Suspicious
Suspect

ca0246cadc64dde0500a25627f3d7d84

PE Executable
|
MD5: ca0246cadc64dde0500a25627f3d7d84
|
Size: 586.75 KB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
ca0246cadc64dde0500a25627f3d7d84
Sha1
03793bbb2dff60bad27938ed4efa73b8c853aba8
Sha256
503bff3687c04240238ccb812d7e91d781b1cf4ce1e3edb7f3f018e685736049
Sha384
fc7f504cb6d652da71e35e3f6915cb61cf3ae897254353767413357c9e9f029f374762a301d61fe5b2e17c31a5661f27
Sha512
97f7ce9fafe3cb374cad8fd806037cc8b2adb8e84e2e605469bff08a823c3e815a2e889e61710c329d3d6a685add65d97a49eef4e3b47b54031e42f57808ae92
SSDeep
12288:ViGpxrsZtpn2HZyV2swUYfYtf1WW3B2F1s7CFy4xyfWWDrw2dxgQfOVBs:gmxrMOoVHYfGNW6SsmF9yfW6w2d6VBs
TLSH
13C42305AA1BF532DAE14B3BDDA1650407F25501E203FAAB37ED13A324A3B7E57C69C1

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Fnvtccwzlhn.Properties.Resources.resources
Amrzucuxy
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Fnvtccwzlhn.exe

Full Name

Fnvtccwzlhn.exe

EntryPoint

System.Void Fnvtccwzlhn.Syadbxm::Main()

Scope Name

Fnvtccwzlhn.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Fnvtccwzlhn

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

12

Main Method

System.Void Fnvtccwzlhn.Syadbxm::Main()

Main IL Instruction Count

19

Main IL

br IL_0040: newobj System.Void Fnvtccwzlhn.Wvujolbazkc::.ctor() nop <null> ldloc.s V_0 call System.Byte[] Fnvtccwzlhn.Properties.Ldvcgnuxjf::get_Amrzucuxy() ldsfld System.Byte[] Fnvtccwzlhn.Validation.ElementValidator::validatorProcElements ldsfld System.Byte[] Fnvtccwzlhn.Validation.ElementValidator::m_PoolRequesterData ldstr JM0VOqYhis5UqxlohW6.KXby2nYBTsIGYD03H2R ldstr wUyY1bdIOg callvirt System.Void Fnvtccwzlhn.Wvujolbazkc::Clfpfoccr(System.Byte[],System.Byte[],System.Byte[],System.String,System.String) br IL_002B: leave IL_004C leave IL_004C: ret pop <null> br IL_0036: leave IL_004C leave IL_004C: ret br IL_004C: ret newobj System.Void Fnvtccwzlhn.Wvujolbazkc::.ctor() stloc.s V_0 br IL_0005: nop ret <null>

Module Name

Fnvtccwzlhn.exe

Full Name

Fnvtccwzlhn.exe

EntryPoint

System.Void Fnvtccwzlhn.Syadbxm::Main()

Scope Name

Fnvtccwzlhn.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Fnvtccwzlhn

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

12

Main Method

System.Void Fnvtccwzlhn.Syadbxm::Main()

Main IL Instruction Count

19

Main IL

br IL_0040: newobj System.Void Fnvtccwzlhn.Wvujolbazkc::.ctor() nop <null> ldloc.s V_0 call System.Byte[] Fnvtccwzlhn.Properties.Ldvcgnuxjf::get_Amrzucuxy() ldsfld System.Byte[] Fnvtccwzlhn.Validation.ElementValidator::validatorProcElements ldsfld System.Byte[] Fnvtccwzlhn.Validation.ElementValidator::m_PoolRequesterData ldstr JM0VOqYhis5UqxlohW6.KXby2nYBTsIGYD03H2R ldstr wUyY1bdIOg callvirt System.Void Fnvtccwzlhn.Wvujolbazkc::Clfpfoccr(System.Byte[],System.Byte[],System.Byte[],System.String,System.String) br IL_002B: leave IL_004C leave IL_004C: ret pop <null> br IL_0036: leave IL_004C leave IL_004C: ret br IL_004C: ret newobj System.Void Fnvtccwzlhn.Wvujolbazkc::.ctor() stloc.s V_0 br IL_0005: nop ret <null>

ca0246cadc64dde0500a25627f3d7d84 (586.75 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙