Suspicious
Suspect

7d9f7b04e5d40092fa1260d568590217

PE Executable
|
MD5: 7d9f7b04e5d40092fa1260d568590217
|
Size: 587.78 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

High

Hash
Hash Value
MD5
7d9f7b04e5d40092fa1260d568590217
Sha1
308aca1a6113bd03854e2c2e9d1ff76002c349f1
Sha256
ed641141bde4baf238710ead8205eeee5c3ac8095cb3cdc17afc4b35e90752a9
Sha384
e846fab67869d48427b6196ab75d6d65b3e23a17bfb02893d7f0984056ae7218ad47b0d2cbf2a878260d32a542459a51
Sha512
7289ce2255de6ff0083d7692cfef47938c9e52f936eeda278d07ed55674d0b51eefc4020c1c7d14399a80c5b9e0cc5c637dbadb6c455cdc79bb17daba180a029
SSDeep
12288:IJMjOXbSqkg8JehaEeDI3PFzdFKq7OcELsH83kckXjaVWgvPh:0MKXbS1NJewDeNzdFljEIH6kckTAb
TLSH
36C4234AFFBAC1C6C1624733DAB696681735D0AED808DF5BB78D03560A27716CD40A0F

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Mqvglhohd.Properties.Resources.resources
Kgbbeyogq
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Mqvglhohd.exe

Full Name

Mqvglhohd.exe

EntryPoint

System.Void Mqvglhohd.Bhgqjzm::Main()

Scope Name

Mqvglhohd.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Mqvglhohd

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

12

Main Method

System.Void Mqvglhohd.Bhgqjzm::Main()

Main IL Instruction Count

18

Main IL

newobj System.Void Mqvglhohd.Ygqnjwai::.ctor() stloc.s V_0 br IL_000C: nop nop <null> ldloc.s V_0 call System.Byte[] Mqvglhohd.Properties.Ihskivpr::get_Kgbbeyogq() ldsfld System.Byte[] Mqvglhohd.Collections.DicFormatter::dicCheckerData ldsfld System.Byte[] Mqvglhohd.Collections.DicFormatter::_ScheduledDicData ldstr UkoVRBqYEjbpMGHk9W.Pb2EvrNl1gkgCfEi9p ldstr qOLuI6VeD callvirt System.Void Mqvglhohd.Ygqnjwai::Myxxgmtue(System.Byte[],System.Byte[],System.Byte[],System.String,System.String) br IL_0032: leave IL_0047 leave IL_0047: ret pop <null> br IL_003D: leave IL_0047 leave IL_0047: ret br IL_0047: ret ret <null>

Module Name

Mqvglhohd.exe

Full Name

Mqvglhohd.exe

EntryPoint

System.Void Mqvglhohd.Bhgqjzm::Main()

Scope Name

Mqvglhohd.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Mqvglhohd

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

12

Main Method

System.Void Mqvglhohd.Bhgqjzm::Main()

Main IL Instruction Count

18

Main IL

newobj System.Void Mqvglhohd.Ygqnjwai::.ctor() stloc.s V_0 br IL_000C: nop nop <null> ldloc.s V_0 call System.Byte[] Mqvglhohd.Properties.Ihskivpr::get_Kgbbeyogq() ldsfld System.Byte[] Mqvglhohd.Collections.DicFormatter::dicCheckerData ldsfld System.Byte[] Mqvglhohd.Collections.DicFormatter::_ScheduledDicData ldstr UkoVRBqYEjbpMGHk9W.Pb2EvrNl1gkgCfEi9p ldstr qOLuI6VeD callvirt System.Void Mqvglhohd.Ygqnjwai::Myxxgmtue(System.Byte[],System.Byte[],System.Byte[],System.String,System.String) br IL_0032: leave IL_0047 leave IL_0047: ret pop <null> br IL_003D: leave IL_0047 leave IL_0047: ret br IL_0047: ret ret <null>

7d9f7b04e5d40092fa1260d568590217 (587.78 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Mqvglhohd.Properties.Resources.resources
Kgbbeyogq
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙