Suspicious
Suspect

1237534e12e71bf77d8e2f8adefef715

PE Executable
|
MD5: 1237534e12e71bf77d8e2f8adefef715
|
Size: 733.19 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
1237534e12e71bf77d8e2f8adefef715
Sha1
11e9173f0a5a968bc02b4566d86baf10d896ed3c
Sha256
0cfcd3719293674e15cfdc5670268d92b6e179cf1b9d25c668d78d10450663bc
Sha384
91a3309489f566c559f5b6064df69e882b6b7ea3f6ad9d554b5ff3c0255587e66d53ef8d7f4f902405986db706475c41
Sha512
b8d5c93677bba6f2e3c261471e441ece7e468941a78efe38f3d1a1fc45f8fa5cee881b530d2dbbaa6d3feae154deb90e44819bcc6b06bba5527758240acb33dd
SSDeep
12288:Yj2uzLshvtk5NxpsurjvcmiXiSb5gehvVjuyDvxSjIlP7HJRLkmkR:YzsNa5NrsuVc1vVtDUjIp7HJlk9
TLSH
F5F4128DFBB52D12C36C4F73C043891AC2BB50ABE022F01F69DD49951EEA7A4C58E957

PeID

.NET executable
HQR data file
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xAFA00 size 13832 bytes

Module Name

HDBo.exe

Full Name

HDBo.exe

EntryPoint

System.Void CustomEventLogCreator.Program::Main()

Scope Name

HDBo.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

HDBo

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void CustomEventLogCreator.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] CustomEventLogCreator.Forms.EventWriterForm::Ⴅ stloc.2 <null> ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void CustomEventLogCreator.Properties.Resources::Ⴗ() ldc.i4.s 89 ldc.i4.s 103 call System.Void CustomEventLogCreator.Forms.EventLogViewerForm::Ⴈ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 853 ldc.i4 821 call System.Void CustomEventLogCreator.Classes.CustomLogger::Ⴍ(System.Boolean,System.Char,System.Char) ldloc.2 <null> ldc.i4 159 ldelem.u2 <null> ldc.i4 25895 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void CustomEventLogCreator.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void CustomEventLogCreator.Program::Main() pop <null> ret <null>

Module Name

HDBo.exe

Full Name

HDBo.exe

EntryPoint

System.Void CustomEventLogCreator.Program::Main()

Scope Name

HDBo.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

HDBo

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void CustomEventLogCreator.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] CustomEventLogCreator.Forms.EventWriterForm::Ⴅ stloc.2 <null> ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void CustomEventLogCreator.Properties.Resources::Ⴗ() ldc.i4.s 89 ldc.i4.s 103 call System.Void CustomEventLogCreator.Forms.EventLogViewerForm::Ⴈ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 853 ldc.i4 821 call System.Void CustomEventLogCreator.Classes.CustomLogger::Ⴍ(System.Boolean,System.Char,System.Char) ldloc.2 <null> ldc.i4 159 ldelem.u2 <null> ldc.i4 25895 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void CustomEventLogCreator.Forms.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void CustomEventLogCreator.Program::Main() pop <null> ret <null>

1237534e12e71bf77d8e2f8adefef715 (733.19 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙