Suspect
95e52b9143ffac2aa9f673c167644167
PE Executable | MD5: 95e52b9143ffac2aa9f673c167644167 | Size: 786.95 KB | application/x-dosexec
PE Executable
MD5: 95e52b9143ffac2aa9f673c167644167
Size: 786.95 KB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Low
|
Hash | Hash Value |
|---|---|
| MD5 | 95e52b9143ffac2aa9f673c167644167
|
| Sha1 | 3f5ac943bd427627e2336db57976426c44edd467
|
| Sha256 | db7c69795df802060ba5ffc482dccfe9d35881974920462987573c6efb61abe0
|
| Sha384 | 835edde3d32266afab37ca494cadc72f2770488e513cda89e47e082fa63751d4f141da877fb4b35e1b5f0c8f91fcede5
|
| Sha512 | 662637a953219ba02ee5b85fe6edb4467a67b89389906583d487ef4ae2b8bab014b42b533503ef6ef7e24576d9957adfbc85d7e15998cc0221ee640b50bc5bc9
|
| SSDeep | 12288:FrzDmrP6XWW4PjVSD5+VKluDH43nbEL+rE4sZQY2kR:F77j4AD5f06gUG
|
| TLSH | 2FF40143722C9B5DD2A68F727931C27103A8AF97A511EA1ABFD5FC9F787065C58023C2
|
File Structure
95e52b9143ffac2aa9f673c167644167
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
kov
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
|
Name0 | Value |
|---|---|
| Module Name | uIK.exe |
| Full Name | uIK.exe |
| EntryPoint | System.Void SmartNote.Program::Main() |
| Scope Name | uIK.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | uIK |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 210 |
| Main Method | System.Void SmartNote.Program::Main() |
| Main IL Instruction Count | 10 |
| Main IL | nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void SmartNote.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null> |
Artefacts
|
Name0 | Value |
|---|---|
| PDB Path | uIK.pdb |
95e52b9143ffac2aa9f673c167644167 (786.95 KB)
File Structure
95e52b9143ffac2aa9f673c167644167
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
SmartNote.Properties.Resources.resources
NA
[NBF]root.Data
Winken_nach_Rechts
[NBF]root.Data
[NBF]root.Data-preview.png
YouTube_Logo
[NBF]root.Data
[NBF]root.Data-preview.png
kov
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
|
Name0 | Value | Location |
|---|---|---|
| PDB Path | uIK.pdb |
95e52b9143ffac2aa9f673c167644167 |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.