Suspicious
Suspect

7e211b63aa0bb3f36e20ff7ab0cefda2

PE Executable
|
MD5: 7e211b63aa0bb3f36e20ff7ab0cefda2
|
Size: 985.09 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
7e211b63aa0bb3f36e20ff7ab0cefda2
Sha1
2434d762532f64725b8abca1f09cc6a5cd72d2c1
Sha256
e0c5c9eb20830b7631d4eff52243f50842f2be9964f10186b2e3e6d461323782
Sha384
8b6fa1a0e92e42583a8a0a8d0c84ffcd3e0eeaeb55a57b56a4dd4f1b12bb1dd64d8ff9f05498e896adbe2d6e63a7ea5e
Sha512
6d5c31801c6cb835dd87d43490c6026ec34dbf9aa80e1f77d8b5e47efc2a42ddd1b51c9fd7b859449218385857e0a0d3601853fe6e1f9cd87bcb395c1c4c4acc
SSDeep
24576:LqKcGRbz4PODPBVrWoO7OfqGxhn/UWmoJUp:OK55DPeKDpvk
TLSH
4C2533B2A9F7DA5AC351C9FADB2AC3087C51762129091CCB28839709ED253C3BD52777

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Wgrve.Properties.Resources.resources
Cowuorbr
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Purchase ORDER 9.exe

Full Name

Purchase ORDER 9.exe

EntryPoint

System.Void Wgrve.Transactions.TransactionListener::ManageInterruptibleTransaction()

Scope Name

Purchase ORDER 9.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Purchase ORDER 9

Assembly Version

1.0.520.9979

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

6

Main Method

System.Void Wgrve.Transactions.TransactionListener::ManageInterruptibleTransaction()

Main IL Instruction Count

38

Main IL

ldc.i4 1 stloc V_0 br IL_000E: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_002C: newobj System.Void PurchaseORDER9.Summarization.BasicSummarizer::.ctor() newobj System.Void PurchaseORDER9.Summarization.BasicSummarizer::.ctor() ldloc.s V_2 call System.Byte[] PurchaseORDER9.Summarization.BasicSummarizer::CondensePortableSummarizer(System.Byte[]) stloc.s V_1 ldc.i4 2 ldsfld <Module>{181a6823-799a-4dab-9999-0b1edd46aaef} <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_f5eb32935b48473687dd0823c9cc9642 ldfld System.Int32 <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_78875b337af34cccbfc153d8857a55d6 brtrue IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) pop <null> ldc.i4 1 br IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) ret <null> newobj System.Void Wgrve.Finalization.ConcreteFinalizer::.ctor() ldloc.s V_1 call System.Void Wgrve.Finalization.ConcreteFinalizer::CompleteDetailedFinalizer(System.Byte[]) ldc.i4 3 ldsfld <Module>{181a6823-799a-4dab-9999-0b1edd46aaef} <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_f5eb32935b48473687dd0823c9cc9642 ldfld System.Int32 <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_971d353872064bd38e9276e286995a06 brtrue IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) pop <null> ldc.i4 0 br IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) newobj System.Void Wgrve.Networking.IsolatedRequest::.ctor() call System.Byte[] Wgrve.Networking.IsolatedRequest::RequestAccessibleRequest() stloc.s V_2 ldc.i4 0 ldsfld <Module>{181a6823-799a-4dab-9999-0b1edd46aaef} <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_f5eb32935b48473687dd0823c9cc9642 ldfld System.Int32 <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_d15ae26e75a842918c8672265a8c1d4d brtrue IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) pop <null> ldc.i4 0 br IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059)

Module Name

Purchase ORDER 9.exe

Full Name

Purchase ORDER 9.exe

EntryPoint

System.Void Wgrve.Transactions.TransactionListener::ManageInterruptibleTransaction()

Scope Name

Purchase ORDER 9.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Purchase ORDER 9

Assembly Version

1.0.520.9979

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

6

Main Method

System.Void Wgrve.Transactions.TransactionListener::ManageInterruptibleTransaction()

Main IL Instruction Count

38

Main IL

ldc.i4 1 stloc V_0 br IL_000E: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_002C: newobj System.Void PurchaseORDER9.Summarization.BasicSummarizer::.ctor() newobj System.Void PurchaseORDER9.Summarization.BasicSummarizer::.ctor() ldloc.s V_2 call System.Byte[] PurchaseORDER9.Summarization.BasicSummarizer::CondensePortableSummarizer(System.Byte[]) stloc.s V_1 ldc.i4 2 ldsfld <Module>{181a6823-799a-4dab-9999-0b1edd46aaef} <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_f5eb32935b48473687dd0823c9cc9642 ldfld System.Int32 <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_78875b337af34cccbfc153d8857a55d6 brtrue IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) pop <null> ldc.i4 1 br IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) ret <null> newobj System.Void Wgrve.Finalization.ConcreteFinalizer::.ctor() ldloc.s V_1 call System.Void Wgrve.Finalization.ConcreteFinalizer::CompleteDetailedFinalizer(System.Byte[]) ldc.i4 3 ldsfld <Module>{181a6823-799a-4dab-9999-0b1edd46aaef} <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_f5eb32935b48473687dd0823c9cc9642 ldfld System.Int32 <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_971d353872064bd38e9276e286995a06 brtrue IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) pop <null> ldc.i4 0 br IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) newobj System.Void Wgrve.Networking.IsolatedRequest::.ctor() call System.Byte[] Wgrve.Networking.IsolatedRequest::RequestAccessibleRequest() stloc.s V_2 ldc.i4 0 ldsfld <Module>{181a6823-799a-4dab-9999-0b1edd46aaef} <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_f5eb32935b48473687dd0823c9cc9642 ldfld System.Int32 <Module>{181a6823-799a-4dab-9999-0b1edd46aaef}::m_d15ae26e75a842918c8672265a8c1d4d brtrue IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059) pop <null> ldc.i4 0 br IL_0012: switch(IL_002C,IL_0085,IL_005A,IL_0059)

7e211b63aa0bb3f36e20ff7ab0cefda2 (985.09 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Wgrve.Properties.Resources.resources
Cowuorbr
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙