Suspicious
Suspect

d04b75c57058c824941425a54070684e

PE Executable
|
MD5: d04b75c57058c824941425a54070684e
|
Size: 1.06 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
d04b75c57058c824941425a54070684e
Sha1
dd2379f20a00792fe5d200f657f7032a6a7a9308
Sha256
493b6a86546ac79b7647bd6f3c3523dd910e6a56e427c45197e957e268df8df2
Sha384
2bc9fa88b9e711bb1ddbdb65c0c8c0474e4b437148f97b95572c0ecb7cbcb0d5c701ad44d2ae2ad30569a79554a41ed6
Sha512
07f64fea7d0018f4c3fe92ee5c41fe6f55b49b8bc93531122c7a3ac7c104ac1ed2f5043cfe0788580d2d0ca48788e081da3ff043ed3821dfa758c2532aa7d5dc
SSDeep
24576:8RsA9H+dKNcFpRMhWcZpUIybQpFgbjChZajQwpKue3hb1IY:UVNCRMhFcwhja84ghx
TLSH
B22523E62787DA23D0D207B59C62F3B522B8ADDDD821C34A8DDE7CD7B8716007995283
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
PassGenerator.Forms.MainForm.resources
PassGenerator.Properties.Resources.resources
Ce
[NBF]root.Data
asdL
[NBF]root.Data
[NBF]root.Data-preview.png
gold_bars
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: SPJe.pdb

Module Name

SPJe.exe

Full Name

SPJe.exe

EntryPoint

System.Void PassGenerator.Program::Main()

Scope Name

SPJe.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

SPJe

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

99

Main Method

System.Void PassGenerator.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void PassGenerator.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

d04b75c57058c824941425a54070684e (1.06 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
PassGenerator.Forms.MainForm.resources
PassGenerator.Properties.Resources.resources
Ce
[NBF]root.Data
asdL
[NBF]root.Data
[NBF]root.Data-preview.png
gold_bars
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙