Suspicious
Suspect

b59411ae5a7be3414b752da2aecde2fd

PE Executable
|
MD5: b59411ae5a7be3414b752da2aecde2fd
|
Size: 699.39 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
b59411ae5a7be3414b752da2aecde2fd
Sha1
eb9959e5a2d3757de2dabd26aa8909b42db479f6
Sha256
bb4fbfd0d632cea719766579d8f621be71c73db90897864722e0738d0a94d6b1
Sha384
2ded6e2956744113f0bcde4e0a98767f2575deaec32074787db095f172c8bfa1313561f33d6216a45aea271f0b92f0a2
Sha512
d578d9ec4340f7d71970826e5cb53499da98f755c16d1b23377f742cb6ea96421de309d81c678dcab38f0a0b01246884031a637b551bc44906e6704f6b31f680
SSDeep
12288:ge3ND4W9Was+b+tDvw9VWZj3aDv3OrjTerjMxSo0km6okm8ryuZ2jzD+:NND4WCtDvwE37CMh0BB8/Z2jz
TLSH
0EE4126A364C8417D09566F24467E33603BC4D6FE692C385EAE6ECEB350B7606A083D3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
 .resources
 .resources
$this.Icon
[NBF]root.IconData
PIP
[NBF]root.Data
timer1.TrayLocation
Cycle_Jump_Game.Properties.Resources.resources
hGkX
[NBF]root.Data
[NBF]root.Data-preview.png
t1
[NBF]root.Data
[NBF]root.Data-preview.png
t2
[NBF]root.Data
[NBF]root.Data-preview.png
 ​     ​​     
Informations
Name
Value
Module Name

UCUz.exe

Full Name

UCUz.exe

EntryPoint

System.Void  ::()

Scope Name

UCUz.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

UCUz

Assembly Version

7.8.5.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

0

Main Method

System.Void  ::()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void  ::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

UCUz.exe

Full Name

UCUz.exe

EntryPoint

System.Void  ::()

Scope Name

UCUz.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

UCUz

Assembly Version

7.8.5.5

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

0

Main Method

System.Void  ::()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void  ::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

b59411ae5a7be3414b752da2aecde2fd (699.39 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
 .resources
 .resources
$this.Icon
[NBF]root.IconData
PIP
[NBF]root.Data
timer1.TrayLocation
Cycle_Jump_Game.Properties.Resources.resources
hGkX
[NBF]root.Data
[NBF]root.Data-preview.png
t1
[NBF]root.Data
[NBF]root.Data-preview.png
t2
[NBF]root.Data
[NBF]root.Data-preview.png
 ​     ​​     
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙