Suspicious
Suspect

e1961dcbe3664231d9affd0ddc5cabd2

PE Executable
|
MD5: e1961dcbe3664231d9affd0ddc5cabd2
|
Size: 817.67 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very high

Hash
Hash Value
MD5
e1961dcbe3664231d9affd0ddc5cabd2
Sha1
1783c3314c859cc369ba0875375ee4f95a85291c
Sha256
57365350234375cd60d16cba2aefbff8d0dc048ae37669fc40bb9c42cab64037
Sha384
5d8d494ed5ce5c7d8a842f369672c30ec6ac5152c07b036188a57ed0998c1774d1cc1eaf2a6bb1513839eebdd3da5265
Sha512
02d6fa5f907557634fc71c49b99f34fbe7f3ac2e0295d2a12328ecf0229f357c012b0d9e732be27a309acf3e49fafbb4266d477f69423bd0de3389433886e57f
SSDeep
12288:TRBOCcFYdhVa5YVq0qQbpu/dCSWYA0xBeAFmMr4u+E8m4NTswUfSGw/kR:lBYYDrq0qQbgVCSSqLsMy+
TLSH
9905D0AD3254B58EC4A7CE728A64DD709A607CAA9707C20351E71C9FB91DAC7DE102F3

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ClipboardAnalyzer.MainForm.resources
ClipboardAnalyzer.Properties.Resources.resources
Teacher
[NBF]root.Data
lweg
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xC4400 size 13832 bytes

Module Name

vxGf.exe

Full Name

vxGf.exe

EntryPoint

System.Void ClipboardAnalyzer.Program::Main()

Scope Name

vxGf.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

vxGf

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

367

Main Method

System.Void ClipboardAnalyzer.Program::Main()

Main IL Instruction Count

31

Main IL

nop <null> call System.Void ClipboardAnalyzer.Program::‪​‮‌‮‏‍‏‌‏‌‌‮‌‬‫‬‬‮‎‭‪‏‏‬‮() ldc.i4 1856566434 ldc.i4 1835905185 xor <null> dup <null> stloc.0 <null> ldc.i4.4 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_005D: ret nop <null> ldloc.0 <null> ldc.i4 1615302716 mul <null> ldc.i4 -1725705048 xor <null> br.s IL_000B: ldc.i4 1835905185 ldc.i4.0 <null> call System.Void ClipboardAnalyzer.Program::‭​‏‏‍‌​‌‍‌‎‍‫‮‎‎‪‬‌‌‮(System.Boolean) nop <null> newobj System.Void ClipboardAnalyzer.MainForm::.ctor() call System.Void ClipboardAnalyzer.Program::‪​‬‍‬‭‪‎​‮‮‭‮‬‭‌‮‭‏‫‮‫​‎‫‭‬‌‮(System.Windows.Forms.Form) nop <null> ldloc.0 <null> ldc.i4 -385679141 mul <null> ldc.i4 -1544498500 xor <null> br.s IL_000B: ldc.i4 1835905185 ret <null>

Module Name

vxGf.exe

Full Name

vxGf.exe

EntryPoint

System.Void ClipboardAnalyzer.Program::Main()

Scope Name

vxGf.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

vxGf

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

367

Main Method

System.Void ClipboardAnalyzer.Program::Main()

Main IL Instruction Count

31

Main IL

nop <null> call System.Void ClipboardAnalyzer.Program::‪​‮‌‮‏‍‏‌‏‌‌‮‌‬‫‬‬‮‎‭‪‏‏‬‮() ldc.i4 1856566434 ldc.i4 1835905185 xor <null> dup <null> stloc.0 <null> ldc.i4.4 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br.s IL_005D: ret nop <null> ldloc.0 <null> ldc.i4 1615302716 mul <null> ldc.i4 -1725705048 xor <null> br.s IL_000B: ldc.i4 1835905185 ldc.i4.0 <null> call System.Void ClipboardAnalyzer.Program::‭​‏‏‍‌​‌‍‌‎‍‫‮‎‎‪‬‌‌‮(System.Boolean) nop <null> newobj System.Void ClipboardAnalyzer.MainForm::.ctor() call System.Void ClipboardAnalyzer.Program::‪​‬‍‬‭‪‎​‮‮‭‮‬‭‌‮‭‏‫‮‫​‎‫‭‬‌‮(System.Windows.Forms.Form) nop <null> ldloc.0 <null> ldc.i4 -385679141 mul <null> ldc.i4 -1544498500 xor <null> br.s IL_000B: ldc.i4 1835905185 ret <null>

e1961dcbe3664231d9affd0ddc5cabd2 (817.67 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ClipboardAnalyzer.MainForm.resources
ClipboardAnalyzer.Properties.Resources.resources
Teacher
[NBF]root.Data
lweg
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙