Suspicious
Suspect

5732b41a0c41aa0f73fc70f8d93c38ba

PE Executable
|
MD5: 5732b41a0c41aa0f73fc70f8d93c38ba
|
Size: 692.22 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
5732b41a0c41aa0f73fc70f8d93c38ba
Sha1
e099b8cfa3abb702df39f1667094a5ac0c3bee1d
Sha256
e24455ecd1babb5f587343e0b3db02d297075a9d41a20ab309946cdffc5a79d8
Sha384
ea0bc10fdc69688b264507b09d64163d89d3c3ab2dc3af2623565cdd614bd2144810097885ae321ec354242377141857
Sha512
df9854bdcfdacf3a41f62720a4dbf665117dc8caa3df4196607cdef352ffa4f8889ff5085189dbe9bc8de7a6eed40925029221beb878db394488f207f995d902
SSDeep
12288:CpcszCpjqzW6IFabfUWrsX1simI9Srba1IfCx3AisP9eLqlBSADJf4IYs:CmtpyW6IFabsWIX1snI9Ia4Cx3Ais0LG
TLSH
A8E41264375ADC03C5E657F04D70E3BD03F45D9CB805C35AAEEAACEB78A2B4446912A3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
DirectoryPlus.MainForm.resources
DirectoryPlus.Properties.Resources.resources
gilek
[NBF]root.Data
jihm
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: pLqH.pdb

Module Name

pLqH.exe

Full Name

pLqH.exe

EntryPoint

System.Void DirectoryPlus.Program::Main()

Scope Name

pLqH.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

pLqH

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

161

Main Method

System.Void DirectoryPlus.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void DirectoryPlus.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Module Name

pLqH.exe

Full Name

pLqH.exe

EntryPoint

System.Void DirectoryPlus.Program::Main()

Scope Name

pLqH.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

pLqH

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

161

Main Method

System.Void DirectoryPlus.Program::Main()

Main IL Instruction Count

6

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void DirectoryPlus.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

5732b41a0c41aa0f73fc70f8d93c38ba (692.22 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
DirectoryPlus.MainForm.resources
DirectoryPlus.Properties.Resources.resources
gilek
[NBF]root.Data
jihm
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙