Suspicious
Suspect

9355aefbbbaa5881a5f16b51a15b0d22

PE Executable
|
MD5: 9355aefbbbaa5881a5f16b51a15b0d22
|
Size: 811.02 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
9355aefbbbaa5881a5f16b51a15b0d22
Sha1
abac3a5579e873069515c0f251efc23ea488330f
Sha256
12db61ede3c069ddc249cb6bee278c0f63f4fa68dee65e0605185d391e95b1dc
Sha384
3c8c4c435a05cb9067a8a551e56fef1ef84ba8ce99171e0f4f63180f2da7123815a1c7cc34bf1ebf046e559ba178443c
Sha512
dd956dc18ee388fc8b53513b669c856b00202fbae23a3cedd1798ca915deddfb2b22b7fd2ecdb9933c40901a6350c3f67cba77308e7779b9dec357d4bd8b07e2
SSDeep
24576:n14jGYqk/oMZaTMXY79ILg+rARAp/W4H444tX:14jGYq6/8AIiM+rACW4H444tX
TLSH
3805F0982F49E971E840BFB407A1E335D1376E84B501AB9B9DD87E933DEA2D53B03142

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
UPolyX 0.3 -> delikon
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
ID:0006
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
serverapp.Form1.resources
$this.Icon
[NBF]root.IconData
jj
[NBF]root.Data
serverapp.Properties.Resources.resources
glbt
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

kIPe.exe

Full Name

kIPe.exe

EntryPoint

System.Void serverapp.Program::Main(System.String[])

Scope Name

kIPe.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

kIPe

Assembly Version

4.0.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

99

Main Method

System.Void serverapp.Program::Main(System.String[])

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void serverapp.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

kIPe.exe

Full Name

kIPe.exe

EntryPoint

System.Void serverapp.Program::Main(System.String[])

Scope Name

kIPe.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

kIPe

Assembly Version

4.0.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

99

Main Method

System.Void serverapp.Program::Main(System.String[])

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void serverapp.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\ehNTfCHSkx\src\obj\Debug\kIPe.pdb

Embedded Resources

2

Suspicious Type Names (1-2 chars)

0

9355aefbbbaa5881a5f16b51a15b0d22 (811.02 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙