Suspicious
Suspect

3942c57ef736a0f04ed5697533fad7af

PE Executable
|
MD5: 3942c57ef736a0f04ed5697533fad7af
|
Size: 706.05 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
3942c57ef736a0f04ed5697533fad7af
Sha1
171dbaf250e967640516d4a6c4e2da61f38d4ebf
Sha256
a8af1d02cb428baefa9f6e832310ebe11a1d71c0bae32d448633c251755b5b8a
Sha384
ed3f5d2f12a53e1a390ec8a32effa1d4a4c45643c04cc84017e728e8586ffaccf15538e5fe64fb937d9471d751dd3f14
Sha512
4cdf1486ea3d02848c7b07f2d2faa5cf8f76069f0ff8f448ffb5d7620a9c33c42daa918990b3ebd24a4c8ba023622b005e24288aee6b821088bb3142f58478cf
SSDeep
12288:+e1vvnXDHQe2nOjqEtYGQgxTXFdQoqk/r+U2KpZVHfq0NNltxO7xKqXj:1JnMkWEtYGQgxTQ+r17pDq0zle1
TLSH
5CE412242619EA06D96117FC4A70F338137D6EEDA921F206AFDA7EFBB535B114C00287

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
HourlyChime.Forms.MainForm.resources
HourlyChime.Properties.Resources.resources
RGAZ
[NBF]root.Data
[NBF]root.Data-preview.png
de
[NBF]root.Data
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: YqxA.pdb

Module Name

YqxA.exe

Full Name

YqxA.exe

EntryPoint

System.Void HourlyChime.Program::Main()

Scope Name

YqxA.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

YqxA

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

174

Main Method

System.Void HourlyChime.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void HourlyChime.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

YqxA.exe

Full Name

YqxA.exe

EntryPoint

System.Void HourlyChime.Program::Main()

Scope Name

YqxA.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

YqxA

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

174

Main Method

System.Void HourlyChime.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void HourlyChime.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

3942c57ef736a0f04ed5697533fad7af (706.05 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
HourlyChime.Forms.MainForm.resources
HourlyChime.Properties.Resources.resources
RGAZ
[NBF]root.Data
[NBF]root.Data-preview.png
de
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙