Suspicious
Suspect

4cae37ba69b872585f14e1c9800ee938

PE Executable
|
MD5: 4cae37ba69b872585f14e1c9800ee938
|
Size: 533 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
4cae37ba69b872585f14e1c9800ee938
Sha1
d605f79d27192eb8f454a81712a26e77ce3bbe9a
Sha256
f9c86d1815b169a952352073adc608b0e215e9bfb871cd85e59a76d1152aff14
Sha384
50b75626905ec72679e256e3a38f5acfa35570c23aa83597856bf4d02034f4d1388e5c1d325c179fa91f4165801668b4
Sha512
7f85c2855164428280f45b3edd9674e57771126f94a3ebea42059bee67aca7cda781a49a4948c64bea6e66cc8fcf50b8809c1aadaff97a958d808d847f9f905c
SSDeep
12288:lrZ1ugpVtJqkRY3mbjSXa7T9Q3WnRE9NUq2NkiKmd8kR:lHuwVtAkR0sTbRmLmp
TLSH
C8B412851226CD13C6B28B3A0B61E5B507F4BF5EB421E7174FE9ACDFB8A1B44194831B
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
zUA
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x7EC00 size 13832 bytes

Info

PDB Path: pmN.pdb

Module Name

pmN.exe

Full Name

pmN.exe

EntryPoint

System.Void SmartNote.Program::Main()

Scope Name

pmN.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

pmN

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

210

Main Method

System.Void SmartNote.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void SmartNote.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

4cae37ba69b872585f14e1c9800ee938 (533 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
zUA
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙