Suspect
e133e0d1291c2ecb5ff602629e3029ea
PE Executable | MD5: e133e0d1291c2ecb5ff602629e3029ea | Size: 1.05 MB | application/x-dosexec
PE Executable
MD5: e133e0d1291c2ecb5ff602629e3029ea
Size: 1.05 MB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Medium
|
Hash | Hash Value |
|---|---|
| MD5 | e133e0d1291c2ecb5ff602629e3029ea
|
| Sha1 | 9f9d8cdb4162cd5edc42d60770ddca27d9654964
|
| Sha256 | a430f5b9c6c4199bd7b9885f3435b0ac1bd6afdca74530a62c8afac41c9f4978
|
| Sha384 | 5efba4b88ead1b3d65c06edf6cee3d61be82eea33a40d5feeab3687d22a688542d133f8d1cd484354f058ef9c5607fe6
|
| Sha512 | c8e7bee4b2ad0a4a741a6328ac4d66bf44519cd0d9c69622c2fa94b46cdcfe5fa56aa4f7c8ebc0e88b2548a3d941a35fd20f393a2cdecb36edc3fb936fc52972
|
| SSDeep | 24576:1nnf4iCHU9v1UrgmDnce6yJjzrhHmvc1xQlSqqSHbzQ/sg7S:5f9C09ODce6+XZ0cvWx7c0g7
|
| TLSH | 792512907201D913C99417F48D6AE7FC62782F9AB930EE06FAE97DDB7839704A447243
|
PeID
Microsoft Visual C++ v6.0 DLL
File Structure
e133e0d1291c2ecb5ff602629e3029ea
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Calculator_Project.Calculator.resources
$this.Icon
[NBF]root.IconData
greyder
[NBF]root.Data
Login_And_Register_Form.registerForm.resources
pictureBox1.Image
[NBF]root.Data
[NBF]root.Data-preview.png
pictureBox2.Image
[NBF]root.Data
[NBF]root.Data-preview.png
Login_And_Register_Form.frmLogin.resources
Login_And_Register_Form.Properties.Resources.resources
mXr
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
|
Name0 | Value |
|---|---|
| Module Name | JZE.exe |
| Full Name | JZE.exe |
| EntryPoint | System.Void Login_And_Register_Form.Program::Main() |
| Scope Name | JZE.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | JZE |
| Assembly Version | 6.3.1.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 174 |
| Main Method | System.Void Login_And_Register_Form.Program::Main() |
| Main IL Instruction Count | 10 |
| Main IL | nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void Login_And_Register_Form.registerForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null> |
Artefacts
|
Name0 | Value |
|---|---|
| PDB Path | JZE.pdb |
e133e0d1291c2ecb5ff602629e3029ea (1.05 MB)
File Structure
e133e0d1291c2ecb5ff602629e3029ea
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Calculator_Project.Calculator.resources
$this.Icon
[NBF]root.IconData
greyder
[NBF]root.Data
Login_And_Register_Form.registerForm.resources
pictureBox1.Image
[NBF]root.Data
[NBF]root.Data-preview.png
pictureBox2.Image
[NBF]root.Data
[NBF]root.Data-preview.png
Login_And_Register_Form.frmLogin.resources
Login_And_Register_Form.Properties.Resources.resources
mXr
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
|
Name0 | Value | Location |
|---|---|---|
| PDB Path | JZE.pdb |
e133e0d1291c2ecb5ff602629e3029ea |
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.