Suspicious
Suspect

c9c5f29c8f8870edfd7c6aa6e75d904c

PE Executable
|
MD5: c9c5f29c8f8870edfd7c6aa6e75d904c
|
Size: 993.79 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
c9c5f29c8f8870edfd7c6aa6e75d904c
Sha1
ff9d1f1dcd7f8d1f4b4c780509b4f5f0cb57f95d
Sha256
42752a7ab2c8594afdf8d2153d0d873dd5faf4d069e1643371c28e21f49b2e8f
Sha384
4c10f3c1dc88103bdda068089c103d1a4b68914b401d2ed0a4d3aea0a493318b00633a47af85746524c1caedf23cf48c
Sha512
2d3e6225fffe6bf2ac526829b426125cb39af9020e0e59d78e684bd874a9c21dfe9aff2f7a1f8dc9d7c593dbda4778c9be18cc65d3dd8b5f80c370936892bd7f
SSDeep
24576:8hUOJXeCtKsRzxsGNgPZeUZCqDBhE/Fv6W:8pXeCtxR/GZeUZFlhENyW
TLSH
A925584271A9E86AC57A8EF1C920D6F793716E07E219C28B0CE57ECBF4F1F060990657

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
ColoniaDePescadores.AreaDoPescador.resources
ColoniaDePescadores.FormProduto1.resources
$this.Icon
[NBF]root.IconData
ColoniaDePescadores.FormProduto2.resources
ColoniaDePescadores.FormProduto3.resources
ColoniaDePescadores.FormProduto4.resources
ColoniaDePescadores.FormProduto5.resources
ColoniaDePescadores.FrmMenu.resources
ColoniaDePescadores.Login.resources
chb
[NBF]root.Data
statusStrip1.TrayLocation
ColoniaDePescadores.Parceiros.resources
ColoniaDePescadores.Properties.Resources.resources
ACRE
[NBF]root.Data
[NBF]root.Data-preview.png
ALAGOAS
[NBF]root.Data
[NBF]root.Data-preview.png
AMAPÁ
[NBF]root.Data
[NBF]root.Data-preview.png
AMAZONAS
[NBF]root.Data
[NBF]root.Data-preview.png
BAHIA
[NBF]root.Data
[NBF]root.Data-preview.png
Banco-Itau
[NBF]root.Data
[NBF]root.Data-preview.png
Banco-Votorantim
[NBF]root.Data
[NBF]root.Data.exif
[NBF]root.Data-preview.png
Banco-do-Brasil
[NBF]root.Data
[NBF]root.Data-preview.png
Botão-limpar-limpo
[NBF]root.Data
[NBF]root.Data-preview.png
CnjW
[NBF]root.Data
[NBF]root.Data-preview.png
DISTRITO FEDERAL
[NBF]root.Data
[NBF]root.Data-preview.png
ESPÍRITO SANTO
[NBF]root.Data
[NBF]root.Data-preview.png
Finanças
[NBF]root.Data
[NBF]root.Data-preview.png
GOIÁS
[NBF]root.Data
[NBF]root.Data-preview.png
MARANHÃO
[NBF]root.Data
[NBF]root.Data-preview.png
MATO GROSSO DO SUL
[NBF]root.Data
[NBF]root.Data-preview.png
PARAÍBA
[NBF]root.Data
[NBF]root.Data-preview.png
PARÁ
[NBF]root.Data
[NBF]root.Data-preview.png
PIAUÍ
[NBF]root.Data
[NBF]root.Data-preview.png
RIO GRANDE DO SUL
[NBF]root.Data
[NBF]root.Data-preview.png
RONDÔNIA
[NBF]root.Data
[NBF]root.Data-preview.png
RORAIMA
[NBF]root.Data
[NBF]root.Data-preview.png
SERGIPE
[NBF]root.Data
[NBF]root.Data-preview.png
Sair do sistema
[NBF]root.Data
[NBF]root.Data-preview.png
SÃO PAULO
[NBF]root.Data
[NBF]root.Data-preview.png
TOCANTINS
[NBF]root.Data
[NBF]root.Data-preview.png
banco-do-nordeste
[NBF]root.Data
[NBF]root.Data-preview.png
botão cancelar
[NBF]root.Data
[NBF]root.Data-preview.png
categorias.
[NBF]root.Data
[NBF]root.Data-preview.png
clients
[NBF]root.Data
[NBF]root.Data-preview.png
conecte-se
[NBF]root.Data
[NBF]root.Data-preview.png
conexao-na-nuvem
[NBF]root.Data
[NBF]root.Data-preview.png
confirmar
[NBF]root.Data
[NBF]root.Data-preview.png
excluir
[NBF]root.Data
[NBF]root.Data-preview.png
eye
[NBF]root.Data
[NBF]root.Data-preview.png
financa
[NBF]root.Data
[NBF]root.Data-preview.png
funcionarios
[NBF]root.Data
[NBF]root.Data-preview.png
instagram
[NBF]root.Data
[NBF]root.Data-preview.png
interesse
[NBF]root.Data
[NBF]root.Data-preview.png
liberado
[NBF]root.Data
[NBF]root.Data-preview.png
lupa
[NBF]root.Data
[NBF]root.Data-preview.png
novo-documento
[NBF]root.Data
[NBF]root.Data-preview.png
pescador
[NBF]root.Data
[NBF]root.Data-preview.png
salve-
[NBF]root.Data
[NBF]root.Data-preview.png
santander-logo
[NBF]root.Data
[NBF]root.Data-preview.png
security
[NBF]root.Data
[NBF]root.Data-preview.png
taxaDeJuros
[NBF]root.Data
[NBF]root.Data-preview.png
troca
[NBF]root.Data
[NBF]root.Data-preview.png
twitter
[NBF]root.Data
[NBF]root.Data-preview.png
userLogin
[NBF]root.Data
[NBF]root.Data-preview.png
whatsapp
[NBF]root.Data
[NBF]root.Data-preview.png
x
[NBF]root.Data
[NBF]root.Data-preview.png
ColoniaDePescadores.Simulador.FormFinanciamento.resources
$this.Icon
[NBF]root.IconData
Informations
Name
Value
Module Name

HWKv.exe

Full Name

HWKv.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

HWKv.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

HWKv

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

HWKv.exe

Full Name

HWKv.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

HWKv.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

HWKv

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\iYrsSkPFzQ\src\obj\Debug\HWKv.pdb

Embedded Resources

14

Suspicious Type Names (1-2 chars)

0

c9c5f29c8f8870edfd7c6aa6e75d904c (993.79 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
ColoniaDePescadores.AreaDoPescador.resources
ColoniaDePescadores.FormProduto1.resources
$this.Icon
[NBF]root.IconData
ColoniaDePescadores.FormProduto2.resources
ColoniaDePescadores.FormProduto3.resources
ColoniaDePescadores.FormProduto4.resources
ColoniaDePescadores.FormProduto5.resources
ColoniaDePescadores.FrmMenu.resources
ColoniaDePescadores.Login.resources
chb
[NBF]root.Data
statusStrip1.TrayLocation
ColoniaDePescadores.Parceiros.resources
ColoniaDePescadores.Properties.Resources.resources
ACRE
[NBF]root.Data
[NBF]root.Data-preview.png
ALAGOAS
[NBF]root.Data
[NBF]root.Data-preview.png
AMAPÁ
[NBF]root.Data
[NBF]root.Data-preview.png
AMAZONAS
[NBF]root.Data
[NBF]root.Data-preview.png
BAHIA
[NBF]root.Data
[NBF]root.Data-preview.png
Banco-Itau
[NBF]root.Data
[NBF]root.Data-preview.png
Banco-Votorantim
[NBF]root.Data
[NBF]root.Data.exif
[NBF]root.Data-preview.png
Banco-do-Brasil
[NBF]root.Data
[NBF]root.Data-preview.png
Botão-limpar-limpo
[NBF]root.Data
[NBF]root.Data-preview.png
CnjW
[NBF]root.Data
[NBF]root.Data-preview.png
DISTRITO FEDERAL
[NBF]root.Data
[NBF]root.Data-preview.png
ESPÍRITO SANTO
[NBF]root.Data
[NBF]root.Data-preview.png
Finanças
[NBF]root.Data
[NBF]root.Data-preview.png
GOIÁS
[NBF]root.Data
[NBF]root.Data-preview.png
MARANHÃO
[NBF]root.Data
[NBF]root.Data-preview.png
MATO GROSSO DO SUL
[NBF]root.Data
[NBF]root.Data-preview.png
PARAÍBA
[NBF]root.Data
[NBF]root.Data-preview.png
PARÁ
[NBF]root.Data
[NBF]root.Data-preview.png
PIAUÍ
[NBF]root.Data
[NBF]root.Data-preview.png
RIO GRANDE DO SUL
[NBF]root.Data
[NBF]root.Data-preview.png
RONDÔNIA
[NBF]root.Data
[NBF]root.Data-preview.png
RORAIMA
[NBF]root.Data
[NBF]root.Data-preview.png
SERGIPE
[NBF]root.Data
[NBF]root.Data-preview.png
Sair do sistema
[NBF]root.Data
[NBF]root.Data-preview.png
SÃO PAULO
[NBF]root.Data
[NBF]root.Data-preview.png
TOCANTINS
[NBF]root.Data
[NBF]root.Data-preview.png
banco-do-nordeste
[NBF]root.Data
[NBF]root.Data-preview.png
botão cancelar
[NBF]root.Data
[NBF]root.Data-preview.png
categorias.
[NBF]root.Data
[NBF]root.Data-preview.png
clients
[NBF]root.Data
[NBF]root.Data-preview.png
conecte-se
[NBF]root.Data
[NBF]root.Data-preview.png
conexao-na-nuvem
[NBF]root.Data
[NBF]root.Data-preview.png
confirmar
[NBF]root.Data
[NBF]root.Data-preview.png
excluir
[NBF]root.Data
[NBF]root.Data-preview.png
eye
[NBF]root.Data
[NBF]root.Data-preview.png
financa
[NBF]root.Data
[NBF]root.Data-preview.png
funcionarios
[NBF]root.Data
[NBF]root.Data-preview.png
instagram
[NBF]root.Data
[NBF]root.Data-preview.png
interesse
[NBF]root.Data
[NBF]root.Data-preview.png
liberado
[NBF]root.Data
[NBF]root.Data-preview.png
lupa
[NBF]root.Data
[NBF]root.Data-preview.png
novo-documento
[NBF]root.Data
[NBF]root.Data-preview.png
pescador
[NBF]root.Data
[NBF]root.Data-preview.png
salve-
[NBF]root.Data
[NBF]root.Data-preview.png
santander-logo
[NBF]root.Data
[NBF]root.Data-preview.png
security
[NBF]root.Data
[NBF]root.Data-preview.png
taxaDeJuros
[NBF]root.Data
[NBF]root.Data-preview.png
troca
[NBF]root.Data
[NBF]root.Data-preview.png
twitter
[NBF]root.Data
[NBF]root.Data-preview.png
userLogin
[NBF]root.Data
[NBF]root.Data-preview.png
whatsapp
[NBF]root.Data
[NBF]root.Data-preview.png
x
[NBF]root.Data
[NBF]root.Data-preview.png
ColoniaDePescadores.Simulador.FormFinanciamento.resources
$this.Icon
[NBF]root.IconData
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\iYrsSkPFzQ\src\obj\Debug\HWKv.pdb

c9c5f29c8f8870edfd7c6aa6e75d904c

Embedded Resources

14

c9c5f29c8f8870edfd7c6aa6e75d904c

Suspicious Type Names (1-2 chars)

0

c9c5f29c8f8870edfd7c6aa6e75d904c

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙