Suspicious
Suspect

c09766e06d334af9c0c475934266075a

PE Executable
|
MD5: c09766e06d334af9c0c475934266075a
|
Size: 380.52 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
c09766e06d334af9c0c475934266075a
Sha1
1c2d5c3f05d432b199d8681349fd8d807bd03dde
Sha256
73d81ccb9a09fc6ce1789df05b4fec440ba9aa3c0998da3a843e577a111def96
Sha384
cf51597db9526c004cc6ba09a3a99f233e0b0ddd8813aa9d33cfbc0c148098010c364d445101660a1023334563b8a837
Sha512
b1e7157842c6b1a5761b71fe3495791a58e6f6e0f4238d81c28e32457b10f67abe87a73c90872b84b06ca07553573a823eb675511195edde5caab256e0a9a4a5
SSDeep
6144:a7aiI7MRBf2XyA7qW0RlCvphxc4QeL2FGOoYGRzhnhCqz3EjOyTU9YZbosNboss:a4MnuyQH0RI5QeqF9VMhCu3ECWosJoss
TLSH
EF8412063FF89792DE8A5B7812C7A996EF30E359FE11F78B1A5DC8151C523E91E8100B

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_c9d19ed7.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.reloc
.rsrc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ZXCVSD&&
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x56800 size 26216 bytes

Info

PDB Path: C:\Users\VICTOR\Documents\CryptoObfuscator_Output\ZXCVSD.pdb

Module Name

ZXCVSD.exe

Full Name

ZXCVSD.exe

EntryPoint

System.Void A.::()

Scope Name

ZXCVSD.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

ZXCVSD

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5.2

Total Strings

4

Main Method

System.Void A.::()

Main IL Instruction Count

36

Main IL

nop <null> ldloca.s V_0 ldloca.s V_1 call System.Boolean A.::(System.String&,System.Byte[]&) dup <null> pop <null> ldc.i4.4 <null> call System.Int32 A. ::(System.Int32) ceq <null> stloc.2 <null> ldloc.2 <null> brfalse.s IL_001A: ldloc.1 br.s IL_004D: ret ldloc.1 <null> ldlen <null> brfalse.s IL_0039: ldc.i4.8 ldc.i4.6 <null> switch dnlib.DotNet.Emit.Instruction[] ldc.i4.1 <null> brtrue.s IL_0031: ldloc.0 ldtoken System.Void A.::() pop <null> ldloc.0 <null> call System.Boolean A.::(System.String) br.s IL_003F: stloc.3 ldc.i4.8 <null> call System.Int32 A. ::(System.Int32) stloc.3 <null> ldloc.3 <null> brfalse.s IL_0045: ldloc.0 br.s IL_004D: ret ldloc.0 <null> ldloc.1 <null> call System.Void A.:: (System.String,System.Byte[]) nop <null> ret <null>

Module Name

ZXCVSD.exe

Full Name

ZXCVSD.exe

EntryPoint

System.Void A.::()

Scope Name

ZXCVSD.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

ZXCVSD

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5.2

Total Strings

4

Main Method

System.Void A.::()

Main IL Instruction Count

36

Main IL

nop <null> ldloca.s V_0 ldloca.s V_1 call System.Boolean A.::(System.String&,System.Byte[]&) dup <null> pop <null> ldc.i4.4 <null> call System.Int32 A. ::(System.Int32) ceq <null> stloc.2 <null> ldloc.2 <null> brfalse.s IL_001A: ldloc.1 br.s IL_004D: ret ldloc.1 <null> ldlen <null> brfalse.s IL_0039: ldc.i4.8 ldc.i4.6 <null> switch dnlib.DotNet.Emit.Instruction[] ldc.i4.1 <null> brtrue.s IL_0031: ldloc.0 ldtoken System.Void A.::() pop <null> ldloc.0 <null> call System.Boolean A.::(System.String) br.s IL_003F: stloc.3 ldc.i4.8 <null> call System.Int32 A. ::(System.Int32) stloc.3 <null> ldloc.3 <null> brfalse.s IL_0045: ldloc.0 br.s IL_004D: ret ldloc.0 <null> ldloc.1 <null> call System.Void A.:: (System.String,System.Byte[]) nop <null> ret <null>

c09766e06d334af9c0c475934266075a (380.52 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙