Suspicious
Suspect

b0fbdf73fe3274133808c35bf379c415

PE Executable
|
MD5: b0fbdf73fe3274133808c35bf379c415
|
Size: 735.23 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
b0fbdf73fe3274133808c35bf379c415
Sha1
0cd473d1d6ff34672469c083e1555a5f1f564c40
Sha256
6ec227569529d3e8e3a84217125168742d1cfcec1e4f84cad5958fb5251de4a9
Sha384
c26d79922b15a7f3311178decd3bf1beae1b6fa3e813541ae8f32e7a57c33b9820a98ac2214588425e4cd4384205ae49
Sha512
47bcea7ef15d145a9d89e6a470b968392f128bc623db0208dbe2f5697cd7a62630f35648e0b57819bf61ed9ac4b1a1e5f6c33d2e3c60b0be895ccfa6ace5db4e
SSDeep
12288:brYpU2OMS1QdIk7PXa0ZY01PCRyUZTs9cs+ZWxWTciAl5QjLEHjnHaXVVp2:byU2OMBIk7Pa0ZvRCRyUZA9cvZWxWTct
TLSH
54F41285222A8D1BE6F35FB24861D27517B5AE8DF124D30B1FE4BCEFB965F801944382
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
xaT
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: mRC.pdb

Module Name

mRC.exe

Full Name

mRC.exe

EntryPoint

System.Void SmartNote.Program::Main()

Scope Name

mRC.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

mRC

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

210

Main Method

System.Void SmartNote.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void SmartNote.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

b0fbdf73fe3274133808c35bf379c415 (735.23 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
xaT
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙