Suspect
dc338e96db51c5cd22f5137d4e65645a
PE Executable | MD5: dc338e96db51c5cd22f5137d4e65645a | Size: 857.6 KB | application/x-dosexec
PE Executable
MD5: dc338e96db51c5cd22f5137d4e65645a
Size: 857.6 KB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Very low
|
Hash | Hash Value |
|---|---|
| MD5 | dc338e96db51c5cd22f5137d4e65645a
|
| Sha1 | 87cc0d6079cf92d68ba5e8f5f7ccd3061a75f461
|
| Sha256 | 9c341781de4c4c960e81a588b48b6537658a89f7492ff46201d214ffb3691b24
|
| Sha384 | 765c87d16898c18bd65670f7e30ba93ac5f84cbd87ae6b4eca73c05ae8550984821ea032a5327b53bdce8ec43acb3346
|
| Sha512 | eb21c74f65a88645432980615e47c1879302dcf152a810ba3e3e685e8a5b0bf54f2f06bee32363317dcb67dc97278632bb6ae718d2be01fd33acfa51e27262e3
|
| SSDeep | 24576:yJDvUnVD4LjQlEcWuHw/7IUa7Fs25+wnesUUmc5x:yJgV6kjyRa7Fs8Jemn
|
| TLSH | 0805BD7431AD8863DA7952F04460D17533AB5ECF682AE2DA4DC6BDCB7CE4BC10B94A43
|
File Structure
dc338e96db51c5cd22f5137d4e65645a
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
QLDTDD_FPT.AM_Edit.resources
QLDTDD_FPT.Properties.Resources.resources
mNss
[NBF]root.Data
[NBF]root.Data-preview.png
QLDTDD_FPT.StaffManagementForm.resources
$this.Icon
[NBF]root.IconData
kc
[NBF]root.Data
Informations
|
Name0 | Value |
|---|---|
| Module Name | egsm.exe |
| Full Name | egsm.exe |
| EntryPoint | System.Void QLDTDD_FPT.Program::Main() |
| Scope Name | egsm.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | egsm |
| Assembly Version | 1.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 974 |
| Main Method | System.Void QLDTDD_FPT.Program::Main() |
| Main IL Instruction Count | 6 |
| Main IL | call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void QLDTDD_FPT.Mainform::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> |
Artefacts
|
Name0 | Value |
|---|---|
| PDB Path | egsm.pdb |
dc338e96db51c5cd22f5137d4e65645a (857.6 KB)
File Structure
dc338e96db51c5cd22f5137d4e65645a
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
QLDTDD_FPT.AM_Edit.resources
QLDTDD_FPT.Properties.Resources.resources
mNss
[NBF]root.Data
[NBF]root.Data-preview.png
QLDTDD_FPT.StaffManagementForm.resources
$this.Icon
[NBF]root.IconData
kc
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
Artefacts
|
Name0 | Value | Location |
|---|---|---|
| PDB Path | egsm.pdb |
dc338e96db51c5cd22f5137d4e65645a |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.