Suspicious
Suspect

7430304b5156ea8e86b57470ea0e1573

PE Executable
|
MD5: 7430304b5156ea8e86b57470ea0e1573
|
Size: 796.17 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
7430304b5156ea8e86b57470ea0e1573
Sha1
5b80e7c2ba38c073a48a3245b37357407c29fdd1
Sha256
2b8d8c6e96c86f8b79186d479e8a1b6f70c01db3668bc526f8bd62a825a68f49
Sha384
05d0939beaecc28c621f9df07f55bcca6968bfaa99bf4ed35524bfe4a6e557afafe411ec38fc9f529f485952f09f0c63
Sha512
e7f6b4a64970dc285d9581e64661153a4ea5d00a293b97423b6af4c6f4656426432834262bd0b972d6209cedc16348503e49eefd03c8228076aa2d4f842dd095
SSDeep
24576:JBnnf5mSa1ZAM+z4k3eqhsnUSW5tQcEVF6R7EG:J1fc9vR+33e3BiQfF6RR
TLSH
C40502443756CD03D4A64BF49EB2E73817B97E8EA810D3078DEAFDDB78B57802941262

PeID

Armadillo v4.x
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNetworkAnalyzer.Forms.MainForm.resources
SmartNetworkAnalyzer.Properties.Resources.resources
greyder
[NBF]root.Data
lbU
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xBF000 size 13832 bytes

Info

PDB Path: qGq.pdb

Module Name

qGq.exe

Full Name

qGq.exe

EntryPoint

System.Void SmartNetworkAnalyzer.Program::Main()

Scope Name

qGq.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

qGq

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

243

Main Method

System.Void SmartNetworkAnalyzer.Program::Main()

Main IL Instruction Count

26

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> nop <null> newobj System.Void SmartNetworkAnalyzer.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> nop <null> leave.s IL_0040: ret stloc.0 <null> nop <null> ldstr An unexpected error occurred: {0} The application will now close. ldloc.0 <null> callvirt System.String System.Exception::get_Message() call System.String System.String::Format(System.String,System.Object) ldstr Fatal Error ldc.i4.0 <null> ldc.i4.s 16 call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String,System.Windows.Forms.MessageBoxButtons,System.Windows.Forms.MessageBoxIcon) pop <null> nop <null> leave.s IL_0040: ret ret <null>

7430304b5156ea8e86b57470ea0e1573 (796.17 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNetworkAnalyzer.Forms.MainForm.resources
SmartNetworkAnalyzer.Properties.Resources.resources
greyder
[NBF]root.Data
lbU
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙