Suspicious
Suspect

f665283962b63ad448b9ea160cceecb6

PE Executable
|
MD5: f665283962b63ad448b9ea160cceecb6
|
Size: 759.3 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
f665283962b63ad448b9ea160cceecb6
Sha1
c09a9c42d0d1c8e22aeff7aabaee677d88df34a1
Sha256
4af56b9bfd7f7de86cc0b3b6a910c2ffb331f6c76e32104041c554c00409d296
Sha384
048ae80baa12e9bdceed608b6fffd1a6d19162134f6d14ccc7db5c1197310e6dfe1248fa7f80b993db612ed9fcdd9ec1
Sha512
fadc11deb6a1d9ca6ee61c3ceaeb9689ca1f7b71487e6c2edcb8e4104a4ec71fad4b6d2ec90283bec39b0137867b2f69031fab4c1784b22e280c41ef9e93511a
SSDeep
12288:vCcFffbrtbJjy249fQkLbT7ZMbstvOAaMsCtD/zjyOeoEwde6T6IjqYI8:xXbFdL49IkrtvuMUVwdCUQ8
TLSH
C1F4011123AAEB03E0F68BF81960D37503796E89B910E3474FE6BCEB79367412855793

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ClipboardAnalyzer.MainForm.resources
ClipboardAnalyzer.Properties.Resources.resources
Teacher
[NBF]root.Data
mXoP
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: bvzu.pdb

Module Name

bvzu.exe

Full Name

bvzu.exe

EntryPoint

System.Void ClipboardAnalyzer.Program::Main()

Scope Name

bvzu.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

bvzu

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

367

Main Method

System.Void ClipboardAnalyzer.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void ClipboardAnalyzer.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

bvzu.exe

Full Name

bvzu.exe

EntryPoint

System.Void ClipboardAnalyzer.Program::Main()

Scope Name

bvzu.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

bvzu

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

367

Main Method

System.Void ClipboardAnalyzer.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void ClipboardAnalyzer.MainForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

f665283962b63ad448b9ea160cceecb6 (759.3 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
ClipboardAnalyzer.MainForm.resources
ClipboardAnalyzer.Properties.Resources.resources
Teacher
[NBF]root.Data
mXoP
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙