Suspicious
Suspect

eb4b02a893993533c04a7fdb2fdbbaa1

PE Executable
|
MD5: eb4b02a893993533c04a7fdb2fdbbaa1
|
Size: 966.14 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
eb4b02a893993533c04a7fdb2fdbbaa1
Sha1
6f0175173f707ec6b6c1adc62d155c65164300f9
Sha256
a0ca584b04cb5bf10188884c2225185cc8e3aa036f45a9bd3659365d84fbef26
Sha384
9a0aea75615d29c21a083a1afb816398fee0cd5cdc8d7c3575a2ea425df28970cb89b5595229ee2cc52b1f85f8079abe
Sha512
acba65507d6e2def75032652819cf03be856add9697f18903dc18b6f3aec3ae02a5c925794a5760f05efaac140c8fb27354fb1cf5a5ab530cdb6b6682eaaceb2
SSDeep
24576:TZe4CtKQW6s+fKWUSC00ru1a3SBh7BbX/zt+fVyc9P9:Ve4CtXfKrzu8wBbB+fH9
TLSH
DC2523A63609EB14CDA2E3B50321D2B563759F8DA802C3475AEFBCDB7A56F8315012D3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
Dijkstra.Form1.resources
$this.Icon
[NBF]root.IconData
M3
[NBF]root.Data
menuStrip1.TrayLocation
Dijkstra.FrmPercorsoMinimo.resources
Dijkstra.Properties.Resources.resources
AzUu
[NBF]root.Data
[NBF]root.Data-preview.png
aquamarine-circle
[NBF]root.Data
[NBF]root.Data-preview.png
red-circle
[NBF]root.Data
[NBF]root.Data-preview.png
yellow-circle
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

RwtZ.exe

Full Name

RwtZ.exe

EntryPoint

System.Void Dijkstra.Program::Main()

Scope Name

RwtZ.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

RwtZ

Assembly Version

3.2.1.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

109

Main Method

System.Void Dijkstra.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void Dijkstra.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

RwtZ.exe

Full Name

RwtZ.exe

EntryPoint

System.Void Dijkstra.Program::Main()

Scope Name

RwtZ.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

RwtZ

Assembly Version

3.2.1.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

109

Main Method

System.Void Dijkstra.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void Dijkstra.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\AoknyDKiOg\src\obj\Debug\RwtZ.pdb

Embedded Resources

7

Suspicious Type Names (1-2 chars)

0

eb4b02a893993533c04a7fdb2fdbbaa1 (966.14 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙