e40528f6df9779
SHA3
1fe0c384bffede99334122cf683c0ffd78d90471218371698b4c60b8525462fc
VirtualSize
0xa60
VirtualAddress
0x6000
SizeOfRawData
0xc00
PointerToRawData
0x2800
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy
4.43345
MD5
c1ccf210ab2864a3a6b9f353f1aef8a5
SHA1
baf02f0f65d2b28f1b44e6c348adec41d96d2b0a
SHA256
c892d78b01bb98aad7442f1a60a762d1210eb04759f7a9a47f84d4a5372ed061
SHA3
96ecaf7c4e5e7471c2280198e4af3d5c134d9e76b5184570c5c3529c8d71099b
VirtualSize
0xc
VirtualAddress
0x8000
SizeOfRawData
0x200
PointerToRawData
0x3400
PointerToRelocations
0
PointerToLineNumbers
0
NumberOfLineNumbers
0
NumberOfRelocations
0
Characteristics
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy
0.0815394
Type
RT_ICON
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x468
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
4.62128
MD5
321dd1d04140f580528866c59e3fa62a
SHA1
48fa97b3e849d1dd8bfdfb204ef3d98bd5e2cd15
SHA256
446b653386168ec710c97cae618951898225221b65bc6f210d1c641c6034ff7c
SHA3
29c34b3b8b8fbf9fa1a159e6f914db0a8ad5b4f8a4b7a909e6ebbb33aacef1af
Type
RT_GROUP_ICON
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x14
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
2.0815
Detected Filetype
Icon file
MD5
3a1733f1c39d84605deacdde66bd4540
SHA1
3373973dcc0371515507dccd5549c753f99e30ab
SHA256
24fa4ee5ddec6c9e035c03370abd83573674726a37d030ab64d058b5692fc9af
SHA3
377bc10ac76e03a28eb6a095dbaf16b90f9805598922c9b6e6971d7ed450924d
Type
RT_VERSION
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x2c0
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
3.28946
MD5
93bfce97c8d150545a5554421f2266ec
SHA1
58f85591e9570af59c295166c1e1c078f0bfc4a4
SHA256
8cc1c7aa03c6a7e029dd4556020e0c0d5fdd02b2154dbebacbbf1427b1d49ab6
SHA3
26a2485afc89a07892ca5717d3651cb594ae40b63200ea299bd1a816eb7bb2d5
Type
RT_MANIFEST
Language
UNKNOWN
Codepage
UNKNOWN
Size
0x1ea
TimeDateStamp
1980-Jan-01 00:00:00
Entropy
5.00112
MD5
a19a2658ba69030c6ac9d11fd7d7e3c1
SHA1
879dcf690e5bf1941b27cf13c8bcf72f8356c650
SHA256
c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f
SHA3
93cbaf236d2d3870c1052716416ddf1c34f21532e56dd70144e9a01efcd0ce34
Signature
0xfeef04bd
StructVersion
0x10000
FileVersion
1.0.0.0
ProductVersion
1.0.0.0
FileFlags
(EMPTY)
FileOs
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType
VFT_APP
Language
UNKNOWN
FileDescription
File Pumper
FileVersion (#2)
1.0.0.0
InternalName
byte Pumper.exe
LegalCopyright
Copyright © 2012
OriginalFilename
byte Pumper.exe
ProductName
File Pumper
ProductVersion (#2)
1.0.0.0
Assembly Version
1.0.0.0
Characteristics
0
TimeDateStamp
2012-Dec-03 09:32:38
Version
0.0
SizeofData
284
AddressOfRawData
0x43d8
PointerToRawData
0x25d8
Referenced File
c:\Users\isaac_000\Documents\Visual Studio 2012\Projects\File Pumper\File Pumper\obj\Debug\byte Pumper.pdb