Suspicious
Suspect

a2102a0d228e48b45bd3492b34643ae2

PE Executable
|
MD5: a2102a0d228e48b45bd3492b34643ae2
|
Size: 871.94 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
a2102a0d228e48b45bd3492b34643ae2
Sha1
668dc8d75067c0bfd2ee5978c68cab1f4c1b6209
Sha256
5ef6ec513cbff82ef5e357753db46627351be6fe83d83fe05485d06330735849
Sha384
60420c70da0716f31b3ecdf749b68283ba2d36016d35f1c9c89ff8a0d9965866611cfbd823c31ae6c6f39008344ca4cc
Sha512
5e64a437f9ddc4bade4e4ca189a83a46ab8452a2b9f996b601966faaaf25fda79c45667af9e4304eeea2f5372acb45b29a533c0dd456d29dde51bc0bac5131fc
SSDeep
24576:MmF9phhf4edaJm/hmMFnuRXZOhO1/elw4jGY:X9DhVaJcmEuJOhO1Glw4jGY
TLSH
9005E12176A59F01C57A43F91660E73147F26DAFE42AE30A1CC66CEF3D78B850E12693

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
EczaneOtomasyon.AnaMenu.resources
EczaneOtomasyon.Hakkinda.resources
ımageList1.ImageStream
[NBF]root.Data
EczaneOtomasyon.GenelMenu.resources
ımageList1.ImageStream
[NBF]root.Data
EczaneOtomasyon.Properties.Resources.resources
gNEi
[NBF]root.Data
[NBF]root.Data-preview.png
jj
[NBF]root.Data
EczaneOtomasyon.SaglikArsiv.resources
ımageList1.TrayLocation
Informations
Name
Value
Module Name

nTyq.exe

Full Name

nTyq.exe

EntryPoint

System.Void EczaneOtomasyon.Program::Main()

Scope Name

nTyq.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

nTyq

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

1124

Main Method

System.Void EczaneOtomasyon.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void EczaneOtomasyon.GenelMenu::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

nTyq.exe

Full Name

nTyq.exe

EntryPoint

System.Void EczaneOtomasyon.Program::Main()

Scope Name

nTyq.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

nTyq

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

1124

Main Method

System.Void EczaneOtomasyon.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void EczaneOtomasyon.GenelMenu::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
PDB Path

nTyq.pdb

Embedded Resources

20

Suspicious Type Names (1-2 chars)

0

a2102a0d228e48b45bd3492b34643ae2 (871.94 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
EczaneOtomasyon.AnaMenu.resources
EczaneOtomasyon.Hakkinda.resources
ımageList1.ImageStream
[NBF]root.Data
EczaneOtomasyon.GenelMenu.resources
ımageList1.ImageStream
[NBF]root.Data
EczaneOtomasyon.Properties.Resources.resources
gNEi
[NBF]root.Data
[NBF]root.Data-preview.png
jj
[NBF]root.Data
EczaneOtomasyon.SaglikArsiv.resources
ımageList1.TrayLocation
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

nTyq.pdb

a2102a0d228e48b45bd3492b34643ae2

Embedded Resources

20

a2102a0d228e48b45bd3492b34643ae2

Suspicious Type Names (1-2 chars)

0

a2102a0d228e48b45bd3492b34643ae2

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙