Suspicious
Suspect

1e31175ea67e5777763c3178e0978632

PE Executable
|
MD5: 1e31175ea67e5777763c3178e0978632
|
Size: 525.31 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
1e31175ea67e5777763c3178e0978632
Sha1
d381eb64f4d8cd29c5429da4941a5623aa944f39
Sha256
990c77e153654af651dd65621067c83122d88812a97d9a093c86459fe39de6f6
Sha384
999a2ead1123037ea3948898b0ffb21acd52bfaae6e6e3a4847d969ffff61011188dc40f355522972439440b74f59d0a
Sha512
822a9c44e5102797f5c731ca8d6c25f9d2e7353f8afccac441418cf0a8cec986669beedfb27b8ebf8a34f61714b3cc596ff589a22604b97c349e1174b4d2ee6d
SSDeep
12288:JV2jRgP8wtrybPNdJ5y85TptYNnhXYdycybkynr8:JVWK0wUbPNdnymtYNhohEdno
TLSH
C7B40288029ADA17C0E65FB65DB2D27023F4AD8DF921EB070FD4BDDF7975A801985382
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
HPV
[NBF]root.Data
[NBF]root.Data-preview.png
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: jBH.pdb

Module Name

jBH.exe

Full Name

jBH.exe

EntryPoint

System.Void SmartNote.Program::Main()

Scope Name

jBH.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

jBH

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

210

Main Method

System.Void SmartNote.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void SmartNote.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

1e31175ea67e5777763c3178e0978632 (525.31 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
HPV
[NBF]root.Data
[NBF]root.Data-preview.png
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙