Suspicious
Suspect

d183775b45bf0e8496d957554e702990

PE Executable
|
MD5: d183775b45bf0e8496d957554e702990
|
Size: 770.56 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
d183775b45bf0e8496d957554e702990
Sha1
52ebe1d296fbcc2a98bc3c0426013fb8dab1036e
Sha256
ecd80dc690eee6d7f89ad7f036aed2000c548440fabd8df91ab539307eb317aa
Sha384
c11193c50df39841ea4553e4202e7947f14f00d9cfaeb9f645cd12a31c697f4110a0d31a07fa18e3ac9141a270097425
Sha512
34e16c45ce978428a004ffdfaa74c35e99ef8b0e0c6e543408817ea6ecc084ad0ebc54b1b3a0428e39636dddb02cc2c86569c6ad4fca7074567803fee9fd652c
SSDeep
12288:Ks/H8kKORwzlJOirGwn8lDX8tyO0W1U78inlwiB5+Tck9cZwTUk+L49xHCg:D/fKORCYir6Dstj/u8/n9c2TtDDC
TLSH
46F402234AA9DB13F4A953F51933EA781B793F4DD111D7AB4BEA5CC73A183001E88369

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
DiceWars.HauptForm.resources
DiceWars.Properties.Resources.resources
EuPOR
[NBF]root.Data
[NBF]root.Data-preview.png
NH
[NBF]root.Data
image_1832
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: YywXX.pdb

Module Name

YywXX.exe

Full Name

YywXX.exe

EntryPoint

System.Void DiceWars.Program::Main()

Scope Name

YywXX.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

YywXX

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

155

Main Method

System.Void DiceWars.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void DiceWars.HauptForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

Module Name

YywXX.exe

Full Name

YywXX.exe

EntryPoint

System.Void DiceWars.Program::Main()

Scope Name

YywXX.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

YywXX

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

155

Main Method

System.Void DiceWars.Program::Main()

Main IL Instruction Count

10

Main IL

nop <null> call System.Void System.Windows.Forms.Application::EnableVisualStyles() nop <null> ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) nop <null> newobj System.Void DiceWars.HauptForm::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) nop <null> ret <null>

d183775b45bf0e8496d957554e702990 (770.56 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
DiceWars.HauptForm.resources
DiceWars.Properties.Resources.resources
EuPOR
[NBF]root.Data
[NBF]root.Data-preview.png
NH
[NBF]root.Data
image_1832
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙