fc0a76499a0418028a9052a2330f9014

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2012-Dec-03 09:32:38
Debug artifacts c:\Users\isaac_000\Documents\Visual Studio 2012\Projects\File Pumper\File Pumper\obj\Debug\byte Pumper.pdb
FileDescription File Pumper
FileVersion 1.0.0.0
InternalName byte Pumper.exe
LegalCopyright Copyright © 2012
OriginalFilename byte Pumper.exe
ProductName File Pumper
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Safe VirusTotal score: 0/70 (Scanned on 2019-04-15 20:26:38) All the AVs think this file is safe.

Hashes

MD5 fc0a76499a0418028a9052a2330f9014
SHA1 848231f72a51373f1567d03f70918a511fdf3d12
SHA256 26760905e2a9e951384f85393a1bb3139e9643b553dbec6cefcd79cb90c48c66
SHA3 98ef45aef26e01fcf5b43e74fe279d4ba8dfaf7a96fd6737aaf2f90eab0bb671
SSDeep 384:ZUwFfQ2ykvwKwq6uq23BpH1/pnjSgVq6:B5jjq6
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2012-Dec-03 09:32:38
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 11.0
SizeOfCode 0x2600
SizeOfInitializedData 0xe00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000454E (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x6000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xa000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 de3f65f6d810f7ccecc687f6221d6a8a
SHA1 c4ed26a1b62db3fedbf6762bdbeec67ff0ef5036
SHA256 bc151fc865fbb40d2468736091f76fd3e266745d0f677ef3d26b8d8b16a9b6af
SHA3 008e2cbdf89cc67c20d8e2cd9f4be42a46ec46f2ccafa0230cbc7dd9b84385ae
VirtualSize 0x2554
VirtualAddress 0x2000
SizeOfRawData 0x2600
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.49662

.rsrc

MD5 8c11daaf5644bd5fe936750eb347a74b
SHA1 7e6f71dd1feeb9d0a65d5633f7314e31276d0978
SHA256 eec4074338117086937c1347329fbc4eec988bd26ce467d3c9e40528f6df9779
SHA3 1fe0c384bffede99334122cf683c0ffd78d90471218371698b4c60b8525462fc
VirtualSize 0xa60
VirtualAddress 0x6000
SizeOfRawData 0xc00
PointerToRawData 0x2800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.43345

.reloc

MD5 c1ccf210ab2864a3a6b9f353f1aef8a5
SHA1 baf02f0f65d2b28f1b44e6c348adec41d96d2b0a
SHA256 c892d78b01bb98aad7442f1a60a762d1210eb04759f7a9a47f84d4a5372ed061
SHA3 96ecaf7c4e5e7471c2280198e4af3d5c134d9e76b5184570c5c3529c8d71099b
VirtualSize 0xc
VirtualAddress 0x8000
SizeOfRawData 0x200
PointerToRawData 0x3400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0815394

Imports

mscoree.dll _CorExeMain

Delayed Imports

2

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.62128
MD5 321dd1d04140f580528866c59e3fa62a
SHA1 48fa97b3e849d1dd8bfdfb204ef3d98bd5e2cd15
SHA256 446b653386168ec710c97cae618951898225221b65bc6f210d1c641c6034ff7c
SHA3 29c34b3b8b8fbf9fa1a159e6f914db0a8ad5b4f8a4b7a909e6ebbb33aacef1af

32512

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.0815
Detected Filetype Icon file
MD5 3a1733f1c39d84605deacdde66bd4540
SHA1 3373973dcc0371515507dccd5549c753f99e30ab
SHA256 24fa4ee5ddec6c9e035c03370abd83573674726a37d030ab64d058b5692fc9af
SHA3 377bc10ac76e03a28eb6a095dbaf16b90f9805598922c9b6e6971d7ed450924d

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x2c0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28946
MD5 93bfce97c8d150545a5554421f2266ec
SHA1 58f85591e9570af59c295166c1e1c078f0bfc4a4
SHA256 8cc1c7aa03c6a7e029dd4556020e0c0d5fdd02b2154dbebacbbf1427b1d49ab6
SHA3 26a2485afc89a07892ca5717d3651cb594ae40b63200ea299bd1a816eb7bb2d5

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 a19a2658ba69030c6ac9d11fd7d7e3c1
SHA1 879dcf690e5bf1941b27cf13c8bcf72f8356c650
SHA256 c0085eb467d2fc9c9f395047e057183b3cd1503a4087d0db565161c13527a76f
SHA3 93cbaf236d2d3870c1052716416ddf1c34f21532e56dd70144e9a01efcd0ce34

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
FileDescription File Pumper
FileVersion (#2) 1.0.0.0
InternalName byte Pumper.exe
LegalCopyright Copyright © 2012
OriginalFilename byte Pumper.exe
ProductName File Pumper
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2012-Dec-03 09:32:38
Version 0.0
SizeofData 284
AddressOfRawData 0x43d8
PointerToRawData 0x25d8
Referenced File c:\Users\isaac_000\Documents\Visual Studio 2012\Projects\File Pumper\File Pumper\obj\Debug\byte Pumper.pdb

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->