Suspicious
Suspect

10f5cae3f3bd17583e3c9572f656d5dd

PE Executable
|
MD5: 10f5cae3f3bd17583e3c9572f656d5dd
|
Size: 13.81 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
10f5cae3f3bd17583e3c9572f656d5dd
Sha1
cafc2a27333bad3960a14cd3a132d2cad4ab0f1d
Sha256
1782201e352ed4ec9635cf085eefa70060627d9d9bd53ea4f16e587fa149ca39
Sha384
3cfe95d0490b5f4396585adbe09597033a3f7b9420e845de231e401c9be9a9e3660ed1a4deaed6a5910e80de7ed7f3c0
Sha512
c19b1f48befb8b212f9f226706823630b7cff50d6d8240bdfb537ec116b3cf261f2d7426bdf9b50441545d793955d712ac0f53e36741c30b54a7fabbdea95822
SSDeep
393216:FLMVYQeM9qMxVhizNvrJQEAJCAkk0tKq7e1QYo:hAeM95a9JQ3JCtk0tL7YI
TLSH
FDD6334B14C8B83BF681543339A257330B721A7653E59D93AF0B96260D432BB83FA757

PeID

Microsoft Visual C++ v6.0 DLL
UPolyX 0.3 -> delikon
File Structure
[NSIS Installer] @ #00008A08
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1042
RT_MANIFEST
ID:0002
ID:1033
[NSIS Installer] @ #00009808
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Overlay_77bf8824.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1042
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
HOOK01
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:1042
ID:0002
ID:1042
ID:0003
ID:1042
ID:0004
ID:1042
ID:0005
ID:1042
ID:0006
ID:1042
ID:0007
ID:1042
ID:0008
ID:1042
RT_STRING
ID:0007
ID:1042
RT_GROUP_CURSOR4
ID:006B
ID:1042
ID:006C
ID:1042
RT_VERSION
ID:0001
ID:1042
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
DUKS
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_MENU
ID:006D
ID:1042
RT_DIALOG
ID:0067
ID:1042
RT_STRING
ID:0007
ID:1042
RT_ACCELERATOR
ID:006D
ID:1042
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:1033
ImageSAFERLang.xml
ImgsfprocPolicy.xml
ImgsfProcPolicyForExe.xml
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Overlay_0121b5c4.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.detourc
.detourd
.fptable
MUILANG
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0002
ID:1033
IMGSF50Lang.xml
IMGSF50Policy.xml
Overlay_3d1ef132.bin
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
INIT
Overlay_00c5976d.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
INIT
.reloc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0002
ID:1033
[SETUP_DECOMPILED.NSI]
Overlay_240d4ab1.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_VERSION
ID:0001
ID:1042
RT_MANIFEST
ID:0001
ID:1033
Overlay_cb777daa.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1042
RT_MANIFEST
ID:0002
ID:1033
Overlay_e9c2d192.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_STRING
ID:0007
ID:9
ID:10
ID:1042
RT_VERSION
ID:0001
ID:1042
$(LSTR_4506)
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
[SETUP_DECOMPILED.NSI]
[NSIS Uninstaller] @ #00D26420
[SETUP_DECOMPILED.NSI]
[Authenticode]_af55c817.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
RT_DIALOG
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xD26898 size 21440 bytes

Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

10f5cae3f3bd17583e3c9572f656d5dd (13.81 MB)
File Structure
[NSIS Installer] @ #00008A08
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1042
RT_MANIFEST
ID:0002
ID:1033
[NSIS Installer] @ #00009808
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Overlay_77bf8824.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1042
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
HOOK01
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:1042
ID:0002
ID:1042
ID:0003
ID:1042
ID:0004
ID:1042
ID:0005
ID:1042
ID:0006
ID:1042
ID:0007
ID:1042
ID:0008
ID:1042
RT_STRING
ID:0007
ID:1042
RT_GROUP_CURSOR4
ID:006B
ID:1042
ID:006C
ID:1042
RT_VERSION
ID:0001
ID:1042
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
DUKS
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_MENU
ID:006D
ID:1042
RT_DIALOG
ID:0067
ID:1042
RT_STRING
ID:0007
ID:1042
RT_ACCELERATOR
ID:006D
ID:1042
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:1033
ImageSAFERLang.xml
ImgsfprocPolicy.xml
ImgsfProcPolicyForExe.xml
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
Overlay_0121b5c4.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.detourc
.detourd
.fptable
MUILANG
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0002
ID:1033
IMGSF50Lang.xml
IMGSF50Policy.xml
Overlay_3d1ef132.bin
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
INIT
Overlay_00c5976d.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
INIT
.reloc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0002
ID:1033
[SETUP_DECOMPILED.NSI]
Overlay_240d4ab1.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_VERSION
ID:0001
ID:1042
RT_MANIFEST
ID:0001
ID:1033
Overlay_cb777daa.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1042
RT_MANIFEST
ID:0002
ID:1033
Overlay_e9c2d192.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_STRING
ID:0007
ID:9
ID:10
ID:1042
RT_VERSION
ID:0001
ID:1042
$(LSTR_4506)
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
[SETUP_DECOMPILED.NSI]
[NSIS Uninstaller] @ #00D26420
[SETUP_DECOMPILED.NSI]
[Authenticode]_af55c817.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_ICON
ID:0001
ID:1033
RT_DIALOG
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PE Layout

MemoryMapped (process dump suspected)

10f5cae3f3bd17583e3c9572f656d5dd > [NSIS Installer] @ #00008A08 > $TEMP > [NSIS Installer] @ #00009808 > MaPlugins.dll

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙