Suspicious
Suspect

a7c625a8bd155e28b87d8fc64a2ff5c5

PE Executable
|
MD5: a7c625a8bd155e28b87d8fc64a2ff5c5
|
Size: 427.52 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
a7c625a8bd155e28b87d8fc64a2ff5c5
Sha1
b3a9fa98fd31639e87b0c7d27e8752d91b9a82b8
Sha256
ce282ff2d8431a57bbae4a89bacf3bf8d22d78bde8b50565ce8ee0c3bd4b25bc
Sha384
fce47c2e546e423fa5069052e79a0baefcc92fae7bf79c4631c7b48e5b7aee35cd0bb41b5a0409d7fa6078cf892b4705
Sha512
7743b3ea81020ac99276389e3036f760504fbf43efe5b6c1cec25389d884721e316b6cccbbc093b722b2438a8aa51d550225058499c8a27fc7f0569145357e99
SSDeep
12288:3be+G6yqN8VyQRqh2HdiLAcPM7MtFfLpuJ1CDi9rzSjbU:L77CVyQRqh2HfMtFf9NSrz8
TLSH
4894024DBF235A22E21C0F76D513644841F8CAA5E511F37F24DA29F20F6A69A448FE73

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

aLqZ.exe

Full Name

aLqZ.exe

EntryPoint

System.Void HabitTracker.Program::Main()

Scope Name

aLqZ.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

aLqZ

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void HabitTracker.Program::Main()

Main IL Instruction Count

39

Main IL

ldsfld System.Char[] <PrivateImplementationDetails>::Ⴀ stloc.2 <null> ldc.i4.3 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void HabitTracker.Statistics::Ⴄ() ldc.i4 854 ldc.i4 844 call System.Void HabitTracker.Program::Ⴅ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4.s 97 ldc.i4.s 13 call System.Void HabitTracker.HabitTracker::Ⴃ(System.Boolean,System.Char,System.Char) ldloc.2 <null> ldc.i4 400 ldelem.u2 <null> ldc.i4 15549 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void HabitTracker.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldsfld System.Char[] HabitTracker.Habit::Ⴍ ldc.i4.s 83 ldsfld System.Char[] HabitTracker.Habit::Ⴍ ldc.i4.s 83 ldelem.u2 <null> ldsfld System.Char[] <PrivateImplementationDetails>::Ⴀ ldc.i4 243 ldelem.u2 <null> or <null> ldc.i4.s 94 and <null> stelem.i2 <null> ret <null> ldtoken System.Void HabitTracker.Program::Main() pop <null> ret <null>

Module Name

aLqZ.exe

Full Name

aLqZ.exe

EntryPoint

System.Void HabitTracker.Program::Main()

Scope Name

aLqZ.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

aLqZ

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void HabitTracker.Program::Main()

Main IL Instruction Count

39

Main IL

ldsfld System.Char[] <PrivateImplementationDetails>::Ⴀ stloc.2 <null> ldc.i4.3 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void HabitTracker.Statistics::Ⴄ() ldc.i4 854 ldc.i4 844 call System.Void HabitTracker.Program::Ⴅ(System.Int16,System.Int32) ldc.i4.0 <null> ldc.i4.s 97 ldc.i4.s 13 call System.Void HabitTracker.HabitTracker::Ⴃ(System.Boolean,System.Char,System.Char) ldloc.2 <null> ldc.i4 400 ldelem.u2 <null> ldc.i4 15549 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void HabitTracker.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldsfld System.Char[] HabitTracker.Habit::Ⴍ ldc.i4.s 83 ldsfld System.Char[] HabitTracker.Habit::Ⴍ ldc.i4.s 83 ldelem.u2 <null> ldsfld System.Char[] <PrivateImplementationDetails>::Ⴀ ldc.i4 243 ldelem.u2 <null> or <null> ldc.i4.s 94 and <null> stelem.i2 <null> ret <null> ldtoken System.Void HabitTracker.Program::Main() pop <null> ret <null>

a7c625a8bd155e28b87d8fc64a2ff5c5 (427.52 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙