Suspicious
Suspect

379e1d6e4104f19a18505b513b6847d3

PE Executable
|
MD5: 379e1d6e4104f19a18505b513b6847d3
|
Size: 701.44 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
379e1d6e4104f19a18505b513b6847d3
Sha1
d1ffb7861af7e5becdf3f77534181a2fefe2146d
Sha256
02423be0add1db8a4df4f424108420b01dab4c4c1dc23ded7abd62fa89895882
Sha384
8a2b9ab7c2cb8e54736bbb90f1fe78b23609adadeab40e4742a0f378cb378e4407bec135101a4e32b7d6fc5469ef7847
Sha512
de2274ac9cbba2df4ae5c3b758d0a1f16c7036f8b3e8dd0b3decc8544a8f6947394bcee0693dab407cfbc9b8858164fe19c239647f5e68cb7e5278ee01ea1bb6
SSDeep
12288:yMPaMMQy2SyLakBp+IFc6RhgImeL8O9df/0tLLgIGWJC7hzRbRDeWqApB+91Ju5F:y2S4c0gnWHf/0Z0bbzRtDDp89ru
TLSH
32E4230F9B53961EC6246A7BC883551CC2B54995F627FBDB39CE0DE10B1B60CC1CAE62

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0.exif
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

thEr.exe

Full Name

thEr.exe

EntryPoint

System.Void Carubbi.MetroLayoutEngine.MainC::Main()

Scope Name

thEr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

thEr

Assembly Version

1.4.1.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void Carubbi.MetroLayoutEngine.MainC::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void Carubbi.MetroLayoutEngine.MetroLayoutForm::Ⴓ() ldc.i4 165 ldc.i4 136 call System.Void Carubbi.MetroLayoutEngine.Properties.Resources/Ⴅ::Ⴈ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4 690 ldc.i4 743 call System.Void Carubbi.MetroLayoutEngine.Properties.Resources::Ⴈ(System.Boolean,System.Char,System.Char) ldc.i4.4 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void Carubbi.MetroLayoutEngine.MetroLayoutForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void Carubbi.MetroLayoutEngine.MainC::Main() pop <null> ret <null>

Module Name

thEr.exe

Full Name

thEr.exe

EntryPoint

System.Void Carubbi.MetroLayoutEngine.MainC::Main()

Scope Name

thEr.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

thEr

Assembly Version

1.4.1.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void Carubbi.MetroLayoutEngine.MainC::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void Carubbi.MetroLayoutEngine.MetroLayoutForm::Ⴓ() ldc.i4 165 ldc.i4 136 call System.Void Carubbi.MetroLayoutEngine.Properties.Resources/Ⴅ::Ⴈ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4 690 ldc.i4 743 call System.Void Carubbi.MetroLayoutEngine.Properties.Resources::Ⴈ(System.Boolean,System.Char,System.Char) ldc.i4.4 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void Carubbi.MetroLayoutEngine.MetroLayoutForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void Carubbi.MetroLayoutEngine.MainC::Main() pop <null> ret <null>

379e1d6e4104f19a18505b513b6847d3 (701.44 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0.exif
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙