Suspicious
Suspect

54210679a7dcd03df3525ec1b5ca3152

PE Executable
|
MD5: 54210679a7dcd03df3525ec1b5ca3152
|
Size: 736.77 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
54210679a7dcd03df3525ec1b5ca3152
Sha1
03cb7eb18e9892dc96ca8f82902996f3d32c4f9a
Sha256
8bf440a88117231580f2f636c3597991c7c8f355e0b95aefaa7cd99b0b1066ff
Sha384
48094c64ca298632af90e43d6cd01b67f733c9d3164bf473af95935cfd3cc1059b9eb11cf3767d11d6cf163d4cf06c7f
Sha512
e23b3a3b30ac65c952e2257dc2f7b7678588c561a1e36fa2fca9f35150a373effed86511223e419ddff2a9674f564366ec44c45a2f966df50001934ef412e19a
SSDeep
12288:Xui0PJque7Hs8LOD8mhqqJJwEHovSgkWrb6CvIU5DOrXEa6wM5hznoR02:XIJ47Hb0hqG0RzHKEa1M5Bm
TLSH
25F4230E3736F756D9080BB7C1139A5807B18A53FD66E36EADC0D4BA2DA1F94444EE23

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

QSqt.exe

Full Name

QSqt.exe

EntryPoint

System.Void HabitTracker.Program::Main()

Scope Name

QSqt.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

QSqt

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void HabitTracker.Program::Main()

Main IL Instruction Count

33

Main IL

ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void HabitTracker.AddHabitForm::Ⴐ() ldc.i4 577 ldc.i4 520 call System.Void <PrivateImplementationDetails>::Ⴓ(System.Char,System.Int16) ldc.i4.0 <null> ldc.i4 663 ldc.i4 680 call System.Void HabitTracker.Habit::Ⴀ(System.Boolean,System.Int32,System.Char) ldc.i4.1 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void HabitTracker.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void HabitTracker.Program::Main() pop <null> ldsfld System.Byte[] HabitTracker.Program::Ⴄ ldc.i4 163 ldsfld System.Byte[] HabitTracker.Program::Ⴄ ldc.i4 163 ldelem.u1 <null> ldsfld System.Byte[] HabitTracker.Program::Ⴄ ldc.i4 239 ldelem.u1 <null> or <null> ldc.i4 231 and <null> stelem.i1 <null> ret <null>

Module Name

QSqt.exe

Full Name

QSqt.exe

EntryPoint

System.Void HabitTracker.Program::Main()

Scope Name

QSqt.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

QSqt

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void HabitTracker.Program::Main()

Main IL Instruction Count

33

Main IL

ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void HabitTracker.AddHabitForm::Ⴐ() ldc.i4 577 ldc.i4 520 call System.Void <PrivateImplementationDetails>::Ⴓ(System.Char,System.Int16) ldc.i4.0 <null> ldc.i4 663 ldc.i4 680 call System.Void HabitTracker.Habit::Ⴀ(System.Boolean,System.Int32,System.Char) ldc.i4.1 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void HabitTracker.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void HabitTracker.Program::Main() pop <null> ldsfld System.Byte[] HabitTracker.Program::Ⴄ ldc.i4 163 ldsfld System.Byte[] HabitTracker.Program::Ⴄ ldc.i4 163 ldelem.u1 <null> ldsfld System.Byte[] HabitTracker.Program::Ⴄ ldc.i4 239 ldelem.u1 <null> or <null> ldc.i4 231 and <null> stelem.i1 <null> ret <null>

54210679a7dcd03df3525ec1b5ca3152 (736.77 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙