Suspicious
Suspect

1dd43ece2f07b9f4815c90c3a5680c5b

PE Executable
|
MD5: 1dd43ece2f07b9f4815c90c3a5680c5b
|
Size: 732.16 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
1dd43ece2f07b9f4815c90c3a5680c5b
Sha1
a51ec1c8a91bdb1278166255124d853154e83b95
Sha256
73ab8358ef3fd724fc5d5c31d13dfb4717ba6cc254c7da6402d3133c60ce058a
Sha384
a182ee126b4e12dc71e8266fad90a8a9a0a0459395eed651d5831cdb369855366244328d736362ec57ab89229ffcd503
Sha512
a300f3967f87daf9cbb4ec82d76460dc91b5810230d546dd4ee1e196e20d20dd5b2867872bc9d4c99a3a83db4f548a5fcb6de26508be88a1ab9d8934f2aa3cd0
SSDeep
12288:a3Nm0Sx6NXBhhtat/M/1v4Hw7dH+Ayy4OBGDIZ+Z1k2nPCEkxkR5GWwNGKDK:ONm0SxUX2t446/4OBGDIZ+ZvCE0kR+Nx
TLSH
27F412AE6468C71EE5502BF249A2E379537E1C4BF312D319D7CAADDB3C0B6210919393
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
Cycle_Jump_Game.Form1.resources
Cycle_Jump_Game.Main.resources
$this.Icon
[NBF]root.IconData
PIP
[NBF]root.Data
timer1.TrayLocation
Cycle_Jump_Game.Properties.Resources.resources
gLxp
[NBF]root.Data
[NBF]root.Data-preview.png
t1
[NBF]root.Data
[NBF]root.Data-preview.png
t2
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

EzjY.exe

Full Name

EzjY.exe

EntryPoint

System.Void Cycle_Jump_Game.More::Main()

Scope Name

EzjY.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

EzjY

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

64

Main Method

System.Void Cycle_Jump_Game.More::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void Cycle_Jump_Game.Main::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Artefacts
Name
Value
PDB Path

EzjY.pdb

1dd43ece2f07b9f4815c90c3a5680c5b (732.16 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
.Net Resources
Cycle_Jump_Game.Form1.resources
Cycle_Jump_Game.Main.resources
$this.Icon
[NBF]root.IconData
PIP
[NBF]root.Data
timer1.TrayLocation
Cycle_Jump_Game.Properties.Resources.resources
gLxp
[NBF]root.Data
[NBF]root.Data-preview.png
t1
[NBF]root.Data
[NBF]root.Data-preview.png
t2
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

EzjY.pdb

1dd43ece2f07b9f4815c90c3a5680c5b

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙