Suspicious
Suspect

7a023af69a900a8b99bf74b60d6689f1

PE Executable
|
MD5: 7a023af69a900a8b99bf74b60d6689f1
|
Size: 1.11 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
7a023af69a900a8b99bf74b60d6689f1
Sha1
5c8ba31c6fb309bdddae49bd00be52f3dec48b46
Sha256
0c82b648de097a84476eae0187e6ae187b4ec872a57cb2dd80aa2c5fdac05df3
Sha384
3a9452eee437eb74ff9237c4a0e0287d21ddba4af5230ae10948ca2a2a93df057c1edc9eb8e2843bccc9b0222139f00d
Sha512
5a97def3671373b111170adcae32b92866f589489e0990f0351b9c82c0f52605d52d6dab04ef96fb0b69dbac1f174249cdba984297728e107cf4fac925f6788e
SSDeep
24576:1ecDl2oRDrV4dyJGg3njZQX+1OI9ldPHU9cMiToV:XDAe14wJGOj8+1/9b0IU
TLSH
A335124C7385BE55CE588B77D413220884F5D89FE572F3790AD52CF12FA9A89C48EA83

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

bqzSV.exe

Full Name

bqzSV.exe

EntryPoint

System.Void BlindSimulator.Program::Main()

Scope Name

bqzSV.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

bqzSV

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void BlindSimulator.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BlindSimulator.Form1::Ⴅ() ldc.i4 850 ldc.i4 837 call System.Void BlindSimulator.Program::Ⴃ(System.Int32,System.Int32) ldc.i4.0 <null> ldc.i4 544 ldc.i4 515 call System.Void BlindSimulator.Form2::Ⴀ(System.Boolean,System.Int16,System.Int16) ldc.i4.0 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BlindSimulator.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BlindSimulator.Program::Main() pop <null> ret <null>

Module Name

bqzSV.exe

Full Name

bqzSV.exe

EntryPoint

System.Void BlindSimulator.Program::Main()

Scope Name

bqzSV.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

bqzSV

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void BlindSimulator.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BlindSimulator.Form1::Ⴅ() ldc.i4 850 ldc.i4 837 call System.Void BlindSimulator.Program::Ⴃ(System.Int32,System.Int32) ldc.i4.0 <null> ldc.i4 544 ldc.i4 515 call System.Void BlindSimulator.Form2::Ⴀ(System.Boolean,System.Int16,System.Int16) ldc.i4.0 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BlindSimulator.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BlindSimulator.Program::Main() pop <null> ret <null>

7a023af69a900a8b99bf74b60d6689f1 (1.11 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙