Suspicious
Suspect

780f1f77791c00dfc4f27f531de58e5c

PE Executable
|
MD5: 780f1f77791c00dfc4f27f531de58e5c
|
Size: 20.99 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

High

Hash
Hash Value
MD5
780f1f77791c00dfc4f27f531de58e5c
Sha1
2d7a1a92a4805140640feeb982de3b0def7d4ff9
Sha256
0902ce086eea466e676170f68d4f7f64e7df49aaf43ea6f33f4d5e3cda3f9958
Sha384
f6da74b918c78c397083329be45839c5de7dceefd1d2d8b6ea4d6f864f971bda6d62c704db7462fcfcde6704d04eff1d
Sha512
cd02517f429ab17e60412ccfb4e2b7c76482508f926caf39342cd6ae6b94dcdf050f3d4446aa69f90af9aeb51ec6fab1ceec46ea19e6d0e75ecde9f78a71ee1d
SSDeep
384:iTAdpvSecYwQ9QYDTUGwFqxH3PfkF9XBO4mm7rh/8uP+:icddSl7yUGwFIHfje32
TLSH
76927B42EF959277D6BE0B36E973C37103A4E78661438B1B2A89700B3D927841D23BE1

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Thgwiogkq.exe

Full Name

Thgwiogkq.exe

EntryPoint

System.Void Vglly.Zfxyxpybf::Main()

Scope Name

Thgwiogkq.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Thgwiogkq

Assembly Version

1.0.3468.18173

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

5

Main Method

System.Void Vglly.Zfxyxpybf::Main()

Main IL Instruction Count

21

Main IL

nop <null> ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) nop <null> nop <null> newobj System.Void Vglly.Wdnzjuki::.ctor() stloc.0 <null> ldloc.0 <null> ldnull <null> ldstr tIzFUyubFN5m33VVCcAxZQ== ldstr jp7nML4BFn7kTV4Wcv.xHGmBNeSmyCk1g16pr ldstr DfCAO77Dk callvirt System.Void Vglly.Wdnzjuki::Mazxswfwbo(System.String,System.String,System.String,System.String) nop <null> nop <null> leave IL_0038: ret pop <null> nop <null> nop <null> leave IL_0038: ret ret <null>

Module Name

Thgwiogkq.exe

Full Name

Thgwiogkq.exe

EntryPoint

System.Void Vglly.Zfxyxpybf::Main()

Scope Name

Thgwiogkq.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Thgwiogkq

Assembly Version

1.0.3468.18173

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

5

Main Method

System.Void Vglly.Zfxyxpybf::Main()

Main IL Instruction Count

21

Main IL

nop <null> ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) nop <null> nop <null> newobj System.Void Vglly.Wdnzjuki::.ctor() stloc.0 <null> ldloc.0 <null> ldnull <null> ldstr tIzFUyubFN5m33VVCcAxZQ== ldstr jp7nML4BFn7kTV4Wcv.xHGmBNeSmyCk1g16pr ldstr DfCAO77Dk callvirt System.Void Vglly.Wdnzjuki::Mazxswfwbo(System.String,System.String,System.String,System.String) nop <null> nop <null> leave IL_0038: ret pop <null> nop <null> nop <null> leave IL_0038: ret ret <null>

780f1f77791c00dfc4f27f531de58e5c (20.99 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙