Suspicious
Suspect

5e140fcee3d7fad8a166eec17bbde312

PE Executable
|
MD5: 5e140fcee3d7fad8a166eec17bbde312
|
Size: 792.58 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
5e140fcee3d7fad8a166eec17bbde312
Sha1
e6e59ea781f63204c84388b007ad5ccb6e5b2abb
Sha256
71cc18003948de6d70cfef8ecad9a10d842c3c24d07488b7b1c040c39755fd2d
Sha384
c3c7aeb87b8205c2d00c14e6252752a6a33becaea0ececc89bf196a504c7d4c9abd2e76936302a711a064fed9d38985d
Sha512
3f8058b20d8abd918b55200a9260c92830b6419bc035c3e296803940c981df907252461f570de5a4dbaf12802e4badb3ec0c3915ec8ec4e863fac88a32231c82
SSDeep
24576:zyrHWw9VBA7d7Cto5efsD+k/lPhsjzY5:zCHX9nAFCtpvok
TLSH
C2F4120DF939FD25C50D4F76C2530A7881FA9C13F4A1F56BA8857AD22BB278890DAD43

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Module Name

mBuD.exe

Full Name

mBuD.exe

EntryPoint

System.Void DamassaProject.Program::Main()

Scope Name

mBuD.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

mBuD

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void DamassaProject.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] DamassaProject.fmrCadastro::Ⴗ stloc.2 <null> ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void DamassaProject.fmrListarUsuario::Ⴓ() ldc.i4 173 ldc.i4 170 call System.Void DamassaProject.Repositories.AdminstradorReposirory::Ⴗ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4 402 ldc.i4 398 call System.Void DamassaProject.fmrUsuario::Ⴐ(System.Boolean,System.Int32,System.Int32) ldloc.2 <null> ldc.i4.s 13 ldelem.u2 <null> ldc.i4 63658 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void DamassaProject.fmrListarUsuario::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void DamassaProject.Program::Main() pop <null> ret <null>

Module Name

mBuD.exe

Full Name

mBuD.exe

EntryPoint

System.Void DamassaProject.Program::Main()

Scope Name

mBuD.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

mBuD

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void DamassaProject.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] DamassaProject.fmrCadastro::Ⴗ stloc.2 <null> ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void DamassaProject.fmrListarUsuario::Ⴓ() ldc.i4 173 ldc.i4 170 call System.Void DamassaProject.Repositories.AdminstradorReposirory::Ⴗ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4 402 ldc.i4 398 call System.Void DamassaProject.fmrUsuario::Ⴐ(System.Boolean,System.Int32,System.Int32) ldloc.2 <null> ldc.i4.s 13 ldelem.u2 <null> ldc.i4 63658 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void DamassaProject.fmrListarUsuario::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void DamassaProject.Program::Main() pop <null> ret <null>

Artefacts
Name
Value
Embedded Resources

0

Suspicious Type Names (1-2 chars)

0

5e140fcee3d7fad8a166eec17bbde312 (792.58 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

0

5e140fcee3d7fad8a166eec17bbde312

Suspicious Type Names (1-2 chars)

0

5e140fcee3d7fad8a166eec17bbde312

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙