Suspicious
Suspect

c4ce018ef2e19386e65b6889c1a76dbf

PE Executable
|
MD5: c4ce018ef2e19386e65b6889c1a76dbf
|
Size: 718.85 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
c4ce018ef2e19386e65b6889c1a76dbf
Sha1
d09cbce6d4e5b54c5db90ad0d46ab12b38b0c7c5
Sha256
08f7864a5211d2bdbe0660a5d7290ac384b3161fcd9b4a3213b3bb5f92013e99
Sha384
f940e207d12720e9a1c812c1259a2c71c7367fbe0c74f4bbbc873475302482957d1bcaaa2c7f47b40b1aeaa1a56ee439
Sha512
6f1ae4dca5be30929f5d7d240064e20ee4011698b38ba5035cc544b39bf960ff20e26f8f364d48252a6b929649d782e786bf6397dbb82c937d68a4878a934936
SSDeep
12288:BDdMlYoOAXdkNddO7gTMBpPtLnYUs+fNbGfd6RVU5zWRk95aO+23z+U0lz931vX3:13k0+9BhWUN1a6RVU5B3z+H5956yv
TLSH
35E4128EB782B657CA1D0F7BC107601646F48C5AEA75F37569D46CEB2A3DE84C20B603

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

inXZ.exe

Full Name

inXZ.exe

EntryPoint

System.Void SpeedType.Program::Main()

Scope Name

inXZ.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

inXZ

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void SpeedType.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void SpeedType.FormJuego::Ⴗ() ldc.i4 437 ldc.i4 486 call System.Void SpeedType.FormJuego::Ⴓ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 540 ldc.i4 521 call System.Void SpeedType.FormEstadisticas::Ⴍ(System.Boolean,System.Int32,System.Int32) ldc.i4.4 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void SpeedType.FormMenuPrincipal::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void SpeedType.Program::Main() pop <null> ret <null>

Module Name

inXZ.exe

Full Name

inXZ.exe

EntryPoint

System.Void SpeedType.Program::Main()

Scope Name

inXZ.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

inXZ

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void SpeedType.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void SpeedType.FormJuego::Ⴗ() ldc.i4 437 ldc.i4 486 call System.Void SpeedType.FormJuego::Ⴓ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 540 ldc.i4 521 call System.Void SpeedType.FormEstadisticas::Ⴍ(System.Boolean,System.Int32,System.Int32) ldc.i4.4 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void SpeedType.FormMenuPrincipal::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void SpeedType.Program::Main() pop <null> ret <null>

c4ce018ef2e19386e65b6889c1a76dbf (718.85 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙