Suspicious
Suspect

263bef23652302d7bfff37ed315f00cb

PE Executable
|
MD5: 263bef23652302d7bfff37ed315f00cb
|
Size: 1.15 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Low

Hash
Hash Value
MD5
263bef23652302d7bfff37ed315f00cb
Sha1
f878c2d6c10f14662f074a4fe7d3504f2da3636b
Sha256
cda6a5e6cfad4f58e6953bb9365b6044880899c6c0e079b1a68a4f193a2f1a16
Sha384
308db6d3c11751f452490077457e636158ff8cd80cda03de86d61811db4e956bc062c8f4c7aa985195e410ab3649bc96
Sha512
dddba65eb87d338b313e568ffc435bb27cab5459ae45a99102beda5bb558270273d3b5a0c7db9a0e163bcb187df37df9ee109125c9703007d9ee3a009a69e8d1
SSDeep
24576:P/NOASOd0Z2B5HN1mZZ/5xaLHBLA3XPK1riHdx47FVi5PUpA:tFSOdTXMnazO0rWHyVi5UpA
TLSH
F635F1442369E902D0A65FF00D71D3B847B96D85A412D313CFF6BDEBBC7A7916809293

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
CallFuzzer.Form1.resources
CallFuzzer.Properties.Resources.resources
TZ4
[NBF]root.Data
xJWL
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

ComDefaultInterfaceAttrib

Full Name

ComDefaultInterfaceAttrib

EntryPoint

System.Void EventManifestOpti.MutexSecur::Main()

Scope Name

ComDefaultInterfaceAttrib

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

WjZP

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

651

Main Method

System.Void EventManifestOpti.MutexSecur::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void CodeGr.ConstructionRespo::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

ComDefaultInterfaceAttrib

Full Name

ComDefaultInterfaceAttrib

EntryPoint

System.Void EventManifestOpti.MutexSecur::Main()

Scope Name

ComDefaultInterfaceAttrib

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

WjZP

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

651

Main Method

System.Void EventManifestOpti.MutexSecur::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void CodeGr.ConstructionRespo::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

263bef23652302d7bfff37ed315f00cb (1.15 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
CallFuzzer.Form1.resources
CallFuzzer.Properties.Resources.resources
TZ4
[NBF]root.Data
xJWL
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙