Suspicious
Suspect

6a099366018b563d0fbdb790209afe9f

AutoIt Compiled Script
|
MD5: 6a099366018b563d0fbdb790209afe9f
|
Size: 2.78 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
6a099366018b563d0fbdb790209afe9f
Sha1
e1b33c8b87b13f1d3677b60446a48246d2c41260
Sha256
c3e2c77b8c1442e1cbc084b8ee9abcf3f1f888f312b58970a1663012466aa1f8
Sha384
2bd051f3e86b0bce21027eb2672de4b3d08817c5a71cd4089b8b306fbd5edf021f5c96b94e3c3fe47551a9d06ddf2210
Sha512
a63405e7596b8ea00a35a88069feb70b4ba70462e95642bd1715f420279d6ec6df8026c16b5f6bca70f609f76d827bb4ad8e4b597ff06e0aa6c15ecb712fdb3c
SSDeep
49152:Xs7uXhCFZDzMzCtjSfEyrzJmUqJVXzlP+5W6mfkAb+KKh+FScC:WuMlzdjSfFrP2DlW5W6msAb+KRFS3
TLSH
CED5338B25F80275F87127B181F5414259313CF26E2552EF2A89F03A2B737846A7BF5B

PeID

Microsoft Visual C++ 8.0 (DLL)
File Structure
[Authenticode]_f672fe61.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:1033-preview.png
ID:000F
ID:1033
RT_DIALOG
ID:07D1
ID:1033
ID:07D2
ID:1033
ID:07D3
ID:1033
ID:07D4
ID:1033
ID:07D5
ID:1033
ID:07D6
ID:1033
RT_STRING
ID:003F
ID:1033
ID:004C
ID:1033
ID:004D
ID:1033
ID:0050
ID:1033
ID:0053
ID:1033
ID:0055
ID:1033
RT_RCDATA
ID:0000
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Pharmaceuticals.mpeg
Adventures
Green.mpeg
Totals.mpeg
Incorporate
Wondering.mpeg
Sailing.mpeg
Occasional.mpeg
Logging.mpeg
Twin.mpeg
Litigation.mpeg
Humor.mpeg
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x2A5E00 size 3488 bytes

Info

PDB Path: wextract.pdb

6a099366018b563d0fbdb790209afe9f (2.78 MB)
File Structure
[Authenticode]_f672fe61.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:1033
ID:1033-preview.png
ID:000F
ID:1033
RT_DIALOG
ID:07D1
ID:1033
ID:07D2
ID:1033
ID:07D3
ID:1033
ID:07D4
ID:1033
ID:07D5
ID:1033
ID:07D6
ID:1033
RT_STRING
ID:003F
ID:1033
ID:004C
ID:1033
ID:004D
ID:1033
ID:0050
ID:1033
ID:0053
ID:1033
ID:0055
ID:1033
RT_RCDATA
ID:0000
ID:1033
RT_GROUP_CURSOR4
ID:0064
ID:1033
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Pharmaceuticals.mpeg
Adventures
Green.mpeg
Totals.mpeg
Incorporate
Wondering.mpeg
Sailing.mpeg
Occasional.mpeg
Logging.mpeg
Twin.mpeg
Litigation.mpeg
Humor.mpeg
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙