Suspicious
Suspect

4cfe59591a7403c15fbac3d2a64f9ebe

PE Executable
|
MD5: 4cfe59591a7403c15fbac3d2a64f9ebe
|
Size: 930.54 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
4cfe59591a7403c15fbac3d2a64f9ebe
Sha1
4684c13f8cb09fc2145bbf5b39b69e4d15112474
Sha256
c3522c969c29c162a1b67b62b26510edfe67c8c163cbd9addea347dd229090af
Sha384
d026cfdf0cc7a26375ee016dd81e5b225fa089abe78dc5aa144885c740b86126d3708309274d014648a8a2a6f19a44c2
Sha512
5df5b131b4492b518caaa8603fbfe04efaa65369cbae1e9af0e82d81a6f652124dbec8e0c501e4d604a63fb6995ff681ba7e20df6a43aa9ba2041ad6d7aa953e
SSDeep
24576:b3vYXoZoe1iIgSAecVawQAIxTy7AuN5hUI5iD1AG5nME5q0:b3JVNQVawQAYTy7AuN071r5MEY0
TLSH
EB152211BB00DC56DCB28770067F56393173BD5B9EB4424F130E72AA7BB2B853819AA3

PeID

Installer Nullsoft PiMP Stub v.3.0.x - A.S.L
Microsoft Visual C++ v6.0 DLL
Private EXE Protector V2.30-V2.3X -> SetiSoft Team
File Structure
[NSIS Installer] @ #00024208
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_DIALOG
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Erythraeidae.Aes
Arbejdsvillige.jpg
Arbejdsvillige.jpg-preview.png
Niclas.Tik
Bilggelse.jpg
Bilggelse.jpg-preview.png
Catalecta.txt
Mrklagde.jpg
Mrklagde.jpg-preview.png
Overspringelserne122.ini
Physalia230.txt
Signaltyper.oms
aldersklassen.unr
amtsskattekredsen.zoi
bowdlerises.til
cesiums.blu
chiropterous.txt
dagpengenes.kll
dygtiggrelse.ini
empyemic.bus
fllesbagerierne.gan
fugledderkopperne.wri
hypomyotonia.unr
indtagelsers.kan
kanalisation.jpg
kanalisation.jpg-preview.png
lamelbunde.unr
razzle.txt
restively.epi
rundhaandet.maa
silkebldt.rab
stalagmit.ini
stephenie.des
straffebokses.txt
stressing.cow
terfez.par
udskrivningsprograms.bor
unconcatenating.gru
vrkstedstidens.gav
watchfulnesses.sta
[SETUP_DECOMPILED.NSI]
[Authenticode]_625f6240.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_BITMAP
ID:006E
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
RT_DIALOG
ID:0068
ID:1033
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xE2000 size 4848 bytes

4cfe59591a7403c15fbac3d2a64f9ebe (930.54 KB)
File Structure
[NSIS Installer] @ #00024208
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_DIALOG
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.reloc
Erythraeidae.Aes
Arbejdsvillige.jpg
Arbejdsvillige.jpg-preview.png
Niclas.Tik
Bilggelse.jpg
Bilggelse.jpg-preview.png
Catalecta.txt
Mrklagde.jpg
Mrklagde.jpg-preview.png
Overspringelserne122.ini
Physalia230.txt
Signaltyper.oms
aldersklassen.unr
amtsskattekredsen.zoi
bowdlerises.til
cesiums.blu
chiropterous.txt
dagpengenes.kll
dygtiggrelse.ini
empyemic.bus
fllesbagerierne.gan
fugledderkopperne.wri
hypomyotonia.unr
indtagelsers.kan
kanalisation.jpg
kanalisation.jpg-preview.png
lamelbunde.unr
razzle.txt
restively.epi
rundhaandet.maa
silkebldt.rab
stalagmit.ini
stephenie.des
straffebokses.txt
stressing.cow
terfez.par
udskrivningsprograms.bor
unconcatenating.gru
vrkstedstidens.gav
watchfulnesses.sta
[SETUP_DECOMPILED.NSI]
[Authenticode]_625f6240.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.ndata
.rsrc
Resources
RT_BITMAP
ID:006E
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
RT_DIALOG
ID:0068
ID:1033
ID:0069
ID:1033
ID:006A
ID:1033
ID:006F
ID:1033
RT_GROUP_CURSOR4
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙