Suspicious
Suspect

53b60fe24ca38ec9b1fb25751611f9c6

PE Executable
|
MD5: 53b60fe24ca38ec9b1fb25751611f9c6
|
Size: 2.99 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
53b60fe24ca38ec9b1fb25751611f9c6
Sha1
ffdd80120ae1691b5644d763d607e0c9a74bafbd
Sha256
4f5d39430a340d9ffd80608eb8a53930f460fb98a81d5b61005eb28217f72e13
Sha384
77b2dfd360ad9361e53de87dccebe5d33dc8526b7c97fd978d12a506ec64cd5663f64fa3411c2dca6895b91130f006c0
Sha512
f89ddf611dca76b1eab30f96e28ead37175cfe9cac3f3f4342265947a3a48e08eb92e2512eaca0389c31b7777c89375c62122a23f701d8b3a75ee6d16d185df2
SSDeep
49152:40YkFZGh/t1EC6hUudQnC0m5pklF3Ac/C0nhrjmopXg37EU2SOy+:4cFo11ECeMg5pkj37/C7eXg4Hg+
TLSH
BCD53383359B54BEEA7D263F6BEB7B0794BCAE386670A2076791336D3570440C3507A2

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ v6.0 DLL
UPolyX 0.3 -> delikon
File Structure
[Authenticode]_0bf74789.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_47036339.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_0740be37.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_44a786b1.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_1d051963.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_e6ea1084.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_babff35f.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_ef014cf7.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_0ea7a896.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
ID:1033
[Authenticode]_0eefae01.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
RT_GROUP_CURSOR4
ID:07D0
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
[Authenticode]_1b6ed5fd.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
_RDATA
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.CRT
.rsrc
Resources
RT_BITMAP
ID:0065
ID:1033
RT_ICON
ID:0001
ID:1024
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1024
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_f1c4c113.bin (2823880 bytes)

Info

PDB Path: d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb

53b60fe24ca38ec9b1fb25751611f9c6 (2.99 MB)
File Structure
[Authenticode]_0bf74789.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
Resources
RT_VERSION
ID:0001
ID:1033
[Authenticode]_47036339.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_0740be37.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_44a786b1.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_1d051963.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_e6ea1084.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_babff35f.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_ef014cf7.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
[Authenticode]_0ea7a896.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.rdata
.rsrc
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
ID:1033
[Authenticode]_0eefae01.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
RT_GROUP_CURSOR4
ID:07D0
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
[Authenticode]_1b6ed5fd.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
_RDATA
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.CRT
.rsrc
Resources
RT_BITMAP
ID:0065
ID:1033
RT_ICON
ID:0001
ID:1024
RT_DIALOG
ID:0000
ID:1033
RT_STRING
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1024
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙