Suspicious
Suspect

726b9f48468cc4b598bb0590d4bef640

PE Executable
|
MD5: 726b9f48468cc4b598bb0590d4bef640
|
Size: 1.26 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
726b9f48468cc4b598bb0590d4bef640
Sha1
4ea5e271cdcdadc7e1247be5ebb0a49461d7eb33
Sha256
84f865ccb171bf67fda9377e9d7a137946817e25ea56b6f9a0914063223cdf21
Sha384
92875ec46c69a37f0fdb628c8ff959396fac95f022633af2f9f09a44b00050986dfdd026abad268dd613d7c2b1cb272e
Sha512
a7c533de00528ef9e38fcea9e88927bc8da89e43b6dbf9b6c3094345a7bf5454429f20538ffa4ba9f264703fb5c3e4ecec7f23b4872a028a02e15ca08a50d117
SSDeep
24576:pW0v3FdlDFzQys/2ZVc2Q+Y4l/ypOy7VxMjdKgXv0LG:00PFdlDB6wVc2Q+Yg/ypPxUMLG
TLSH
5345234523DAFA01C1652FF819E0D7745BB1AE8AB912C3065EEA7CEF7C75B402C152A3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
QueryFormat.Forms.MainForm.resources
QueryFormat.Properties.Resources.resources
WR
[NBF]root.Data
yGDv
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x12F400 size 13832 bytes

Info

PDB Path: Hjks.pdb

Module Name

Hjks.exe

Full Name

Hjks.exe

EntryPoint

System.Void QueryFormat.Program::Main()

Scope Name

Hjks.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Hjks

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

638

Main Method

System.Void QueryFormat.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void QueryFormat.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

Hjks.exe

Full Name

Hjks.exe

EntryPoint

System.Void QueryFormat.Program::Main()

Scope Name

Hjks.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Hjks

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

638

Main Method

System.Void QueryFormat.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void QueryFormat.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

726b9f48468cc4b598bb0590d4bef640 (1.26 MB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
QueryFormat.Forms.MainForm.resources
QueryFormat.Properties.Resources.resources
WR
[NBF]root.Data
yGDv
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙