Suspicious
Suspect

6ce2a214eafc4a3f1717c2e835cc0cc9

PE Executable
|
MD5: 6ce2a214eafc4a3f1717c2e835cc0cc9
|
Size: 4.85 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
6ce2a214eafc4a3f1717c2e835cc0cc9
Sha1
889c461aa383a76765cef2df78f7711baac46420
Sha256
59a9f58e089576e053f87c747158987d3d6fd80bfd58ce3b82cfa3d3b4966228
Sha384
ec45d352bc58012f260cd1154fc3c58395bfc85b56fc4b42094ac8307dcda6d538a738026e9d18aca3963f704c093482
Sha512
f8ac2680a98409af5fc850977a0a28e890f8eaaa900f23d6beb603403c4cfb53af9ae2c644de42aae0d3b5a5ff4a3fee599646cff1492f9d5bfd98e5ab4d8cda
SSDeep
98304:XZPhnZI7WWoQA2/dd4tpH8CHpPH+Rk9w1rH1NWhs10ET:JpnjWoE/ddI8CHpf+69w171Z1
TLSH
0E26334763ED8031E976A7701AF30BC71AB4BCB1D330C6996B8BED5A4936670963031B

PeID

Microsoft Visual C++ 8
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
RT_DIALOG
ID:07D1
ID:1033
ID:1049
ID:07D2
ID:1033
ID:1049
ID:07D3
ID:1033
ID:1049
ID:07D4
ID:1033
ID:1049
ID:07D5
ID:1033
ID:1049
ID:07D6
ID:1033
ID:1049
RT_STRING
ID:003F
ID:1033
ID:1049
ID:004C
ID:1033
ID:1049
ID:004D
ID:1033
ID:1049
ID:0050
ID:1033
ID:1049
ID:0053
ID:1033
ID:1049
ID:0055
ID:1033
ID:1049
RT_GROUP_CURSOR4
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
ID:1049
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
RT_RCDATA
ID:0000
ID:1049
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
oGVG9k5a3ueS.j5Jyd.WJXKv
oGVG9k5a3ueS.xI9PwU.wNtSr
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.rsrc
.idata
hbidrmcl
nyinhqpe
Resources
RT_MANIFEST
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:1033
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: wextract.pdb

Artefacts
Name
Value
PE Layout

MemoryMapped (process dump suspected)

6ce2a214eafc4a3f1717c2e835cc0cc9 (4.85 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
RT_DIALOG
ID:07D1
ID:1033
ID:1049
ID:07D2
ID:1033
ID:1049
ID:07D3
ID:1033
ID:1049
ID:07D4
ID:1033
ID:1049
ID:07D5
ID:1033
ID:1049
ID:07D6
ID:1033
ID:1049
RT_STRING
ID:003F
ID:1033
ID:1049
ID:004C
ID:1033
ID:1049
ID:004D
ID:1033
ID:1049
ID:0050
ID:1033
ID:1049
ID:0053
ID:1033
ID:1049
ID:0055
ID:1033
ID:1049
RT_GROUP_CURSOR4
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
ID:1049
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
RT_RCDATA
ID:0000
ID:1049
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
oGVG9k5a3ueS.j5Jyd.WJXKv
oGVG9k5a3ueS.xI9PwU.wNtSr
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.rsrc
.idata
hbidrmcl
nyinhqpe
Resources
RT_MANIFEST
ID:0001
ID:0
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:1033
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PE Layout

MemoryMapped (process dump suspected)

6ce2a214eafc4a3f1717c2e835cc0cc9 > Resources > RT_RCDATA > ID:0000 > ID:1049 > 3Y85u.exe

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙