Suspicious
Suspect

9f71fa3e5a19bf497c28bc86d3add2b8

PE Executable
|
MD5: 9f71fa3e5a19bf497c28bc86d3add2b8
|
Size: 974.34 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Low

Hash
Hash Value
MD5
9f71fa3e5a19bf497c28bc86d3add2b8
Sha1
6bfcfb7c5251d07376edfc22c50ac54b802dc936
Sha256
1849180107c4fddc3104670d0c3d0249322b49b3439d7681f6b40922806194ed
Sha384
b2c63ddd771fc5ef3e1e68d49f60fa9ae8e2aecda754350f34805e4508e7f2bda9ae2ab1ac4ffa589803cf1a7ceebd56
Sha512
c782ea2e376dbca8f506fe969dc9b0d7d2fbcd172966e74a32d9c8fcedef25cb183fcfd3b31408a6ccdfd31c434e514bdb5b08c2e9568d4e3104f8fd5dcfdb9b
SSDeep
12288:tDVJriISA9baEWuF65Zw18CPKRW1dETEZpF0RUBgojCwuO6PtvghRwMax8kR:4ISA9WE8Y8W1eTshj8IEL
TLSH
0F251291139AD903D29183B908E2E3B07779DD8D6622C70B5ED4BDEB7E7E7013981272
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
WordleForms.GameOver.resources
WordleForms.WordleForm.resources
$this.Icon
[NBF]root.IconData
True
[NBF]root.Data
statusStrip1.TrayLocation
toolStrip1.TrayLocation
WordleForms.Properties.Resources.resources
EPmI
[NBF]root.Data
[NBF]root.Data-preview.png
help_FILL0_wght300_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
restart
restart_alt_FILL0_wght400_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xEA800 size 13832 bytes

Info

PDB Path: ?

Module Name

fzLY.exe

Full Name

fzLY.exe

EntryPoint

System.Void WordleForms.Program::Main()

Scope Name

fzLY.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

fzLY

Assembly Version

0.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

152

Main Method

System.Void WordleForms.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void WordleForms.WordleForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

9f71fa3e5a19bf497c28bc86d3add2b8 (974.34 KB)
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
WordleForms.GameOver.resources
WordleForms.WordleForm.resources
$this.Icon
[NBF]root.IconData
True
[NBF]root.Data
statusStrip1.TrayLocation
toolStrip1.TrayLocation
WordleForms.Properties.Resources.resources
EPmI
[NBF]root.Data
[NBF]root.Data-preview.png
help_FILL0_wght300_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
restart
restart_alt_FILL0_wght400_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙