Suspicious
Suspect

decde5da27a7702bb256b418428e90dd

PE Executable
|
MD5: decde5da27a7702bb256b418428e90dd
|
Size: 1.18 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
decde5da27a7702bb256b418428e90dd
Sha1
41726a16f241c8ae0c523527b5d9ed4fce6c382c
Sha256
887a04c14e639bee44b1ebe4c110004818f8f33d2fb1ab14e88fa25fa44fc88a
Sha384
e6c7e6a59a5db3a407801ce9bf032b168b5c242d2f95b5d3ed51ff02f809b9e4912d44009f5856b03bb63d25ef6a9d2f
Sha512
e99111edc4c4e0b8742aa99fedcf1f9c65599eeb2d988ed2ef005e795675a935dfdeb5e81378a1f86c6a6238a7edb7506723a8ec2b9b0e41fac1ba2d69e5c2a5
SSDeep
24576:XhSkJXeCtKcRzdhE/Fv6zdnL+USi/y2mJlytCF:XbXeCt1RxhENyztL+w/nmJ8q
TLSH
03458A4271A5E86AC2768EF1C961D6F383716E07E618C28B0CEA7DCBF4F1F060994657

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
ColoniaDePescadores.AreaDoPescador.resources
ColoniaDePescadores.FormProduto1.resources
$this.Icon
[NBF]root.IconData
ColoniaDePescadores.FormProduto2.resources
ColoniaDePescadores.FormProduto3.resources
ColoniaDePescadores.FormProduto4.resources
ColoniaDePescadores.FormProduto5.resources
ColoniaDePescadores.FrmMenu.resources
ColoniaDePescadores.Login.resources
chb
[NBF]root.Data
statusStrip1.TrayLocation
ColoniaDePescadores.Parceiros.resources
ColoniaDePescadores.Properties.Resources.resources
ACRE
[NBF]root.Data
[NBF]root.Data-preview.png
ALAGOAS
[NBF]root.Data
[NBF]root.Data-preview.png
AMAPÁ
[NBF]root.Data
[NBF]root.Data-preview.png
AMAZONAS
[NBF]root.Data
[NBF]root.Data-preview.png
BAHIA
[NBF]root.Data
[NBF]root.Data-preview.png
Banco-Itau
[NBF]root.Data
[NBF]root.Data-preview.png
Banco-Votorantim
[NBF]root.Data
[NBF]root.Data.exif
[NBF]root.Data-preview.png
Banco-do-Brasil
[NBF]root.Data
[NBF]root.Data-preview.png
Botão-limpar-limpo
[NBF]root.Data
[NBF]root.Data-preview.png
DISTRITO FEDERAL
[NBF]root.Data
[NBF]root.Data-preview.png
ESPÍRITO SANTO
[NBF]root.Data
[NBF]root.Data-preview.png
Finanças
[NBF]root.Data
[NBF]root.Data-preview.png
GOIÁS
[NBF]root.Data
[NBF]root.Data-preview.png
MARANHÃO
[NBF]root.Data
[NBF]root.Data-preview.png
MATO GROSSO DO SUL
[NBF]root.Data
[NBF]root.Data-preview.png
PARAÍBA
[NBF]root.Data
[NBF]root.Data-preview.png
PARÁ
[NBF]root.Data
[NBF]root.Data-preview.png
PIAUÍ
[NBF]root.Data
[NBF]root.Data-preview.png
RIO GRANDE DO SUL
[NBF]root.Data
[NBF]root.Data-preview.png
RONDÔNIA
[NBF]root.Data
[NBF]root.Data-preview.png
RORAIMA
[NBF]root.Data
[NBF]root.Data-preview.png
SERGIPE
[NBF]root.Data
[NBF]root.Data-preview.png
Sair do sistema
[NBF]root.Data
[NBF]root.Data-preview.png
SÃO PAULO
[NBF]root.Data
[NBF]root.Data-preview.png
TOCANTINS
[NBF]root.Data
[NBF]root.Data-preview.png
banco-do-nordeste
[NBF]root.Data
[NBF]root.Data-preview.png
botão cancelar
[NBF]root.Data
[NBF]root.Data-preview.png
categorias.
[NBF]root.Data
[NBF]root.Data-preview.png
clients
[NBF]root.Data
[NBF]root.Data-preview.png
conecte-se
[NBF]root.Data
[NBF]root.Data-preview.png
conexao-na-nuvem
[NBF]root.Data
[NBF]root.Data-preview.png
confirmar
[NBF]root.Data
[NBF]root.Data-preview.png
excluir
[NBF]root.Data
[NBF]root.Data-preview.png
eye
[NBF]root.Data
[NBF]root.Data-preview.png
financa
[NBF]root.Data
[NBF]root.Data-preview.png
funcionarios
[NBF]root.Data
[NBF]root.Data-preview.png
instagram
[NBF]root.Data
[NBF]root.Data-preview.png
interesse
[NBF]root.Data
[NBF]root.Data-preview.png
liberado
[NBF]root.Data
[NBF]root.Data-preview.png
lupa
[NBF]root.Data
[NBF]root.Data-preview.png
novo-documento
[NBF]root.Data
[NBF]root.Data-preview.png
pescador
[NBF]root.Data
[NBF]root.Data-preview.png
salve-
[NBF]root.Data
[NBF]root.Data-preview.png
santander-logo
[NBF]root.Data
[NBF]root.Data-preview.png
security
[NBF]root.Data
[NBF]root.Data-preview.png
taxaDeJuros
[NBF]root.Data
[NBF]root.Data-preview.png
troca
[NBF]root.Data
[NBF]root.Data-preview.png
twitter
[NBF]root.Data
[NBF]root.Data-preview.png
userLogin
[NBF]root.Data
[NBF]root.Data-preview.png
vosz
[NBF]root.Data
[NBF]root.Data-preview.png
whatsapp
[NBF]root.Data
[NBF]root.Data-preview.png
x
[NBF]root.Data
[NBF]root.Data-preview.png
ColoniaDePescadores.Simulador.FormFinanciamento.resources
$this.Icon
[NBF]root.IconData
Informations
Name
Value
Module Name

blTi.exe

Full Name

blTi.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

blTi.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

blTi

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

blTi.exe

Full Name

blTi.exe

EntryPoint

System.Void ColoniaDePescadores.Program::Main()

Scope Name

blTi.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

blTi

Assembly Version

25.4.127.89

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

1731

Main Method

System.Void ColoniaDePescadores.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void ColoniaDePescadores.Login::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
PDB Path

C:\Users\Administrator\Desktop\Client\Temp\yGhpjPvlmc\src\obj\Debug\blTi.pdb

Embedded Resources

14

Suspicious Type Names (1-2 chars)

0

decde5da27a7702bb256b418428e90dd (1.18 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙