Suspicious
Suspect

214da1e326900aa0aa904d02127901cb

PE Executable
|
MD5: 214da1e326900aa0aa904d02127901cb
|
Size: 1.17 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
214da1e326900aa0aa904d02127901cb
Sha1
36042581b189787d3ec59ff0697f6aeb40e81faf
Sha256
92cd5b811f58f0fab4637e26b23e09780af5b3ad197c68eb05fdf480706e9e06
Sha384
746089921ac340c0bf75d74241f802fe32c097783dd92627a5b79ef4be6f04a1ab77b0e3f013fa2fdca94951eb08af2c
Sha512
d9ab857dc357c3b827d298feb095ba0f225d5437660df8d97207e48eb9b32df7af76db88c18bb1e0530673abbbbe4a4f7f08bb2b84973023833d6bb56b4ad3d0
SSDeep
24576:afHZL64zcxEI86jVG1CbBMMYmhGB2592Oradi6xfq3:aV6icxdVG1uJ6lO0iWfq3
TLSH
8E453345E3F6820CD27ECF7A5D2B3E8282F97524119D9A0F0B71867D3347AE58A8179C

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Qneyijsudch.Properties.Resources.resources
Hzdorjrzw
ILRepack.List
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Dkrnsrcevxr

Full Name

Dkrnsrcevxr

EntryPoint

System.Void Qneyijsudch.Rydqoxnn::Main()

Scope Name

Dkrnsrcevxr

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Dkrnsrcevxr

Assembly Version

1.0.8498.19787

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

16

Main Method

System.Void Qneyijsudch.Rydqoxnn::Main()

Main IL Instruction Count

42

Main IL

newobj System.Void Qneyijsudch.Jcunr::.ctor() stloc.0 <null> newobj System.Void Qneyijsudch.Dfxlkaghfa::.ctor() stloc.1 <null> newobj System.Void Qneyijsudch.Mtwnuy::.ctor() stloc.2 <null> newobj System.Void Qneyijsudch.Axxbkxoyka::.ctor() stloc.3 <null> ldloc.1 <null> ldloc.2 <null> ldloc.3 <null> newobj System.Void Qneyijsudch.Brhwbvv::.ctor(Qneyijsudch.Dfxlkaghfa,Qneyijsudch.Mtwnuy,Qneyijsudch.Axxbkxoyka) stloc.s V_4 ldloc.0 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Yhbvmymrodk(System.Object,Qneyijsudch.Qeffss) newobj System.Void System.EventHandler`1<Qneyijsudch.Qeffss>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Jcunr::add_DownloadCompleted(System.EventHandler`1<Qneyijsudch.Qeffss>) ldloc.1 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Tybvcopeq(System.Object,Qneyijsudch.Djsqmbjcl) newobj System.Void System.EventHandler`1<Qneyijsudch.Djsqmbjcl>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Dfxlkaghfa::add_DecryptionCompleted(System.EventHandler`1<Qneyijsudch.Djsqmbjcl>) ldloc.2 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Bfqum(System.Object,Qneyijsudch.Dhlfknsro) newobj System.Void System.EventHandler`1<Qneyijsudch.Dhlfknsro>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Mtwnuy::add_LoadCompleted(System.EventHandler`1<Qneyijsudch.Dhlfknsro>) ldloc.3 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Atpztzojebn(System.Object,Qneyijsudch.Hamxotanjj) newobj System.Void System.EventHandler`1<Qneyijsudch.Hamxotanjj>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Axxbkxoyka::add_InvocationCompleted(System.EventHandler`1<Qneyijsudch.Hamxotanjj>) ldloc.0 <null> callvirt System.Void Qneyijsudch.Jcunr::Cbwmvmy() leave.s IL_0082: ret ldloc.s V_4 brfalse.s IL_0081: endfinally ldloc.s V_4 callvirt System.Void System.IDisposable::Dispose() endfinally <null> ret <null>

Module Name

Dkrnsrcevxr

Full Name

Dkrnsrcevxr

EntryPoint

System.Void Qneyijsudch.Rydqoxnn::Main()

Scope Name

Dkrnsrcevxr

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Dkrnsrcevxr

Assembly Version

1.0.8498.19787

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

16

Main Method

System.Void Qneyijsudch.Rydqoxnn::Main()

Main IL Instruction Count

42

Main IL

newobj System.Void Qneyijsudch.Jcunr::.ctor() stloc.0 <null> newobj System.Void Qneyijsudch.Dfxlkaghfa::.ctor() stloc.1 <null> newobj System.Void Qneyijsudch.Mtwnuy::.ctor() stloc.2 <null> newobj System.Void Qneyijsudch.Axxbkxoyka::.ctor() stloc.3 <null> ldloc.1 <null> ldloc.2 <null> ldloc.3 <null> newobj System.Void Qneyijsudch.Brhwbvv::.ctor(Qneyijsudch.Dfxlkaghfa,Qneyijsudch.Mtwnuy,Qneyijsudch.Axxbkxoyka) stloc.s V_4 ldloc.0 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Yhbvmymrodk(System.Object,Qneyijsudch.Qeffss) newobj System.Void System.EventHandler`1<Qneyijsudch.Qeffss>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Jcunr::add_DownloadCompleted(System.EventHandler`1<Qneyijsudch.Qeffss>) ldloc.1 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Tybvcopeq(System.Object,Qneyijsudch.Djsqmbjcl) newobj System.Void System.EventHandler`1<Qneyijsudch.Djsqmbjcl>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Dfxlkaghfa::add_DecryptionCompleted(System.EventHandler`1<Qneyijsudch.Djsqmbjcl>) ldloc.2 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Bfqum(System.Object,Qneyijsudch.Dhlfknsro) newobj System.Void System.EventHandler`1<Qneyijsudch.Dhlfknsro>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Mtwnuy::add_LoadCompleted(System.EventHandler`1<Qneyijsudch.Dhlfknsro>) ldloc.3 <null> ldloc.s V_4 ldftn System.Void Qneyijsudch.Brhwbvv::Atpztzojebn(System.Object,Qneyijsudch.Hamxotanjj) newobj System.Void System.EventHandler`1<Qneyijsudch.Hamxotanjj>::.ctor(System.Object,System.IntPtr) callvirt System.Void Qneyijsudch.Axxbkxoyka::add_InvocationCompleted(System.EventHandler`1<Qneyijsudch.Hamxotanjj>) ldloc.0 <null> callvirt System.Void Qneyijsudch.Jcunr::Cbwmvmy() leave.s IL_0082: ret ldloc.s V_4 brfalse.s IL_0081: endfinally ldloc.s V_4 callvirt System.Void System.IDisposable::Dispose() endfinally <null> ret <null>

214da1e326900aa0aa904d02127901cb (1.17 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Qneyijsudch.Properties.Resources.resources
Hzdorjrzw
ILRepack.List
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙