Suspicious
Suspect

0412f59fdc50c9a2fc9ae464cfd205b4

PE Executable
|
MD5: 0412f59fdc50c9a2fc9ae464cfd205b4
|
Size: 1.03 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
0412f59fdc50c9a2fc9ae464cfd205b4
Sha1
d03299a7b56f074b030cec12060edb66292d8e9b
Sha256
d496059f895bbd1ec2bb25f7f4c0395210d085bc525b013c2fe3d962d5e76a48
Sha384
5298ea6d695c04eb5245532bbf3a010e46d7587e5b7c630b77b170ad974b5e79c3b18d700c639ec3827b338c03dfd9f5
Sha512
66aaad05ef0213c66622f94788ae3f50a24cc45ad0820dc14fad4055b75f115777529ac8baaa71639fd7d2b61ec0d23d28f5d62ce4c45e1136b03bb03450d43e
SSDeep
24576:AP8p2LWZjFoJAwYTOqJUA6oGNMt3hYBL1Alu+xVb6q:APuLqJWOOwMt3OBLf+xl6
TLSH
572523915988EA12D9F147B10E65D3F3132D9FDDE401D34BA5EFACCBF80672129A22D2

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
PuhonRM.Properties.Resources.resources
mVIX
vgx
PuhonRM.AddItem.resources
PuhonRM.ItemView.resources
btnAdd.Image
Informations
Name
Value
Module Name

QXNA.exe

Full Name

QXNA.exe

EntryPoint

System.Void PuhonRM.Program::Main()

Scope Name

QXNA.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

QXNA

Assembly Version

1.6.2010.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

107

Main Method

System.Void PuhonRM.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void PuhonRM.ItemView::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

QXNA.exe

Full Name

QXNA.exe

EntryPoint

System.Void PuhonRM.Program::Main()

Scope Name

QXNA.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

QXNA

Assembly Version

1.6.2010.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

107

Main Method

System.Void PuhonRM.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void PuhonRM.ItemView::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
Embedded Resources

6

Suspicious Type Names (1-2 chars)

0

0412f59fdc50c9a2fc9ae464cfd205b4 (1.03 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
PuhonRM.Properties.Resources.resources
mVIX
vgx
PuhonRM.AddItem.resources
PuhonRM.ItemView.resources
btnAdd.Image
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

6

0412f59fdc50c9a2fc9ae464cfd205b4

Suspicious Type Names (1-2 chars)

0

0412f59fdc50c9a2fc9ae464cfd205b4

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙