Suspicious
Suspect

c01b791efcab90ee653440f2937ce08e

PE Executable
|
MD5: c01b791efcab90ee653440f2937ce08e
|
Size: 779.27 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
c01b791efcab90ee653440f2937ce08e
Sha1
09585a19dbb0085b35e0682d55d09b9a09930048
Sha256
3ea76059e7a7c8562249727bcc3c9644e9d22888f2cfe2967b60ae3cb366bed3
Sha384
335d1fff74ea5fd9e126bd429d87c20e8a0da5c55d20ee64de1a249838afa18a09c956bdd7487f311259a00770ea76c5
Sha512
485ecbf7b62210e4a58c5513e805ab39e8284f561039cb42e4717e23c8c99c91682fe3728f4a7bae3d427d1cb2f576277672fe4925de2ada8647116aa72bf2a2
SSDeep
12288:OoMrXpXHZOg03h61lHAk5+ZUHJnhTD3uZD9tXIOLZhZiQNkR:YBYg03A1Oe+ZUHJtbImOLZbrQ
TLSH
BDF4015133E9EB02D4B64BF40970D3B05731AEA8B521D31A8EF6ACDF3D35B412A4A257

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0.exif
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
MarcarConsulta.marcaConsulta.resources
bindingNavigatorAddNewItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorDeleteItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMoveFirstItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMoveLastItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMoveNextItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMovePreviousItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
tableBindingNavigatorSaveItem.Image
Project1_Lagrange_Naydanov_I.MainForm.resources
$this.Icon
[NBF]root.IconData
WR
[NBF]root.Data
MarcarConsulta.menu.resources
MarcarConsulta.Properties.Resources.resources
tUcO
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xBAE00 size 13832 bytes

Info

PDB Path: C:\Users\Administrator\Desktop\Client\Temp\JUERooCcsk\src\obj\Debug\uOQh.pdb

Module Name

uOQh.exe

Full Name

uOQh.exe

EntryPoint

System.Void MarcarConsulta.Program::Main()

Scope Name

uOQh.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

uOQh

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

676

Main Method

System.Void MarcarConsulta.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void MarcarConsulta.menu::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

uOQh.exe

Full Name

uOQh.exe

EntryPoint

System.Void MarcarConsulta.Program::Main()

Scope Name

uOQh.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

uOQh

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

676

Main Method

System.Void MarcarConsulta.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void MarcarConsulta.menu::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

c01b791efcab90ee653440f2937ce08e (779.27 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0.exif
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
MarcarConsulta.marcaConsulta.resources
bindingNavigatorAddNewItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorDeleteItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMoveFirstItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMoveLastItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMoveNextItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
bindingNavigatorMovePreviousItem.Image
[NBF]root.Data
[NBF]root.Data-preview.png
tableBindingNavigatorSaveItem.Image
Project1_Lagrange_Naydanov_I.MainForm.resources
$this.Icon
[NBF]root.IconData
WR
[NBF]root.Data
MarcarConsulta.menu.resources
MarcarConsulta.Properties.Resources.resources
tUcO
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙