Suspicious
Suspect

291c4d5b0d5485662126c764d24d1989

PE Executable
|
MD5: 291c4d5b0d5485662126c764d24d1989
|
Size: 786.43 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
291c4d5b0d5485662126c764d24d1989
Sha1
eb4e775dfa93eda8721e796b649a85b35a17f339
Sha256
69b4c8361199937a0cb7e28c689e3dfa2967af5dc5ed0c1fccd770273cc3c71a
Sha384
bb0672d3ebb314006639c0ce84ca5d99d2e6eeb974ce8c9168e6f4bde47086122458981f5d63eafa736b10689d9e0983
Sha512
fc025a7c343cbbc2ccf3dc321dacb828f3057cfd952140c8525c9d3cd9c098cfc61706ee3fc6ef5d740efceb7bd4f602926fa8ce272ac8208a84385edf5b45e5
SSDeep
12288:x+HZejAXfCV4nSc9lgHbMjU7uxOGMRIa8ffeR31E86ER4w0:y8884Sf7MA7u3a8+TWE+J
TLSH
30F402812358ED43ECAA57F44D71C27653B6AEAD6521C34BCEC56CE73CCA39428922D3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
DeThiLTGD1920.AutomatedForm37.resources
$this.Icon
DeThiLTGD1920.FrmMain.resources
k0
DeThiLTGD1920.kl.resources
DeThiLTGD1920.Properties.Resources.resources
_83
yezp
Informations
Name
Value
Module Name

RoVz.exe

Full Name

RoVz.exe

EntryPoint

System.Void DeThiLTGD1920.Program::Main()

Scope Name

RoVz.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

RoVz

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

318

Main Method

System.Void DeThiLTGD1920.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void DeThiLTGD1920.FrmMain::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

RoVz.exe

Full Name

RoVz.exe

EntryPoint

System.Void DeThiLTGD1920.Program::Main()

Scope Name

RoVz.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

RoVz

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

318

Main Method

System.Void DeThiLTGD1920.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void DeThiLTGD1920.FrmMain::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
Embedded Resources

4

Suspicious Type Names (1-2 chars)

1

291c4d5b0d5485662126c764d24d1989 (786.43 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
DeThiLTGD1920.AutomatedForm37.resources
$this.Icon
DeThiLTGD1920.FrmMain.resources
k0
DeThiLTGD1920.kl.resources
DeThiLTGD1920.Properties.Resources.resources
_83
yezp
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

4

291c4d5b0d5485662126c764d24d1989

Suspicious Type Names (1-2 chars)

1

291c4d5b0d5485662126c764d24d1989

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙