Suspicious
Suspect

2686db497280de5d6604f59a04111357

PE Executable
|
MD5: 2686db497280de5d6604f59a04111357
|
Size: 966.66 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
2686db497280de5d6604f59a04111357
Sha1
4dd178e4ee4d05f55450ca032426167151f31004
Sha256
afcb9a98287b5852b6fd25a60e9fdee42c3039054de5150e3a77e18944ec7c80
Sha384
bf689fe76722937aa2f2e08e001197ca0274a664dbcb6192afbb3e25b4d594856d6ea9b311a888ff184c15cc4b284f49
Sha512
d53a133ddd4c6711398a35746c546abdaad893ddfd188ab9ca18d8068682cb498397bc2f9d71c9074f4d91ba3628b9f9dbaab64e7b5c69088d6b5da5b417dc05
SSDeep
24576:ojennfrlYiffg9AqOw0vkhf4pZ1D1vh4ps51Z026WVzr:Q6fZZffgt66QX1us5Lj
TLSH
4A2512443389DA12D1A70BF94D71D37457746E8A6811D21B8EEABCEB3CA2F812D91363

PeID

Armadillo v4.x
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNetworkAnalyzer.Forms.MainForm.resources
SmartNetworkAnalyzer.Properties.Resources.resources
greyder
[NBF]root.Data
jvE
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

TmI.exe

Full Name

TmI.exe

EntryPoint

System.Void SmartNetworkAnalyzer.Program::Main()

Scope Name

TmI.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

TmI

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

243

Main Method

System.Void SmartNetworkAnalyzer.Program::Main()

Main IL Instruction Count

26

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> nop <null> newobj System.Void SmartNetworkAnalyzer.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> nop <null> leave.s IL_0040: ret stloc.0 <null> nop <null> ldstr An unexpected error occurred: {0} The application will now close. ldloc.0 <null> callvirt System.String System.Exception::get_Message() call System.String System.String::Format(System.String,System.Object) ldstr Fatal Error ldc.i4.0 <null> ldc.i4.s 16 call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String,System.Windows.Forms.MessageBoxButtons,System.Windows.Forms.MessageBoxIcon) pop <null> nop <null> leave.s IL_0040: ret ret <null>

Artefacts
Name
Value
PDB Path

TmI.pdb

2686db497280de5d6604f59a04111357 (966.66 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNetworkAnalyzer.Forms.MainForm.resources
SmartNetworkAnalyzer.Properties.Resources.resources
greyder
[NBF]root.Data
jvE
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

TmI.pdb

2686db497280de5d6604f59a04111357

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙