Suspicious
Suspect

dc99c00b1427a9a70d6d6da3368814cd

PE Executable
|
MD5: dc99c00b1427a9a70d6d6da3368814cd
|
Size: 558.59 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
dc99c00b1427a9a70d6d6da3368814cd
Sha1
7007c36a1ddf2e1d25850d0d87e2bc0e05d75b78
Sha256
9b8df0ab8e4701b23fbba918727eef9edb4449d7862f0bd3606b90db439f8ed8
Sha384
edf1705f435f1fbf8f9faff6ed1265fb1c18a12fd0f24c09e95afed178c501828767aa82de2b41a661c2dfeeea67baa2
Sha512
ef4caddedab4124328f00885e1767bd909d06a216de377996c378e2036b9ec9d1448adc8c88c40f4afb9976da6b260093f2fc0ea1615756e5fa62a159dbb7899
SSDeep
12288:pMnbzxyE8zGKQ03DSvJEM0R7svPc7cpdGnsov05RXl1qW:pMnbFyE8zfDUGMQkcgynr05RXiW
TLSH
68C4F10E68E38482C1AA3F748993C2794D743FEA5873C7D76FE63D8F3421A519913626

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
FrontEnd.MainForm.resources
$this.Icon
DQ
BackEndLibrary.Properties.Resources.resources
KrHu
Informations
Name
Value
Module Name

aPkT.exe

Full Name

aPkT.exe

EntryPoint

System.Void FrontEnd.Program::Main()

Scope Name

aPkT.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

aPkT

Assembly Version

25.174.802.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

228

Main Method

System.Void FrontEnd.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void FrontEnd.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

aPkT.exe

Full Name

aPkT.exe

EntryPoint

System.Void FrontEnd.Program::Main()

Scope Name

aPkT.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

aPkT

Assembly Version

25.174.802.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

228

Main Method

System.Void FrontEnd.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void FrontEnd.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
PDB Path

aPkT.pdb

Embedded Resources

2

Suspicious Type Names (1-2 chars)

0

dc99c00b1427a9a70d6d6da3368814cd (558.59 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
FrontEnd.MainForm.resources
$this.Icon
DQ
BackEndLibrary.Properties.Resources.resources
KrHu
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

aPkT.pdb

dc99c00b1427a9a70d6d6da3368814cd

Embedded Resources

2

dc99c00b1427a9a70d6d6da3368814cd

Suspicious Type Names (1-2 chars)

0

dc99c00b1427a9a70d6d6da3368814cd

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙