Suspicious
Suspect

0a48e04242cf4abd925f12c0ffcf56f3

AutoIt Compiled Script
|
MD5: 0a48e04242cf4abd925f12c0ffcf56f3
|
Size: 1.06 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
0a48e04242cf4abd925f12c0ffcf56f3
Sha1
c45e6bf1230d4778b94cc782f411f4912a42ca53
Sha256
8bbb9d145a516df1da43ecaa97efa6fd0ec63a2f7a7de4d378bf3c71282041fb
Sha384
6b33dda51a4062b025047395b607ec763a59f9c77b5b480aa98177d5738e97f2c320894ea9bd41ef0db10e09b1de440c
Sha512
d3c0aab85ce5918c9f81d6688760908298eda6b216bf9d752cfdcebe5392e8629552fbde42c31b031851f007420830e84f9e9859c58849997e8e49b58864e27d
SSDeep
24576:uzZdX+KO97PDLDfYuRPg0itz4lqHeoUuJmIxrcgoWvWFu1:uXU9TnTBtitiPTm
TLSH
822523C350B101FAD9F13DB2BBAA45537ABE5132A6F55E16C00C0E3FD2E24A6E71125B

PeID

Microsoft Visual C++ v6.0 DLL
Nullsoft PiMP Stub -> SFX
UPolyX 0.3 -> delikon
File Structure
Substance.jar
Dealtime.jar
Farmer.jar
Arrested.jar
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
[SETUP_DECOMPILED.NSI]
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
ID:1033-preview.png
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:1033-preview.png
RT_DIALOG
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
0a48e04242cf4abd925f12c0ffcf56f3 (1.06 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙