Suspect
cfafe6b468c487d17d9bc69daf01d8de
PE Executable | MD5: cfafe6b468c487d17d9bc69daf01d8de | Size: 1.02 MB | application/x-dosexec
PE Executable
MD5: cfafe6b468c487d17d9bc69daf01d8de
Size: 1.02 MB
application/x-dosexec
Summary by MalvaGPT
Characteristics
Symbol Ofbuscation Score
Low
|
Hash | Hash Value |
|---|---|
| MD5 | cfafe6b468c487d17d9bc69daf01d8de
|
| Sha1 | c13af44e65eab3a0c5583c48d44a937dc48bd7bb
|
| Sha256 | 3d82589a2cde5d52ebec9fbaa01d40c88c6b6f47289ef44b6d11e3070a32036d
|
| Sha384 | ae58ad6f8b838a2a251cbb38993675e51ddea0ba8309188fd4ede725f90dd7a4415eadf692677d4474b223748d283f5a
|
| Sha512 | c85ff8c4ea270a43897da9fbe7341ad3e9041c0279fa4402968cd7b2b9a1ea436e8c781bc874845295604e149b6ef2fcc601cd09eeff2837dd75c1f0487b1b7d
|
| SSDeep | 24576:VISA9w0dFzDKiPTV4KEeghFO04DEekrdCej6W:mHFzDKcK9esktD/kdCi6W
|
| TLSH | 2C2512656287CB13D55443B808E6E3B177B98D597621E30B8FC9BDAB3D3EB413A10272
|
File Structure
cfafe6b468c487d17d9bc69daf01d8de
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
WordleForms.GameOver.resources
WordleForms.WordleForm.resources
$this.Icon
[NBF]root.IconData
True
[NBF]root.Data
statusStrip1.TrayLocation
toolStrip1.TrayLocation
WordleForms.Properties.Resources.resources
PUpe
[NBF]root.Data
[NBF]root.Data-preview.png
help_FILL0_wght300_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
restart
restart_alt_FILL0_wght400_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | PDB Path: ? |
| Module Name | Nmny.exe |
| Full Name | Nmny.exe |
| EntryPoint | System.Void WordleForms.Program::Main() |
| Scope Name | Nmny.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | Nmny |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.5 |
| Total Strings | 152 |
| Main Method | System.Void WordleForms.Program::Main() |
| Main IL Instruction Count | 10 |
| Main IL | nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void WordleForms.WordleForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null> |
cfafe6b468c487d17d9bc69daf01d8de (1.02 MB)
File Structure
cfafe6b468c487d17d9bc69daf01d8de
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
WordleForms.GameOver.resources
WordleForms.WordleForm.resources
$this.Icon
[NBF]root.IconData
True
[NBF]root.Data
statusStrip1.TrayLocation
toolStrip1.TrayLocation
WordleForms.Properties.Resources.resources
PUpe
[NBF]root.Data
[NBF]root.Data-preview.png
help_FILL0_wght300_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
restart
restart_alt_FILL0_wght400_GRAD0_opsz48
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.