Suspicious
Suspect

9ef3ad60dc53110a64bbcad24b88266c

PE Executable
|
MD5: 9ef3ad60dc53110a64bbcad24b88266c
|
Size: 340.99 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
9ef3ad60dc53110a64bbcad24b88266c
Sha1
f68da020db677aa6a5fd085a0ad0af3697d92800
Sha256
8e8b30b90b73ff1776e14f4dd0750417fd50fb54664023cfeea22457b3594934
Sha384
e8ef9b5625e5f0f2f89d4a7868365c320e80c73856c203956262aecc0c3e66de12ca8845dc4c08142760a94723678e9e
Sha512
f71d781706ef47c2d779d434e9427123805283f144298b1f57de967e5c63e7d96c6ce36dc73100fc63db3cfee20eda2596047380bba6060383841e71387ef0eb
SSDeep
6144:6E3RuAVNFWMWQTWhlVZFhyF/k+BhTYY+ZCYdzSNRXkvySPju9AXbFlMjUWUz6/wK:jhuA7FWMeZO4FymlMjjwl7Hs
TLSH
417484257FA58E10D584247ECA7E2A09CB12E0F125027343374AF7A25D469EEDE2D3DB
File Structure
.Net Resources
ktisr6mzfey4yb
Informations
Name
Value
Info

PE Detect: PeReader FAIL, AsmResolver Mapped OK

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

<<<NULL>>>

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

<null>

Total Strings

506

Main Method

<<<NULL>>>

Main IL Instruction Count

167

Main IL

call <<<NULL>>> stloc <null> br IL_003F: br IL_000E nop <null> ldloc <null> call <<<NULL>>> ceq <null> brfalse IL_0029: nop nop <null> call <<<NULL>>> stloc <null> nop <null> ldloc <null> call <<<NULL>>> ceq <null> brfalse IL_003F: br IL_000E br IL_0044: call <<<NULL>>> br IL_000E: nop call <<<NULL>>> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::uirTosNgIRDrAixCFdaTZ call <<<NULL>>> call <<<NULL>>> call brfalse IL_006C: ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::sZbpogcpZYp call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::sZbpogcpZYp call <<<NULL>>> brtrue IL_0080: call <<<NULL>>> leave IL_0283: ret call <<<NULL>>> call <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::kuiumdzJisETnrATbiRCw brtrue IL_026E: call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::FpUdvgmOdzqTdsgYMEfDHkOOg call <<<NULL>>> newarr System.Char dup <null> call <<<NULL>>> call <<<NULL>>> stelem.i2 <null> callvirt stloc <null> ldloc <null> ldsfld <<<NULL>>> DTILCspthQfT.uiVUMVxFvqO::uiokaXjycHdPxNIMnoa ldloc <null> ldlen <null> conv.i4 <null> callvirt ldelem System.String call <<<NULL>>> newarr System.Char dup <null> call <<<NULL>>> call <<<NULL>>> stelem.i2 <null> callvirt stloc <null> ldloc <null> call <<<NULL>>> ldelem System.String call <<<NULL>>> newarr System.Char dup <null> call <<<NULL>>> call <<<NULL>>> stelem.i2 <null> callvirt stloc <null> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj callvirt <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldloc <null> call <<<NULL>>> ldelem System.String ldloc <null> ldsfld <<<NULL>>> DTILCspthQfT.uiVUMVxFvqO::uiokaXjycHdPxNIMnoa ldloc <null> ldlen <null> conv.i4 <null> callvirt ldelem System.String callvirt <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::kuiumdzJisETnrATbiRCw brfalse IL_026E: call <<<NULL>>> ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj newobj <<<NULL>>> stfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::KrqYykxajL ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj newobj <<<NULL>>> stfld <<<NULL>>> imMrmmKwLQJzysmAh.ncmMqEslAKFJh::vEPhDBpsRtnIJmPUe ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj call <<<NULL>>> newarr System.Object dup <null> call <<<NULL>>> call <<<NULL>>> call <<<NULL>>> stelem.ref <null> dup <null> call <<<NULL>>> call <<<NULL>>> stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::dBwPOFigOomGMGbRwimqaELMU stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::NajaDHsjaDlwq stelem.ref <null> dup <null> call <<<NULL>>> call call <<<NULL>>> call <<<NULL>>> call call stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::XAuwkfenJyfIGHoL stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::LLNkWfkyibI stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::bSRqZMqjiImzJFedoSiAK stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::HXyOWlnChFJhRIjTDnm stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::NFfjAUKxCEVBigOShv stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::OPrVaFxvDkRNkkkxesm stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::TtDsneFFttvdtgbCVwTWQ stelem.ref <null> dup <null> call <<<NULL>>> ldsfld <<<NULL>>> oGWKjjQFRzbcFxv.aWJXagtjYOUxUKKYceSEi::nXLOsDbeUMrgppQKAIGH stelem.ref <null> dup <null> call <<<NULL>>> call <<<NULL>>> stelem.ref <null> call <<<NULL>>> callvirt <<<NULL>>> call <<<NULL>>> call br IL_008A: ldsfld <<<NULL>>> imMrmmKwLQJzysmAh.DxfkXNDjkdbWDdTQwmBUVlWs::CHcIDzBYVTCJVAOhgj pop <null> leave IL_0283: ret ret <null>

Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

9ef3ad60dc53110a64bbcad24b88266c (340.99 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙