Suspicious
Suspect

b405d07b6ffac0fd4c87d9190a4f0e0d

PE Executable
|
MD5: b405d07b6ffac0fd4c87d9190a4f0e0d
|
Size: 922.11 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
b405d07b6ffac0fd4c87d9190a4f0e0d
Sha1
f4e46063071fcb3346d1891da0bf3754b0256a9d
Sha256
cd1e1d27cd89b4dd3949c6c17b83554bf480178555271a286fe65f2a607f3171
Sha384
be26ec6a18cfac8a801e5a804659830370de48c24dc8b2af8bcceea563ee57b09e3d7dea4712c65007a03839251f1307
Sha512
38d5d8116ef239f79e9bf3a3111bf45e9d2892abbc3ffae312a0599b366adb4be25148cbd2700bbbcfcf16fa16d16d448513ca5cda23c2ccae84099ee4728ac5
SSDeep
12288:rqpHI+qB8bi7f62UgovIh8WUYsKfTeqRxfPuh/5f6+Ig9DeIPuZsljJE5gNLNzci:z+qB8bQUgFhz8UXE5f609Sxd5gN6+r
TLSH
8C15011CF666AE2ACA6C1F76C013121845F1C457E262F36F68D11DF06E79BA8C88F857

PeID

.NET executable
HQR data file
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Informations
Name
Value
Module Name

czek.exe

Full Name

czek.exe

EntryPoint

System.Void Tetris.Program::Main()

Scope Name

czek.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

czek

Assembly Version

2.8.5.1

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void Tetris.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] Tetris.HighScoresTable::Ⴅ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void Tetris.Program::Ⴗ() ldc.i4 642 ldc.i4 640 call System.Void Tetris.Program::Ⴄ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 260 ldc.i4 300 call System.Void Tetris.Settings::Ⴄ(System.Boolean,System.Int32,System.Int32) ldloc.2 <null> ldc.i4.s 57 ldelem.u2 <null> ldc.i4 32572 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void Tetris.Tetris::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void Tetris.Program::Main() pop <null> ret <null>

Module Name

czek.exe

Full Name

czek.exe

EntryPoint

System.Void Tetris.Program::Main()

Scope Name

czek.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

czek

Assembly Version

2.8.5.1

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

2

Main Method

System.Void Tetris.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] Tetris.HighScoresTable::Ⴅ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void Tetris.Program::Ⴗ() ldc.i4 642 ldc.i4 640 call System.Void Tetris.Program::Ⴄ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 260 ldc.i4 300 call System.Void Tetris.Settings::Ⴄ(System.Boolean,System.Int32,System.Int32) ldloc.2 <null> ldc.i4.s 57 ldelem.u2 <null> ldc.i4 32572 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void Tetris.Tetris::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void Tetris.Program::Main() pop <null> ret <null>

Artefacts
Name
Value
Embedded Resources

0

Suspicious Type Names (1-2 chars)

0

b405d07b6ffac0fd4c87d9190a4f0e0d (922.11 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0-preview.png
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
Embedded Resources

0

b405d07b6ffac0fd4c87d9190a4f0e0d

Suspicious Type Names (1-2 chars)

0

b405d07b6ffac0fd4c87d9190a4f0e0d

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙