File Name | DecoyRequest.exe |
File Type |
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
Scanner Version | 1.0.221.174 |
Database Version | 2025-07-22 02:00:27 UTC |
Malware family: Generic
Hash Type | Value | Action |
---|---|---|
MD5 |
d4c12150f211d66276484f9af57bf0cf
|
|
SHA1 |
4ec4943ef64747bf49bbb95e2bb75cd3192b4523
|
|
SHA256 |
3f5faf0efb3ed952ca7e0d4f65e986a97eda8542c9a3758ba24065321adad692
|
|
SHA512 |
d8692864bed2b020cc932c21056f0ad1f2d3390cdb27644934de5e1df3afd424aa5feda8b790d72294d374a8b97693bc13f08296c093c4a2014842f80451a387
|
|
ImpHash |
f34d5f2d4577ed6d9ceec516c1f5a744
|
Icon |
Hash: 206338970a437198244c252418879e20
Fuzzy: c425d4d30207e7efa72a0a131ef2a91a dHash: d4f0ec92b2d8e8f8 |
Image Base | 0x00400000 |
Entry Point | 0x0067a53e |
Compilation Time | 2102-06-27 07:09:59 |
Checksum | 0x00000000 (Actual: 0x00289dfc) |
OS Version | 4.0 |
PEiD Signatures |
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
PDB Path | C:\Users\null\source\repos\EclipsedDBD\Eclipsed.Light\Eclipsed.Light\obj\Release\DecoyRequest.pdb |
Digital Signature | No valid SignedData structure was found. |
Imports |
1 libraries
mscoree |
Exports | 0 functions |
Resources | 4 Resources |
Sections | 3 Sections |
Translation | 0x0000 0x04b0 |
Comments | |
CompanyName | |
FileDescription | |
FileVersion | 1.8.0.0 |
InternalName | DecoyRequest.exe |
LegalCopyright | Copyright © 2025 |
LegalTrademarks | |
OriginalFilename | DecoyRequest.exe |
ProductName | |
ProductVersion | 1.8.0.0 |
Assembly Version | 1.8.0.0 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00002000 |
2,590,020 bytes | 2,590,208 bytes | 7.99 (Packed/Encrypted) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
90BBF6B438369A2B667A77A4C8FAF987 |
.rsrc |
0x0027c000 |
5,864 bytes | 6,144 bytes | 5.83 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
9644692D4CF3846A6D866F42B76D3546 |
.reloc |
0x0027e000 |
12 bytes | 512 bytes | 0.10 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
F147B6F3F6AB09C513E208966700E7BB |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 1 | 4,264 bytes | |
RT_GROUP_ICON | 1 | 20 bytes | |
RT_VERSION | 1 | 780 bytes | |
RT_MANIFEST | 1 | 490 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
No valid SignedData structure was found.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Malware.Win32.Generic.cld without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system