Suspicious
Suspect

1b222f2c9047a7f6920ef78401291f73

PE Executable
|
MD5: 1b222f2c9047a7f6920ef78401291f73
|
Size: 761.86 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
1b222f2c9047a7f6920ef78401291f73
Sha1
bc3867c4421745ac8c796e0d00cc0480311401b8
Sha256
d5906f89074f83b7acdf8e5767df8b48a1f9acbbe9f270a5282388a9fd7e4dd9
Sha384
5f2be8045e8b020947ce3c4cc7ec983bd6b92727a4b41f62a13f5b88b5ef3237ea7cd9dacdf0cfe31d92835b6f3bf757
Sha512
bd6774e2de9bf745cfe3dcbf4fa9edcc7a1b7e40367bd54740d45ae7b21e59c2399f371ec0c1d6b5fc1745949403f29a7aeb7671b92b03ca31ccc103e19550e3
SSDeep
12288:M2SelyAFtKMGnXnzSl8vnw/k67DEHH7hSz/cFO8r5mQGC//inuxaWOguhocSXS0E:qe4CtKMGnX2qvwiHH7hac48r5mQGU6uo
TLSH
08F412A03546D951C892FBF54323D3BA22718FAEE012C317DAF8BCD7BE55B861914683

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
Dijkstra.Form1.resources
$this.Icon
[NBF]root.IconData
M3
[NBF]root.Data
menuStrip1.TrayLocation
Dijkstra.FrmPercorsoMinimo.resources
Dijkstra.Properties.Resources.resources
Vuko
[NBF]root.Data
[NBF]root.Data-preview.png
aquamarine-circle
[NBF]root.Data
[NBF]root.Data-preview.png
red-circle
[NBF]root.Data
[NBF]root.Data-preview.png
yellow-circle
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

KJuy.exe

Full Name

KJuy.exe

EntryPoint

System.Void Dijkstra.Program::Main()

Scope Name

KJuy.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

KJuy

Assembly Version

2.8.5.1

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

109

Main Method

System.Void Dijkstra.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void Dijkstra.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

KJuy.exe

Full Name

KJuy.exe

EntryPoint

System.Void Dijkstra.Program::Main()

Scope Name

KJuy.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

KJuy

Assembly Version

2.8.5.1

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

109

Main Method

System.Void Dijkstra.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void Dijkstra.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\AdZJFivInc\src\obj\Debug\KJuy.pdb

Embedded Resources

7

Suspicious Type Names (1-2 chars)

0

1b222f2c9047a7f6920ef78401291f73 (761.86 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
Dijkstra.Form1.resources
$this.Icon
[NBF]root.IconData
M3
[NBF]root.Data
menuStrip1.TrayLocation
Dijkstra.FrmPercorsoMinimo.resources
Dijkstra.Properties.Resources.resources
Vuko
[NBF]root.Data
[NBF]root.Data-preview.png
aquamarine-circle
[NBF]root.Data
[NBF]root.Data-preview.png
red-circle
[NBF]root.Data
[NBF]root.Data-preview.png
yellow-circle
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\AdZJFivInc\src\obj\Debug\KJuy.pdb

1b222f2c9047a7f6920ef78401291f73

Embedded Resources

7

1b222f2c9047a7f6920ef78401291f73

Suspicious Type Names (1-2 chars)

0

1b222f2c9047a7f6920ef78401291f73

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙