Suspicious
Suspect

cc98e3a2d53fd4eb93bf3edccf7c38aa

PE Executable
|
MD5: cc98e3a2d53fd4eb93bf3edccf7c38aa
|
Size: 736.26 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
cc98e3a2d53fd4eb93bf3edccf7c38aa
Sha1
8d754a80e2fe4c2ca6e222bab6ce0afba0d3f6e8
Sha256
c91fd0cc8afd6f52a5abd2327068864c352c77893751b038e853fe5ab4168621
Sha384
b6e9d6e590b7279c4c3b93a344a4dfb99ff0d599b02d3883c497c81e5d922b18a65df44cfe7af9c277c0567e2f969a79
Sha512
512678c884d443f9ef6ff58f1dd5dd8bf891fabc5b8f673dffe2982c268d881393f3ebb212c67445f3df2720d416b0fcdcb3dade47ed3c7f598ef1c7302f03c0
SSDeep
12288:jtlAUXEiIkAm6pvjPJ/epWijT164G5kKoLqPIIOjwRiCFGHCqxxK89Bg/b:jedBJm82T1a+Lbvj2iCiHxxDa/b
TLSH
00F4235EFF96D6A5C67E053EE12314AC42B2CBA2F0DDF93E16E46C415F162C0E68AC41

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

TaNz.exe

Full Name

TaNz.exe

EntryPoint

System.Void HeRoSorter.Program::Main()

Scope Name

TaNz.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

TaNz

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void HeRoSorter.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void HeRoSorter.MainForm::Ⴈ() ldc.i4.s 26 ldc.i4.s 28 call System.Void Ayls.DynamicWcfProxy.ProxyException/Ⴍ::Ⴗ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4 812 ldc.i4 851 call System.Void Ayls.DynamicWcfProxy.ProxyException::Ⴗ(System.Boolean,System.Int32,System.Int16) ldc.i4.3 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void HeRoSorter.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void HeRoSorter.Program::Main() pop <null> ret <null>

Module Name

TaNz.exe

Full Name

TaNz.exe

EntryPoint

System.Void HeRoSorter.Program::Main()

Scope Name

TaNz.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

TaNz

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void HeRoSorter.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void HeRoSorter.MainForm::Ⴈ() ldc.i4.s 26 ldc.i4.s 28 call System.Void Ayls.DynamicWcfProxy.ProxyException/Ⴍ::Ⴗ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4 812 ldc.i4 851 call System.Void Ayls.DynamicWcfProxy.ProxyException::Ⴗ(System.Boolean,System.Int32,System.Int16) ldc.i4.3 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void HeRoSorter.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void HeRoSorter.Program::Main() pop <null> ret <null>

cc98e3a2d53fd4eb93bf3edccf7c38aa (736.26 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙