Suspicious
Suspect

3276de65fcf0da78a49a9811f05b738d

PE Executable
|
MD5: 3276de65fcf0da78a49a9811f05b738d
|
Size: 294.91 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
3276de65fcf0da78a49a9811f05b738d
Sha1
e2e878595b5658efdfaa73d8b8b1bf825d615508
Sha256
58345d31f1b03c27119c13ed054ac18146f76e203aa14fa4cce7fdb0bdf41b1d
Sha384
a7cab2f1cbe964d5eed111b482cad43f6a1c4b646c062bb0b4a2e530fb1578f88b07e99e8effb88f13f4b969bfda7e8b
Sha512
bfbb57d61c4a85452e96eb5ddd2d34532bee7b347657c3f1a5d2c5cae942fdf4061af7c3d11fe3c9b3d9b44f6a30e56dd671e7f39c71af10967ca16de2cb5db7
SSDeep
6144:dfETTMuHye6VlWTrC2yVxy/+jGJgrhzDbllRGXN9s6:d6rHyPVlerjy3y/+jGJ2zjR+9s
TLSH
485413159274A0A3C18D85B496EF6486AA37CD8DDCB3897BFD02F30EBE349180B72557

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ycvbf.Resources
Client.exe
Xeno.exe
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

XenoUI.exe

Full Name

XenoUI.exe

EntryPoint

System.Void Program::Main()

Scope Name

XenoUI.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XenoUI

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

10

Main Method

System.Void Program::Main()

Main IL Instruction Count

10

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: ldnull call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

Module Name

XenoUI.exe

Full Name

XenoUI.exe

EntryPoint

System.Void Program::Main()

Scope Name

XenoUI.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XenoUI

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

10

Main Method

System.Void Program::Main()

Main IL Instruction Count

10

Main IL

ldc.i4 2000 call System.Void System.Threading.Thread::Sleep(System.Int32) call System.Boolean Program::CreateMutex() brtrue.s IL_001B: ldnull call System.Int32 System.Environment::get_ExitCode() call System.Void System.Environment::Exit(System.Int32) ldnull <null> call System.Object Program::WorkF(System.Object) pop <null> ret <null>

3276de65fcf0da78a49a9811f05b738d (294.91 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ycvbf.Resources
Client.exe
Xeno.exe
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙