Suspicious
Suspect

a69a4bbef2e7b56035f293aa96ec4cb1

PE Executable
|
MD5: a69a4bbef2e7b56035f293aa96ec4cb1
|
Size: 696.32 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
a69a4bbef2e7b56035f293aa96ec4cb1
Sha1
e10532a8048366b1b994548fe45ce656a4625655
Sha256
472fb5d88ea319f9f9c93e9660a6ee9ddc8012ebecddb1ae613be6c399f50c64
Sha384
a98246afd2a6560d7a226276bb37cfcdd261ccc2954de92bd1bc68948249d31800918b81ad3fefc2e43c54434ff807d7
Sha512
1fefaa569b045c628bb89215794fb53b712fb128e4bdaf2a17a4f5e1075200d11784890297df259e6bac8e0161ab8cad071b275b0631222c1b21da66713d2544
SSDeep
12288:fjb3oFQ0EPs+D5ZnBh6B0xQdpbj1lylLgT3:fjbUQT0+jBWjjy5c
TLSH
52E40155D543CD16D1AB1BBD1BA6C1361A36AFCE9026C74E4FD23DBBB8B73812680702

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
Private EXE Protector V2.30-V2.3X -> SetiSoft Team
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
WindowsFormsApp51.StudentInfoForm.resources
WindowsFormsApp51.StudentsManagerForm.resources
$this.Icon
xsh
WindowsFormsApp51.Properties.Resources.resources
qxIg
Database.StudentsManagerModel.csdl
Database.StudentsManagerModel.msl
Database.StudentsManagerModel.ssdl
Informations
Name
Value
Module Name

DkUl.exe

Full Name

DkUl.exe

EntryPoint

System.Void WindowsFormsApp51.Program::Main()

Scope Name

DkUl.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

DkUl

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

218

Main Method

System.Void WindowsFormsApp51.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void WindowsFormsApp51.StudentsManagerForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

DkUl.exe

Full Name

DkUl.exe

EntryPoint

System.Void WindowsFormsApp51.Program::Main()

Scope Name

DkUl.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

DkUl

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

218

Main Method

System.Void WindowsFormsApp51.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void WindowsFormsApp51.StudentsManagerForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
PDB Path

DkUl.pdb

Embedded Resources

6

Suspicious Type Names (1-2 chars)

0

a69a4bbef2e7b56035f293aa96ec4cb1 (696.32 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
WindowsFormsApp51.StudentInfoForm.resources
WindowsFormsApp51.StudentsManagerForm.resources
$this.Icon
xsh
WindowsFormsApp51.Properties.Resources.resources
qxIg
Database.StudentsManagerModel.csdl
Database.StudentsManagerModel.msl
Database.StudentsManagerModel.ssdl
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

DkUl.pdb

a69a4bbef2e7b56035f293aa96ec4cb1

Embedded Resources

6

a69a4bbef2e7b56035f293aa96ec4cb1

Suspicious Type Names (1-2 chars)

0

a69a4bbef2e7b56035f293aa96ec4cb1

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙