Suspicious
Suspect

3737dc4aab252d95656a4830cad1eac7

PE Executable
|
MD5: 3737dc4aab252d95656a4830cad1eac7
|
Size: 3.48 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

High

Hash
Hash Value
MD5
3737dc4aab252d95656a4830cad1eac7
Sha1
b5b891856155775874600ab9a66cdd54686bac68
Sha256
42bee2b9b2885a5acfdbc34921ad07507bee945be5c2852924d39363f6aec018
Sha384
16d86feeee4c0a56e3d7c308172ae8ff53ba9fb58661d5c38f5dcf7dd4bac8301f6711b5f11ff37f661e45bb8a164a78
Sha512
c1d944c82eb872fb56a688b4f38b0628b3e63e7e4f88c6ed94b322754e7e9360a7ecb2ea71317b3e22199534e925e1625531ffb4523eb02f3ae70745b7ebc016
SSDeep
49152:IYDASL0Jl6MoGXWtiew/8KEctKNmozs9cCNZClxER29/uHBpum0/aGv3PorCIsU:IYDtO3Gt1m8KEkK8IKcCNEl/gpaiEgR
TLSH
08F5238492C1EE21C64A1D3441325E6493736F663DA1F386BEACBCA336F3BD858455CB

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
UPolyX 0.3 -> delikon
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
ID:0004
ID:0
ID:0005
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

3.7.8.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

31

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

94

Main IL

nop <null> ldc.i4 -1737257502 stloc.s V_4 ldloc.s V_4 ldc.i4 719431618 ldc.i4 -1913541280 add <null> ldc.i4 -1117095428 neg <null> xor <null> not <null> sub <null> ldc.i4 559750111 mul <null> ldc.i4 -378520131 ldc.i4 722593205 mul <null> sub <null> not <null> dup <null> stloc.3 <null> ldc.i4.6 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_0139: ret call System.Object server.Module2::_EF0CEC0C6F594D95_() stloc.1 <null> ldc.i4 678040354 stloc.s V_7 ldloc.3 <null> ldc.i4 -331877 mul <null> ldloc.s V_7 xor <null> br.s IL_0006: stloc.s V_4 ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_04211CA1C1C24036_() call System.Object server.Module2::_5609D0C5CB944B24_(System.Object) call System.String server.Module2::_5D2219CEC1B241EB_(System.Object) call System.Boolean server.Module2::_C65487ADCE8F4D3B_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_C3BAC26E1A984F00_() stloc.2 <null> ldloc.2 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_04211CA1C1C24036_() call System.Object server.Module2::_5609D0C5CB944B24_(System.Object) call System.String server.Module2::_5D2219CEC1B241EB_(System.Object) call System.Boolean server.Module2::_A438C1A96B904295_(System.Object,System.Byte[],System.String) pop <null> ldc.i4 -1932733373 stloc.s V_8 ldloc.3 <null> ldc.i4 -253897 mul <null> ldloc.s V_8 xor <null> br IL_0006: stloc.s V_4 call System.String server.Module2::_3A5526582B2640A6_() ldc.i4 1589695744 br.s IL_00CE: call System.String <Module>::_7A40C530F71B4517_<System.String>(System.IntPtr) call System.String <Module>::_7A40C530F71B4517_<System.String>(System.IntPtr) call System.String server.Module2::_5097E52D7A034C95_(System.String,System.String) stsfld System.String server.Module2::Hex ldc.i4 2085280147 stloc.s V_5 ldloc.3 <null> ldc.i4 -127754 mul <null> ldloc.s V_5 xor <null> br IL_0006: stloc.s V_4 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::_938B858E13CE44B1_(System.String) stsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_623ECB75221F41A4_() stloc.0 <null> ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_04211CA1C1C24036_() call System.Object server.Module2::_5609D0C5CB944B24_(System.Object) call System.String server.Module2::_5D2219CEC1B241EB_(System.Object) call System.Boolean server.Module2::_2BC725B24D1649EB_(System.Object,System.Byte[],System.String) pop <null> ldc.i4 2006599410 stloc.s V_6 ldloc.3 <null> ldc.i4 -715409 mul <null> ldloc.s V_6 xor <null> br IL_0006: stloc.s V_4 ret <null>

Module Name

server1.exe

Full Name

server1.exe

EntryPoint

System.Void server.Module2::main()

Scope Name

server1.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

server1

Assembly Version

3.7.8.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.8

Total Strings

31

Main Method

System.Void server.Module2::main()

Main IL Instruction Count

94

Main IL

nop <null> ldc.i4 -1737257502 stloc.s V_4 ldloc.s V_4 ldc.i4 719431618 ldc.i4 -1913541280 add <null> ldc.i4 -1117095428 neg <null> xor <null> not <null> sub <null> ldc.i4 559750111 mul <null> ldc.i4 -378520131 ldc.i4 722593205 mul <null> sub <null> not <null> dup <null> stloc.3 <null> ldc.i4.6 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_0139: ret call System.Object server.Module2::_EF0CEC0C6F594D95_() stloc.1 <null> ldc.i4 678040354 stloc.s V_7 ldloc.3 <null> ldc.i4 -331877 mul <null> ldloc.s V_7 xor <null> br.s IL_0006: stloc.s V_4 ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_04211CA1C1C24036_() call System.Object server.Module2::_5609D0C5CB944B24_(System.Object) call System.String server.Module2::_5D2219CEC1B241EB_(System.Object) call System.Boolean server.Module2::_C65487ADCE8F4D3B_(System.Object,System.Byte[],System.String) pop <null> call System.Object server.Module2::_C3BAC26E1A984F00_() stloc.2 <null> ldloc.2 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_04211CA1C1C24036_() call System.Object server.Module2::_5609D0C5CB944B24_(System.Object) call System.String server.Module2::_5D2219CEC1B241EB_(System.Object) call System.Boolean server.Module2::_A438C1A96B904295_(System.Object,System.Byte[],System.String) pop <null> ldc.i4 -1932733373 stloc.s V_8 ldloc.3 <null> ldc.i4 -253897 mul <null> ldloc.s V_8 xor <null> br IL_0006: stloc.s V_4 call System.String server.Module2::_3A5526582B2640A6_() ldc.i4 1589695744 br.s IL_00CE: call System.String <Module>::_7A40C530F71B4517_<System.String>(System.IntPtr) call System.String <Module>::_7A40C530F71B4517_<System.String>(System.IntPtr) call System.String server.Module2::_5097E52D7A034C95_(System.String,System.String) stsfld System.String server.Module2::Hex ldc.i4 2085280147 stloc.s V_5 ldloc.3 <null> ldc.i4 -127754 mul <null> ldloc.s V_5 xor <null> br IL_0006: stloc.s V_4 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::_938B858E13CE44B1_(System.String) stsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_623ECB75221F41A4_() stloc.0 <null> ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Object server.Module2::_04211CA1C1C24036_() call System.Object server.Module2::_5609D0C5CB944B24_(System.Object) call System.String server.Module2::_5D2219CEC1B241EB_(System.Object) call System.Boolean server.Module2::_2BC725B24D1649EB_(System.Object,System.Byte[],System.String) pop <null> ldc.i4 2006599410 stloc.s V_6 ldloc.3 <null> ldc.i4 -715409 mul <null> ldloc.s V_6 xor <null> br IL_0006: stloc.s V_4 ret <null>

3737dc4aab252d95656a4830cad1eac7 (3.48 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙