Suspicious
Suspect

135aa6f945e855a735cd22289cfbf0ee

PE Executable
|
MD5: 135aa6f945e855a735cd22289cfbf0ee
|
Size: 708.61 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
135aa6f945e855a735cd22289cfbf0ee
Sha1
f94bd46e78a44bcc50e073608d728cdd5ee80526
Sha256
239b2845a02e5c41bb8f2f25aef11a515bbc7f1f76345b72428972971f41bb41
Sha384
ceb0d838bc283464152891c1581943d2a945825127808b250232956e4361456b51d8ff7163778b33a685ad48bbdc4d67
Sha512
46672df7faf22a4bdf318b9da5db6b785fc2b90461255871a2e8dc4e9cee7dd91670b983d094b2ef4fe653504d90f312c6c91416bc339a9f9a7d11536cc733b5
SSDeep
12288:XJx7untvfhIPQvZVRfmMGc/FN0ARsazCMpLqOkCyJU4Q7wpkfjkMaDNnT0lpieJ5:Xv7wpfyIvZVRf9v/F4azCbgr4dwjkMam
TLSH
2BE4029D330AEC02D4911FB01970D7B6137C6F9DE904C393AFFE9D9BB87669068442A6

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0.exif
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
WinFormServer.Form1.resources
$this.Icon
[NBF]root.IconData
crt
[NBF]root.Data
WinFormServer.Properties.Resources.resources
VZUz
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ?

Module Name

imWD.exe

Full Name

imWD.exe

EntryPoint

System.Void WinFormServer.Program::Main()

Scope Name

imWD.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

imWD

Assembly Version

1.5.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

70

Main Method

System.Void WinFormServer.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void WinFormServer.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

imWD.exe

Full Name

imWD.exe

EntryPoint

System.Void WinFormServer.Program::Main()

Scope Name

imWD.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

imWD

Assembly Version

1.5.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

70

Main Method

System.Void WinFormServer.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void WinFormServer.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

135aa6f945e855a735cd22289cfbf0ee (708.61 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0.exif
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
WinFormServer.Form1.resources
$this.Icon
[NBF]root.IconData
crt
[NBF]root.Data
WinFormServer.Properties.Resources.resources
VZUz
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙