Suspicious
Suspect

7c000ec1696903fff6fc9874f3f4cdea

PE Executable
|
MD5: 7c000ec1696903fff6fc9874f3f4cdea
|
Size: 1.16 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Medium

Hash
Hash Value
MD5
7c000ec1696903fff6fc9874f3f4cdea
Sha1
6a7d25976d9bb28a2c508a58b37a6897f519383d
Sha256
03e1cac50f7694397f243a38092aa258c67c2d4133f14aed4bd61362340828d2
Sha384
928a53e270fed0f57ecaf99c538603daf9a79c88541bb8a8709fb53ea31e1d6a75c093f6fa1accdaddcea100147cf371
Sha512
c748e3b2b2fe890f7196e8959e6295bf82f01a2f07796f90aad2bd4167e1e4f163b4676a55609581d452351e36f1900167b07a3678fca51c0754070ff5451d92
SSDeep
24576:n5p7GPfNKmIoxaoOLA89jHYdK+/dnsLYXlCPI4Q:n5p7GKm/xOL3DsK+/dsLMCPbQ
TLSH
7935120C7B26AA16C68D1F77D013214443FA9567E632F76B28DA2CE50E35B94C98FB43

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

fZfuc.exe

Full Name

fZfuc.exe

EntryPoint

System.Void DiskAnalyzer.Program::Main()

Scope Name

fZfuc.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

fZfuc

Assembly Version

1.0.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void DiskAnalyzer.Program::Main()

Main IL Instruction Count

33

Main IL

ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void DiskAnalyzer.Properties.Resources::Ⴍ() ldc.i4.s 35 ldc.i4.s 116 call System.Void DiskAnalyzer.Properties.Resources::Ⴈ(System.Char,System.Char) ldc.i4.0 <null> ldc.i4 967 ldc.i4 985 call System.Void DiskAnalyzer.FormDoublons::Ⴐ(System.Boolean,System.Char,System.Char) ldc.i4.2 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void DiskAnalyzer.FormPrincipal::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldsfld System.Char[] DiskAnalyzer.AnalyseurDisque::Ⴅ ldc.i4.s 70 ldsfld System.Char[] DiskAnalyzer.AnalyseurDisque::Ⴅ ldc.i4.s 70 ldelem.u2 <null> ldsfld System.Char[] DiskAnalyzer.AnalyseurDisque::Ⴅ ldc.i4 332 ldelem.u2 <null> mul <null> ldc.i4.s 89 and <null> stelem.i2 <null> ret <null> ldtoken System.Void DiskAnalyzer.Program::Main() pop <null> ret <null>

Module Name

fZfuc.exe

Full Name

fZfuc.exe

EntryPoint

System.Void DiskAnalyzer.Program::Main()

Scope Name

fZfuc.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

fZfuc

Assembly Version

1.0.2.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void DiskAnalyzer.Program::Main()

Main IL Instruction Count

33

Main IL

ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void DiskAnalyzer.Properties.Resources::Ⴍ() ldc.i4.s 35 ldc.i4.s 116 call System.Void DiskAnalyzer.Properties.Resources::Ⴈ(System.Char,System.Char) ldc.i4.0 <null> ldc.i4 967 ldc.i4 985 call System.Void DiskAnalyzer.FormDoublons::Ⴐ(System.Boolean,System.Char,System.Char) ldc.i4.2 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void DiskAnalyzer.FormPrincipal::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldsfld System.Char[] DiskAnalyzer.AnalyseurDisque::Ⴅ ldc.i4.s 70 ldsfld System.Char[] DiskAnalyzer.AnalyseurDisque::Ⴅ ldc.i4.s 70 ldelem.u2 <null> ldsfld System.Char[] DiskAnalyzer.AnalyseurDisque::Ⴅ ldc.i4 332 ldelem.u2 <null> mul <null> ldc.i4.s 89 and <null> stelem.i2 <null> ret <null> ldtoken System.Void DiskAnalyzer.Program::Main() pop <null> ret <null>

7c000ec1696903fff6fc9874f3f4cdea (1.16 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙