180133a8370c6887883f1cedf06f69d8
PE Executable | MD5: 180133a8370c6887883f1cedf06f69d8 | Size: 864.78 KB | application/x-dosexec
Symbol Ofbuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 180133a8370c6887883f1cedf06f69d8
|
| Sha1 | 94d207ce48198edd5c198b0381706dc70002987c
|
| Sha256 | d41a54ee9f6f0de81009d98955fdd03cc7458ef3089bd4d21f8a1fc167f72928
|
| Sha384 | 93f2d97389cdd1a1a0bea70d5cf54e78f47f29dd94f2359a90998ee92127dd241fe8e154ad303d0d0d92cfc0849eb7f8
|
| Sha512 | 1d886882a627810a9e138cc332cfa97003ff2433a305f3d2e12a881fa65c17bb942100802165b684f74721c1e9c224a13804a205248d792f97bf98bcb8fde9f5
|
| SSDeep | 24576:E+up/+8zn8TTOCi9+MNxLpzmwQvQRkzAdKh93r5:otz8PuPcvQ+Edi
|
| TLSH | 080501983618B19FC953C9718998ED309B317CAA431BC30381EB5CDBB98D696DE145F3
|
PeID
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | Authenticode present at 0xCFC00 size 13832 bytes |
| Module Name | DhjUgw.exe |
| Full Name | DhjUgw.exe |
| EntryPoint | System.Void JuegoRompeLadrillos.Program::Main() |
| Scope Name | DhjUgw.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | DhjUgw |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 102 |
| Main Method | System.Void JuegoRompeLadrillos.Program::Main() |
| Main IL Instruction Count | 43 |
| Main IL | nop <null> ldc.i4 1838544544 ldc.i4 1062331617 xor <null> dup <null> stloc.0 <null> ldc.i4.6 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_0083: ret call System.Void JuegoRompeLadrillos.Program::() nop <null> ldloc.0 <null> ldc.i4 -1428939911 mul <null> ldc.i4 2049459795 xor <null> br.s IL_0006: ldc.i4 1062331617 newobj System.Void JuegoRompeLadrillos.FormMenuPrincipal::.ctor() call System.Void JuegoRompeLadrillos.Program::(System.Windows.Forms.Form) nop <null> ldloc.0 <null> ldc.i4 234249235 mul <null> ldc.i4 1541125865 xor <null> br.s IL_0006: ldc.i4 1062331617 ldc.i4.0 <null> call System.Void JuegoRompeLadrillos.Program::(System.Boolean) ldloc.0 <null> ldc.i4 -214887140 mul <null> ldc.i4 -751603650 xor <null> br.s IL_0006: ldc.i4 1062331617 nop <null> ldloc.0 <null> ldc.i4 -116520604 mul <null> ldc.i4 -404744071 xor <null> br.s IL_0006: ldc.i4 1062331617 ret <null> |
| Module Name | DhjUgw.exe |
| Full Name | DhjUgw.exe |
| EntryPoint | System.Void JuegoRompeLadrillos.Program::Main() |
| Scope Name | DhjUgw.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | DhjUgw |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 102 |
| Main Method | System.Void JuegoRompeLadrillos.Program::Main() |
| Main IL Instruction Count | 43 |
| Main IL | nop <null> ldc.i4 1838544544 ldc.i4 1062331617 xor <null> dup <null> stloc.0 <null> ldc.i4.6 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_0083: ret call System.Void JuegoRompeLadrillos.Program::() nop <null> ldloc.0 <null> ldc.i4 -1428939911 mul <null> ldc.i4 2049459795 xor <null> br.s IL_0006: ldc.i4 1062331617 newobj System.Void JuegoRompeLadrillos.FormMenuPrincipal::.ctor() call System.Void JuegoRompeLadrillos.Program::(System.Windows.Forms.Form) nop <null> ldloc.0 <null> ldc.i4 234249235 mul <null> ldc.i4 1541125865 xor <null> br.s IL_0006: ldc.i4 1062331617 ldc.i4.0 <null> call System.Void JuegoRompeLadrillos.Program::(System.Boolean) ldloc.0 <null> ldc.i4 -214887140 mul <null> ldc.i4 -751603650 xor <null> br.s IL_0006: ldc.i4 1062331617 nop <null> ldloc.0 <null> ldc.i4 -116520604 mul <null> ldc.i4 -404744071 xor <null> br.s IL_0006: ldc.i4 1062331617 ret <null> |
|
Name0 | Value |
|---|---|
| URLs in VB Code - #1 | http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
| URLs in VB Code - #2 | http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$ |
| URLs in VB Code - #3 | http://ocsp.comodoca.com0 |
| URLs in VB Code - #4 | https://secure.comodo.net/CPS0C |
| URLs in VB Code - #5 | http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
| URLs in VB Code - #6 | http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$ |
| URLs in VB Code - #7 | http://www.usertrust.com1 |
| URLs in VB Code - #8 | http://crl.usertrust.com/UTN-USERFirst-Object.crl05 |
| URLs in VB Code - #9 | http://ocsp.usertrust.com0 |
| URLs in VB Code - #10 | https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
|
Name0 | Value | Location |
|---|---|---|
| URLs in VB Code - #1 | http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #2 | http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$ |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #3 | http://ocsp.comodoca.com0 |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #4 | https://secure.comodo.net/CPS0C |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #5 | http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #6 | http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$ |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #7 | http://www.usertrust.com1 |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #8 | http://crl.usertrust.com/UTN-USERFirst-Object.crl05 |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #9 | http://ocsp.usertrust.com0 |
180133a8370c6887883f1cedf06f69d8 |
| URLs in VB Code - #10 | https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
180133a8370c6887883f1cedf06f69d8 |