Suspect
2081e3ef53a7b6fd19d77bf2e6133490
PE Executable | MD5: 2081e3ef53a7b6fd19d77bf2e6133490 | Size: 777.22 KB | application/x-dosexec
PE Executable
MD5: 2081e3ef53a7b6fd19d77bf2e6133490
Size: 777.22 KB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Low
Hash | Hash Value |
---|---|
MD5 | 2081e3ef53a7b6fd19d77bf2e6133490
|
Sha1 | a8c82b1e910f33ab044ec6624dd153947472c806
|
Sha256 | 5f9211510339c99b3b0dcf99aa5ed3ab7958bfb37117551c9eae256dec0cf181
|
Sha384 | 6eb4c25bc6b579cd53071ab98b6c0f4bf066ecc3d4bc3814b8de64137fa1328ebfb06ceef41eacdb36c66b1cc47e8b9b
|
Sha512 | e5b2da14c8a1a8fb56dcf38c5d4b1c0cf157fde754dd25d21f12127b07686d96520adeaf52322e8c7b02870dec70f9a3bd922338da7477c6b1d7cb5f4622460b
|
SSDeep | 12288:qQAHVBffrGDGxDoqxQ40gGg3iHomBn1HPbZeq3++4QnzRvKXn1hUvOL:3eBffrfJQ40gbiDhPbA699uAm
|
TLSH | 15F4F0073706CD32E7B302B1C862D7F445698E9A598193D78AECBF973C2621159E1EE3
|
File Structure
2081e3ef53a7b6fd19d77bf2e6133490
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
BTH1.Calculator1.resources
$this.Icon
[NBF]root.IconData
BTH1.Calculator2.resources
$this.BackgroundImage
[NBF]root.Data
[NBF]root.Data-preview.png
$this.Icon
[NBF]root.IconData
FT
[NBF]root.Data
BTH1.Properties.Resources.resources
fga
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name0 | Value |
---|---|
Info | PE Detect: PeReader OK (file layout) |
Info | PDB Path: DKo.pdb |
Module Name | DKo.exe |
Full Name | DKo.exe |
EntryPoint | System.Void BTH1.Program::Main() |
Scope Name | DKo.exe |
Scope Type | ModuleDef |
Kind | Windows |
Runtime Version | v4.0.30319 |
Tables Header Version | 512 |
WinMD Version | <null> |
Assembly Name | DKo |
Assembly Version | 1.0.0.0 |
Assembly Culture | <null> |
Has PublicKey | False |
PublicKey Token | <null> |
Target Framework | .NETFramework,Version=v4.5 |
Total Strings | 98 |
Main Method | System.Void BTH1.Program::Main() |
Main IL Instruction Count | 10 |
Main IL | nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void BTH1.Calculator2::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null> |
2081e3ef53a7b6fd19d77bf2e6133490 (777.22 KB)
File Structure
2081e3ef53a7b6fd19d77bf2e6133490
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:0001
ID:0
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
BTH1.Calculator1.resources
$this.Icon
[NBF]root.IconData
BTH1.Calculator2.resources
$this.BackgroundImage
[NBF]root.Data
[NBF]root.Data-preview.png
$this.Icon
[NBF]root.IconData
FT
[NBF]root.Data
BTH1.Properties.Resources.resources
fga
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.