Suspicious
Suspect

1220f469c2eb6bb8dcf5f6a8f8752b77

PE Executable
|
MD5: 1220f469c2eb6bb8dcf5f6a8f8752b77
|
Size: 1.03 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
1220f469c2eb6bb8dcf5f6a8f8752b77
Sha1
087a3ef41c82252d5a8aa3daf68aab7e6c59db24
Sha256
e3750bd48a04d202323c8e4c8947a20be205b534fd45c6fde02d0c9e034cbfff
Sha384
008c32956331ce78b40954e9799b6d70b65083b3305c1cb23e0f0b5e94fdb2732b906d620e3d6da316e2e2666acf8886
Sha512
5126fc5d5bc7feceade0075846515172198f0960b6f5a332e84842c34f567c1443b676594a8772cf9ab19d5e7c9573a24458c7897795345864bcc1f4dbc9876f
SSDeep
24576:hjbVvce3MMK9kv4g1VfRTZ94x4XImWdWelTYU9npNkP9zTq:BRRFQgRjNpelTYwIP9zu
TLSH
05251289D653DE03D4E70BBC23AAC47A1A366FCA9056C74E4ED63DE7B5B37800984706

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
Private EXE Protector V2.30-V2.3X -> SetiSoft Team
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Informations
Name
Value
Module Name

DCBa.exe

Full Name

DCBa.exe

EntryPoint

System.Void WindowsFormsApp51.Program::Main()

Scope Name

DCBa.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

DCBa

Assembly Version

5.6.14.2

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

218

Main Method

System.Void WindowsFormsApp51.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void WindowsFormsApp51.StudentsManagerForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

DCBa.exe

Full Name

DCBa.exe

EntryPoint

System.Void WindowsFormsApp51.Program::Main()

Scope Name

DCBa.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

DCBa

Assembly Version

5.6.14.2

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

218

Main Method

System.Void WindowsFormsApp51.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void WindowsFormsApp51.StudentsManagerForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
Embedded Resources

6

Suspicious Type Names (1-2 chars)

0

1220f469c2eb6bb8dcf5f6a8f8752b77 (1.03 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

6

1220f469c2eb6bb8dcf5f6a8f8752b77

Suspicious Type Names (1-2 chars)

0

1220f469c2eb6bb8dcf5f6a8f8752b77

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙