Suspicious
Suspect

26a0ffe8ed7645b7136ed56213b1a176

PE Executable
|
MD5: 26a0ffe8ed7645b7136ed56213b1a176
|
Size: 541.7 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
26a0ffe8ed7645b7136ed56213b1a176
Sha1
69999ef2af86ac2a4f435483a52deb2eb54e3bba
Sha256
8e95907c0b65f2f882de4d6bf69e0b62bf6ea0be2a87e5cc0ffa535fad492264
Sha384
46de4823ebefe37fdf0c8848f53c9ef15c4750694976b58a7e7a7f1f2e18370c0d5b4dd58d0037e63957a72209805912
Sha512
8c2c1fe5e9b8a70f660d63342dc99d4d959b94fb8223ffd9d2371b86f8c6822275ac9d374a5b35e6abde0d8c63b8a05c92c109155f35de39beb70a652ee1aa5e
SSDeep
12288:jxzveN6NtGc3eoz2ZB2lFm2juJbUUcBgThvNC0D9:jxzva6NEsziDlUUcBgrC
TLSH
20B4230F7F56AA16C20D2379DA1331AD08B9C1A9E477F39319C96CB01F5D68A86CBD13

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0.exif
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

XOfl.exe

Full Name

XOfl.exe

EntryPoint

System.Void SolarSystem.Program::Main()

Scope Name

XOfl.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XOfl

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void SolarSystem.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void gar3t.LucidIoC.ConfigurationCollection::Ⴈ() ldc.i4 329 ldc.i4 325 call System.Void gar3t.LucidIoC.Configuration::Ⴅ(System.Char,System.Char) ldc.i4.0 <null> ldc.i4 216 ldc.i4 218 call System.Void gar3t.LucidIoC.Configuration::Ⴄ(System.Boolean,System.Int16,System.Char) ldc.i4.3 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void SolarSystem.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void SolarSystem.Program::Main() pop <null> ret <null>

Module Name

XOfl.exe

Full Name

XOfl.exe

EntryPoint

System.Void SolarSystem.Program::Main()

Scope Name

XOfl.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

XOfl

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void SolarSystem.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void gar3t.LucidIoC.ConfigurationCollection::Ⴈ() ldc.i4 329 ldc.i4 325 call System.Void gar3t.LucidIoC.Configuration::Ⴅ(System.Char,System.Char) ldc.i4.0 <null> ldc.i4 216 ldc.i4 218 call System.Void gar3t.LucidIoC.Configuration::Ⴄ(System.Boolean,System.Int16,System.Char) ldc.i4.3 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void SolarSystem.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void SolarSystem.Program::Main() pop <null> ret <null>

26a0ffe8ed7645b7136ed56213b1a176 (541.7 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙