Suspicious
Suspect

8a9e5f818a9127b1e88cf4d5cc30e5d2

AutoIt Compiled Script
|
MD5: 8a9e5f818a9127b1e88cf4d5cc30e5d2
|
Size: 4.5 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
8a9e5f818a9127b1e88cf4d5cc30e5d2
Sha1
c0adcd3c17f34e76b430980eb16196207a1d1147
Sha256
3401f10e6a53e49a17522ee6eb5005064e834fdfc6f443a244e25511eb70ea69
Sha384
0a6eadcbf2329a98322c42b1ef4d3accb05087fe86ab40becbf438c03af6aed6a42762a557b072337b6c35e3073f4a67
Sha512
7d4509d8f3723958143540dfc43b0e1a3aaac83806db0f9dd950df4cf1e3bd62f9fca267d3be31171f7ceb16db646647853dfbc3181ce69250f6bbd090f29822
SSDeep
98304:Mm0YRhJn2OvgCdZ2xl7jSjTSlnqwtjNFuq+CYX9j3e3fHo:MtfOvZoxl7sSlNNFhkN7T
TLSH
FE26330E6BD0A8B7C9B66BB840F253168A757C22AF2551AF33D481FD0E335D82674727

PeID

Microsoft Visual C++ 8.0 (DLL)
File Structure
[Authenticode]_5ca92316.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:0
RT_DIALOG
ID:07D1
ID:1033
ID:07D2
ID:1033
ID:07D3
ID:1033
ID:07D4
ID:1033
ID:07D5
ID:1033
ID:07D6
ID:1033
RT_STRING
ID:003F
ID:1033
ID:004C
ID:1033
ID:004D
ID:1033
ID:0050
ID:1033
ID:0053
ID:1033
ID:0055
ID:1033
RT_RCDATA
ID:0000
ID:1033
RT_GROUP_CURSOR4
ID:03E8
ID:0
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Creativity.wmz
Parade.wmz
Advertisers.wmz
Camping.wmz
Degree.wmz
Ahead.wmz
Examining.wmz
Personalized
Leave.wmz
Transparency
Humanitarian
Prerequisite.wmz
Purchase.wmz
Renew.wmz
Hardcover.wmz
Manufacturers.wmz
Jesse.wmz
Inkjet.wmz
Uploaded.wmz
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0x446000 size 20920 bytes

Info

PDB Path: wextract.pdb

8a9e5f818a9127b1e88cf4d5cc30e5d2 (4.5 MB)
File Structure
[Authenticode]_5ca92316.p7b
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
ID:000E
ID:0
RT_DIALOG
ID:07D1
ID:1033
ID:07D2
ID:1033
ID:07D3
ID:1033
ID:07D4
ID:1033
ID:07D5
ID:1033
ID:07D6
ID:1033
RT_STRING
ID:003F
ID:1033
ID:004C
ID:1033
ID:004D
ID:1033
ID:0050
ID:1033
ID:0053
ID:1033
ID:0055
ID:1033
RT_RCDATA
ID:0000
ID:1033
RT_GROUP_CURSOR4
ID:03E8
ID:0
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Creativity.wmz
Parade.wmz
Advertisers.wmz
Camping.wmz
Degree.wmz
Ahead.wmz
Examining.wmz
Personalized
Leave.wmz
Transparency
Humanitarian
Prerequisite.wmz
Purchase.wmz
Renew.wmz
Hardcover.wmz
Manufacturers.wmz
Jesse.wmz
Inkjet.wmz
Uploaded.wmz
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙