Suspect
177cc0b3616c40dd5a7d242b2577ae7e
PE Executable | MD5: 177cc0b3616c40dd5a7d242b2577ae7e | Size: 725.5 KB | application/x-dosexec
PE Executable
MD5: 177cc0b3616c40dd5a7d242b2577ae7e
Size: 725.5 KB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Medium
|
Hash | Hash Value |
|---|---|
| MD5 | 177cc0b3616c40dd5a7d242b2577ae7e
|
| Sha1 | 8f3ebfa6236bf48c3ee3d26bdf4b76cf5cff8edf
|
| Sha256 | eb1594e3ef330befff15be4cf913f287c866af3c8a08528bcfc317ec79c7bca3
|
| Sha384 | 0fa0d71e57bda4ad3af3172ed083f33497ad6f3a2f5cf78431b757db562039732364bed979747d99819956cc5b9b6523
|
| Sha512 | 08e755cdd758b786eb00ee8018f0fc22ad8a6c596f3588486c1be3e66004f685749c62f221fae3ecc0bf4a9320514399dc36c659dfb08f241bd5748d1375f85f
|
| SSDeep | 12288:E70OWwEcBRKbCRcqHjYTN4EKjxQIQjd2hpQs2Z7LWfB1FKglw7XMBVP:EvBBFPSHjEy9G3NqYP
|
| TLSH | F2F412982346DB17E4E61BF45CA0E3B5537C2EE9F821C7079AEAADC77836B006C51352
|
File Structure
177cc0b3616c40dd5a7d242b2577ae7e
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
NumberBaseConverter.MainForm.resources
NumberBaseConverter.Properties.Resources.resources
KS
[NBF]root.Data
SelT
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | PDB Path: jGTG.pdb |
| Module Name | jGTG.exe |
| Full Name | jGTG.exe |
| EntryPoint | System.Void NumberBaseConverter.Program::Main() |
| Scope Name | jGTG.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | jGTG |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 131 |
| Main Method | System.Void NumberBaseConverter.Program::Main() |
| Main IL Instruction Count | 10 |
| Main IL | nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void NumberBaseConverter.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null> |
177cc0b3616c40dd5a7d242b2577ae7e (725.5 KB)
File Structure
177cc0b3616c40dd5a7d242b2577ae7e
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
NumberBaseConverter.MainForm.resources
NumberBaseConverter.Properties.Resources.resources
KS
[NBF]root.Data
SelT
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.