Suspicious
Suspect

7f4e83d693e913be99bd91c99cc350fe

PE Executable
|
MD5: 7f4e83d693e913be99bd91c99cc350fe
|
Size: 937.48 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
7f4e83d693e913be99bd91c99cc350fe
Sha1
f5731a362fe8f9feef2b0a68693284057ecc5add
Sha256
c2366dce8953e93f210e98df79f64a5fcfae6842c29331912cd0864b77f5a71f
Sha384
5d1d013e38ab6bf174eb7d26ce53869c04a671308bcd2bcfc9f8277d28ef1a3349331956f09fefb6f0561a39a58749fc
Sha512
af783309e3989fdc41105058e3e094fb6bcfd8c6f486df4b8a717ddc160c3b26f5bd8bc74335fe8b1e7cd06a4ac8d85927771dc51e21fd6097e827e775debd75
SSDeep
12288:qXpEVpOUvmBN7SjdXaAabQPZyAxb0kmUGjAM/Rf+1X3ECcFpI2Zu8vUmGOGAkR:UkpOamnMhZyAxbAAi5VE
TLSH
0C15C09D33A5B88FC057CA7189A0DE349A21AC6A9717C30351E75D9FBD0DA87DE102F2

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ClipboardAnalyzer.MainForm.resources
ClipboardAnalyzer.Properties.Resources.resources
Dfdt
[NBF]root.Data
[NBF]root.Data-preview.png
Teacher
[NBF]root.Data
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xE1800 size 13832 bytes

Module Name

sgrT.exe

Full Name

sgrT.exe

EntryPoint

System.Void ClipboardAnalyzer.Program::Main()

Scope Name

sgrT.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

sgrT

Assembly Version

9.7.9.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

367

Main Method

System.Void ClipboardAnalyzer.Program::Main()

Main IL Instruction Count

25

Main IL

nop <null> call System.Void ClipboardAnalyzer.Program::‪‌‭​‎‌‬‬‌‏‍‮‏‭‏‫‍​‌‫‫‏‫‪‍‍‮() nop <null> ldc.i4 -1035421966 ldc.i4 -1588988234 xor <null> dup <null> stloc.0 <null> ldc.i4.3 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_003E: nop ldc.i4.0 <null> call System.Void ClipboardAnalyzer.Program::‮‭‭‪​‪‮‍‫‏​‫‭‪‪‌‎‫‪‮‪‪‬‪‌‪‌‌‭‫‮(System.Boolean) ldloc.0 <null> ldc.i4 -938421052 mul <null> ldc.i4 2128583542 xor <null> br.s IL_000C: ldc.i4 -1588988234 nop <null> newobj System.Void ClipboardAnalyzer.MainForm::.ctor() call System.Void ClipboardAnalyzer.Program::‏​‫‌‬‎‌‮‬‍‍‮‎‎‎‏‮‎‍‍‮(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

sgrT.exe

Full Name

sgrT.exe

EntryPoint

System.Void ClipboardAnalyzer.Program::Main()

Scope Name

sgrT.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

sgrT

Assembly Version

9.7.9.8

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

367

Main Method

System.Void ClipboardAnalyzer.Program::Main()

Main IL Instruction Count

25

Main IL

nop <null> call System.Void ClipboardAnalyzer.Program::‪‌‭​‎‌‬‬‌‏‍‮‏‭‏‫‍​‌‫‫‏‫‪‍‍‮() nop <null> ldc.i4 -1035421966 ldc.i4 -1588988234 xor <null> dup <null> stloc.0 <null> ldc.i4.3 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_003E: nop ldc.i4.0 <null> call System.Void ClipboardAnalyzer.Program::‮‭‭‪​‪‮‍‫‏​‫‭‪‪‌‎‫‪‮‪‪‬‪‌‪‌‌‭‫‮(System.Boolean) ldloc.0 <null> ldc.i4 -938421052 mul <null> ldc.i4 2128583542 xor <null> br.s IL_000C: ldc.i4 -1588988234 nop <null> newobj System.Void ClipboardAnalyzer.MainForm::.ctor() call System.Void ClipboardAnalyzer.Program::‏​‫‌‬‎‌‮‬‍‍‮‎‎‎‏‮‎‍‍‮(System.Windows.Forms.Form) nop <null> ret <null>

7f4e83d693e913be99bd91c99cc350fe (937.48 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ClipboardAnalyzer.MainForm.resources
ClipboardAnalyzer.Properties.Resources.resources
Dfdt
[NBF]root.Data
[NBF]root.Data-preview.png
Teacher
[NBF]root.Data
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙