Suspicious
Suspect

39e01c020ad90be8090acb92c89d72e2

PE Executable
|
MD5: 39e01c020ad90be8090acb92c89d72e2
|
Size: 76.8 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Very high

Hash
Hash Value
MD5
39e01c020ad90be8090acb92c89d72e2
Sha1
eac2e2c475a962166c6984ca14601cab15f8bbbd
Sha256
395ce3629322c923a1738cc4e457c3041969978f0067abc56441dbae7f65176d
Sha384
7e1ff1c93fbb4bfd4e9d3380250e87c2cdd639c3795ae0c17f76f626c1761efff55e0dc928e3fae02cb43dd593bae7ec
Sha512
3834eb633948bc15488a41f6a96b33585e761c23d2fe60f93d6e71e642dbcaf755d28590f1dedf8503e421f3418a3a491c721c20f1d4903294de3b4c33983057
SSDeep
1536:Q7WQrr9H52YhnhuYRT1lXJU+oQSZndH5mObIL8NNtA:WNpRT1lXJeQSpdHTILgN2
TLSH
14732A0376CB4661D52467B9C0EB95500BF2E3833A33D68A3E8D53C94D027EA9F81BC6

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ZVXSDG444.g.resources
uVvfUvNDRWxllF6sLS.ycip6nRhrmm5cgMZhN
aR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources
$this.Icon
[NBF]root.IconData
progressBar1.Modifiers
$this.Language
$this.GridSize
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: ZVXSDG444.pdb

Module Name

ZVXSDG444.exe

Full Name

ZVXSDG444.exe

EntryPoint

System.Void Program::<Main>(System.String[])

Scope Name

ZVXSDG444.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

ZVXSDG444

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5.1

Total Strings

41

Main Method

System.Void Program::<Main>(System.String[])

Main IL Instruction Count

29

Main IL

br.s IL_0007: ldc.i4 2 call <null> ldc.i4 2 stloc V_0 br IL_0015: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_0081: ret ldarg.0 <null> call System.Threading.Tasks.Task Program::Main(System.Object) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.s V_1 ldc.i4 1 ldsfld <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86} <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_5d78851d063a4c9e8aea82861fa0445c ldfld System.Int32 <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_235df80b36b04afa87712b75b5e1fef2 brtrue IL_0019: switch(IL_0081,IL_005B,IL_002F) pop <null> ldc.i4 1 br IL_0019: switch(IL_0081,IL_005B,IL_002F) ldloca.s V_1 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ldc.i4 0 ldsfld <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86} <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_5d78851d063a4c9e8aea82861fa0445c ldfld System.Int32 <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_791533ae32104292be91bcf1c53a5ed9 brtrue IL_0019: switch(IL_0081,IL_005B,IL_002F) pop <null> ldc.i4 0 br IL_0019: switch(IL_0081,IL_005B,IL_002F) ret <null>

Module Name

ZVXSDG444.exe

Full Name

ZVXSDG444.exe

EntryPoint

System.Void Program::<Main>(System.String[])

Scope Name

ZVXSDG444.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

ZVXSDG444

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5.1

Total Strings

41

Main Method

System.Void Program::<Main>(System.String[])

Main IL Instruction Count

29

Main IL

br.s IL_0007: ldc.i4 2 call <null> ldc.i4 2 stloc V_0 br IL_0015: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_0081: ret ldarg.0 <null> call System.Threading.Tasks.Task Program::Main(System.Object) callvirt System.Runtime.CompilerServices.TaskAwaiter System.Threading.Tasks.Task::GetAwaiter() stloc.s V_1 ldc.i4 1 ldsfld <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86} <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_5d78851d063a4c9e8aea82861fa0445c ldfld System.Int32 <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_235df80b36b04afa87712b75b5e1fef2 brtrue IL_0019: switch(IL_0081,IL_005B,IL_002F) pop <null> ldc.i4 1 br IL_0019: switch(IL_0081,IL_005B,IL_002F) ldloca.s V_1 call System.Void System.Runtime.CompilerServices.TaskAwaiter::GetResult() ldc.i4 0 ldsfld <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86} <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_5d78851d063a4c9e8aea82861fa0445c ldfld System.Int32 <Module>{599d8465-4f2c-4c4a-a759-3b1fe3110f86}::m_791533ae32104292be91bcf1c53a5ed9 brtrue IL_0019: switch(IL_0081,IL_005B,IL_002F) pop <null> ldc.i4 0 br IL_0019: switch(IL_0081,IL_005B,IL_002F) ret <null>

39e01c020ad90be8090acb92c89d72e2 (76.8 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ZVXSDG444.g.resources
uVvfUvNDRWxllF6sLS.ycip6nRhrmm5cgMZhN
aR3nbf8dQp2feLmk31.lSfgApatkdxsVcGcrktoFd.resources
$this.Icon
[NBF]root.IconData
progressBar1.Modifiers
$this.Language
$this.GridSize
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙