Suspicious
Suspect

51f2edb74452ffad4a2742318ba8e34f

MS Office Document
|
MD5: 51f2edb74452ffad4a2742318ba8e34f
|
Size: 6.41 MB
|
application/vnd.ms-office

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
51f2edb74452ffad4a2742318ba8e34f
Sha1
1527e7a81a1baf6d32c192c4cf3cbe00281f71c2
Sha256
f1dc9b92cd5cfdbdd5eb21e0f8ae15e1bc3b92d8ca630fa66f9cc2babac81c3e
Sha384
b5e5e894fdc6295103841a1d484189f147ed8bea7e0310fb83d993b614074e408aeb4b315a133bd66f18cdce7036dc66
Sha512
87a5f397086538496e28d079b0e8b6e9b2bf1356e8ab146c68b34cf74b26452123ff0ad72948ecfffb5ccc057f05a4dbb6ecc7b55943a9e8b5579e484b7ba489
SSDeep
196608:7BksavixhsnsOURWBRhPXBbNDy4WwXY4bg6h:dksavix+nsOUABPRZyHEVXh
TLSH
6C563372FEC8AF67E54B08B621C456546C34FD2CFB224D0FA901B3976D3A5B15A8E2C1
File Structure
Root Entry
䡀䌏䈯
VnxFEgaSvWg
[Authenticode]_64759535.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_286d734d.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
lEOGoIfCZWY
[Authenticode]_8eceb743.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:1029
ID:0002
ID:1029
RT_DIALOG
ID:0066
ID:1033
RT_GROUP_CURSOR4
ID:0080
ID:1029
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
[Authenticode]_27a7e9cb.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
_RDATA
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0002
ID:1033
䡀䈖䌧䠤
䡀㬿䏲䐸䖱
䡀㽿䅤䈯䠶
䡀䈏䗤䕸䠨
䡀䕙䓲䕨䜷
䡀䌍䈵䗦䕲䠼
䡀䒌䓰䑲䑨䠷
䡀㼿䕷䑬㭪䗤䠤
䡀㼿䕷䑬㹪䒲䠯
䡀㿿䏤䇬䗤䒬䠱
䡀䖖㯬䏬㱨䖤䠫
䡀䘌䗶䐲䆊䌷䑲
䡀䇊䌰㾱㼒䔨䈸䆱䠨
䡀䈏䗤䕸㬨䐲䒳䈱䗱䠶
䡀䑒䗶䏤㾯㼒䔨䈸䆱䠨
䡀䇊䌰㮱䈻䘦䈷䈜䘴䑨䈦
䡀䇊䗹䛎䆨䗸㼨䔨䈸䆱䠨
䡀䑒䗶䏤㮯䈻䘦䈷䈜䘴䑨䈦
SummaryInformation
VnxFEgaSvWg
tjQLseMlNINiw50s
BWmk1o8i8bBr22O
lEOGoIfCZWY
Tkd8oyFiTm
VDWNFaWkej4kWag
FEemFP5am3Q22
Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

51f2edb74452ffad4a2742318ba8e34f (6.41 MB)
File Structure
Root Entry
䡀䌏䈯
VnxFEgaSvWg
[Authenticode]_64759535.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_286d734d.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
lEOGoIfCZWY
[Authenticode]_8eceb743.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:1029
ID:0002
ID:1029
RT_DIALOG
ID:0066
ID:1033
RT_GROUP_CURSOR4
ID:0080
ID:1029
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
[Authenticode]_27a7e9cb.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
_RDATA
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0002
ID:1033
䡀䈖䌧䠤
䡀㬿䏲䐸䖱
䡀㽿䅤䈯䠶
䡀䈏䗤䕸䠨
䡀䕙䓲䕨䜷
䡀䌍䈵䗦䕲䠼
䡀䒌䓰䑲䑨䠷
䡀㼿䕷䑬㭪䗤䠤
䡀㼿䕷䑬㹪䒲䠯
䡀㿿䏤䇬䗤䒬䠱
䡀䖖㯬䏬㱨䖤䠫
䡀䘌䗶䐲䆊䌷䑲
䡀䇊䌰㾱㼒䔨䈸䆱䠨
䡀䈏䗤䕸㬨䐲䒳䈱䗱䠶
䡀䑒䗶䏤㾯㼒䔨䈸䆱䠨
䡀䇊䌰㮱䈻䘦䈷䈜䘴䑨䈦
䡀䇊䗹䛎䆨䗸㼨䔨䈸䆱䠨
䡀䑒䗶䏤㮯䈻䘦䈷䈜䘴䑨䈦
SummaryInformation
VnxFEgaSvWg
tjQLseMlNINiw50s
BWmk1o8i8bBr22O
lEOGoIfCZWY
Tkd8oyFiTm
VDWNFaWkej4kWag
FEemFP5am3Q22
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PE Layout

MemoryMapped (process dump suspected)

51f2edb74452ffad4a2742318ba8e34f > Root Entry > 䄦㡥䆾䅤 > FEemFP5am3Q22

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙