Suspicious
Suspect

ecc5ab1fb8de30ed9f89aae99f203f5a

PE Executable
|
MD5: ecc5ab1fb8de30ed9f89aae99f203f5a
|
Size: 1.65 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
ecc5ab1fb8de30ed9f89aae99f203f5a
Sha1
30c9bfc967918ef927af7db1d0a7f5de0c27c9ba
Sha256
1bf4e2c7314d1559dcdcb38a7a094407274133e6545b3e6534b4adb4aedda8f7
Sha384
193ce6ebc5985f8c90af6eafdffd227741db231b5983b458c1c1656c96a477256a8ffd55f22e571f92504a6777bc1b7a
Sha512
b44202c6350e179c5518d2180bfaa0748c3e079c44d92ddb91c539240c7a283e6a4a2725cf34e1ebe10104b25258e679fb6c02d1c93580ea7e3a51d18f0d58ba
SSDeep
49152:/i/wtrSly6uJNbPjvDGBnL9JOUIXw8dUufBu:q2pJdvDGdL9JOUGw8dUMu
TLSH
D27533533F930AF0C511A5B2E01E5A20527ABDB9222BC6192C02D750598737DEFBAFF5

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual C++ v6.0 DLL
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Tnurkyma.Properties.Resources.resources
Pdxxzmlhrz
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Wzqfttpid.exe

Full Name

Wzqfttpid.exe

EntryPoint

System.Void HarfBuzzSharp.Location.SchemaRunner::IdentifyCustomLocator()

Scope Name

Wzqfttpid.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Wzqfttpid

Assembly Version

1.0.1147.14259

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

9

Main Method

System.Void HarfBuzzSharp.Location.SchemaRunner::IdentifyCustomLocator()

Main IL Instruction Count

18

Main IL

ldc.i4 1 stloc V_0 br IL_000E: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_0057: ret newobj System.Void HarfBuzzSharp.StateManagement.StateBridge::.ctor() call System.Byte[] HarfBuzzSharp.StateManagement.StateBridge::MaintainSetState() call System.Byte[] Wzqfttpid.ContextManagement.ContextEditor::ManageRandomContext(System.Object) call System.Void Wzqfttpid.Distribution.DistributorProc::SortDistributor(System.Object) ldc.i4 0 ldsfld <Module>{49a5ecd7-e334-4041-a20b-094db5f293a0} <Module>{49a5ecd7-e334-4041-a20b-094db5f293a0}::m_ad68377990854eb385a97dbe46d58409 ldfld System.Int32 <Module>{49a5ecd7-e334-4041-a20b-094db5f293a0}::m_aee0510018c34e638ab688082f641482 brfalse IL_0012: switch(IL_0057,IL_0024) pop <null> ldc.i4 0 br IL_0012: switch(IL_0057,IL_0024) ret <null>

Module Name

Wzqfttpid.exe

Full Name

Wzqfttpid.exe

EntryPoint

System.Void HarfBuzzSharp.Location.SchemaRunner::IdentifyCustomLocator()

Scope Name

Wzqfttpid.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Wzqfttpid

Assembly Version

1.0.1147.14259

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

9

Main Method

System.Void HarfBuzzSharp.Location.SchemaRunner::IdentifyCustomLocator()

Main IL Instruction Count

18

Main IL

ldc.i4 1 stloc V_0 br IL_000E: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_0057: ret newobj System.Void HarfBuzzSharp.StateManagement.StateBridge::.ctor() call System.Byte[] HarfBuzzSharp.StateManagement.StateBridge::MaintainSetState() call System.Byte[] Wzqfttpid.ContextManagement.ContextEditor::ManageRandomContext(System.Object) call System.Void Wzqfttpid.Distribution.DistributorProc::SortDistributor(System.Object) ldc.i4 0 ldsfld <Module>{49a5ecd7-e334-4041-a20b-094db5f293a0} <Module>{49a5ecd7-e334-4041-a20b-094db5f293a0}::m_ad68377990854eb385a97dbe46d58409 ldfld System.Int32 <Module>{49a5ecd7-e334-4041-a20b-094db5f293a0}::m_aee0510018c34e638ab688082f641482 brfalse IL_0012: switch(IL_0057,IL_0024) pop <null> ldc.i4 0 br IL_0012: switch(IL_0057,IL_0024) ret <null>

ecc5ab1fb8de30ed9f89aae99f203f5a (1.65 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙