Suspicious
Suspect

5c0b20599f478d93669d0f3dbe7b33b2

PE Executable
|
MD5: 5c0b20599f478d93669d0f3dbe7b33b2
|
Size: 1.47 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Medium

Hash
Hash Value
MD5
5c0b20599f478d93669d0f3dbe7b33b2
Sha1
5ca76b184c18c4fbfb2b8120d15b944ff7c8f1c3
Sha256
8bcaf5c18012ea57704cf548cc1173e10fd713712f4feba765cff7c3de7ca562
Sha384
e7153257a9ce81a09826fdad8be1d6e342ff8fdb118802a64af644fda1c14f869c3275adf3a832e806d8c97a4fae0246
Sha512
02876a2506a99556472e43f80215bb0f1ce49f2b2a8deead22494e66581aaeafdfdd781e928d123c9e58be865096d1dfcbf5757733d589eb2a51bc8ba8c6e1e7
SSDeep
24576:yYs40P/VMaZGDSSkah+xP/4aUoJEiOdt8vSXeDaXQqY7KHBjy2M2:E40P/VMxm5/4joJlOEqXeGm8yx2
TLSH
32651254765AC912C5A61BF04972DBF52B79BED8E912C3078FDABEEFB436B440901302

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
QuickNoteTaker.Form1.resources
QuickNoteTaker.Properties.Resources.resources
SIP
[NBF]root.Data
cfQn
[NBF]root.Data
[NBF]root.Data-preview.png
dice_1
[NBF]root.Data
[NBF]root.Data-preview.png
dice_2
[NBF]root.Data
[NBF]root.Data-preview.png
dice_3
[NBF]root.Data
[NBF]root.Data-preview.png
dice_4
[NBF]root.Data
[NBF]root.Data-preview.png
dice_5
[NBF]root.Data
[NBF]root.Data-preview.png
dice_6
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: JZXT.pdb

Module Name

JZXT.exe

Full Name

JZXT.exe

EntryPoint

System.Void QuickNoteTaker.Program::Main()

Scope Name

JZXT.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

JZXT

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

209

Main Method

System.Void QuickNoteTaker.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void QuickNoteTaker.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

JZXT.exe

Full Name

JZXT.exe

EntryPoint

System.Void QuickNoteTaker.Program::Main()

Scope Name

JZXT.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

JZXT

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

209

Main Method

System.Void QuickNoteTaker.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void QuickNoteTaker.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

5c0b20599f478d93669d0f3dbe7b33b2 (1.47 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
QuickNoteTaker.Form1.resources
QuickNoteTaker.Properties.Resources.resources
SIP
[NBF]root.Data
cfQn
[NBF]root.Data
[NBF]root.Data-preview.png
dice_1
[NBF]root.Data
[NBF]root.Data-preview.png
dice_2
[NBF]root.Data
[NBF]root.Data-preview.png
dice_3
[NBF]root.Data
[NBF]root.Data-preview.png
dice_4
[NBF]root.Data
[NBF]root.Data-preview.png
dice_5
[NBF]root.Data
[NBF]root.Data-preview.png
dice_6
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙