Suspicious
Suspect

61dfadf9a0cae400fc27351f56d9c2fb

PE Executable
|
MD5: 61dfadf9a0cae400fc27351f56d9c2fb
|
Size: 867.84 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
61dfadf9a0cae400fc27351f56d9c2fb
Sha1
81c8cb0bfc66419d3cf9077ad0ecc8cef18bd547
Sha256
26160f483487ec164d3b40e9ca5d1f6e5fef76d02d5530c22cd34374f8fd684f
Sha384
3dab6f46d0baad078912efd78e966c405d4ab77385a0269f535c47638b1c37e5270819690f5a4b21f518d3b9c6c1b574
Sha512
09738d205226d47e464c562481c724280da542a3789fdfde366783d34be5e1de3aea68d18cfca24b945f658b7654a77a306bc7d180d6c56d70d8865c1f4933ac
SSDeep
12288:brAaZBFa5tJatOF/OoYJMxLpo0xbAVg7C3fNuVXaZYbdDt8zrMfHDP:bUaJavJFhYKL+QbA6yGJbdDt8zAP
TLSH
5905F0153DDA8D16C0F39ABE1DE1CEB10AAC7DDBA531D63E6ACCEC9F74616404C4920A
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
kVp
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: HNo.pdb

Module Name

HNo.exe

Full Name

HNo.exe

EntryPoint

System.Void SmartNote.Program::Main()

Scope Name

HNo.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

HNo

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

210

Main Method

System.Void SmartNote.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void SmartNote.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

61dfadf9a0cae400fc27351f56d9c2fb (867.84 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
kVp
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙