Suspect
a56c3afcddf086645a36a3c4fc7ce8e6
VB5/6 Executable | MD5: a56c3afcddf086645a36a3c4fc7ce8e6 | Size: 515.72 KB | application/x-dosexec
VB5/6 Executable
MD5: a56c3afcddf086645a36a3c4fc7ce8e6
Size: 515.72 KB
application/x-dosexec
Summary by MalvaGPT
Characteristics
|
Hash | Hash Value |
|---|---|
| MD5 | a56c3afcddf086645a36a3c4fc7ce8e6
|
| Sha1 | 192a3a58226df9abf64a5e1aa7e0dd2f266cf4a7
|
| Sha256 | af687d8a7cd873d45b84140e48a85dd0c237ea6622f71c08b43dcd7546615ab5
|
| Sha384 | 553d077445bfbb54eda8840c8aecb3106d746406674707c3cf129381e2cc4e0e5d7ac866c5e83c0b8287094b131310a9
|
| Sha512 | eb52fa0a4f12494402e0bba8e43092bf9fa620d3a72281b685171d3171882d087165cce46a5799f962a237bb20876d857f1ace1d783a152498b721ad1a554a59
|
| SSDeep | 12288:3ENN+T5xYrllrU7QY6HRYiioQzhGTRKhWcFc9u:N5xolYQY6xYjJzhgKhWcFc9u
|
| TLSH | B9B4D78EBB609A4ED63313B15C91FBB511741FA43F12CA8766B0E747BC303066EA16E5
|
PeID
Microsoft Visual Basic v5.0 - v6.0
Protect Shareware V1.1 -> eCompserv CMS
File Structure
a56c3afcddf086645a36a3c4fc7ce8e6
Overlay_722e666d.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.rsrc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
VB6 Structure
VB Header
VB VBAProject Info
VB Object Table
VB VBAProject Info 2
VB Register Info
Informations
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Info | Overlay extracted: Overlay_722e666d.bin (56963 bytes) |
a56c3afcddf086645a36a3c4fc7ce8e6 (515.72 KB)
File Structure
a56c3afcddf086645a36a3c4fc7ce8e6
Overlay_722e666d.bin
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.rsrc
Resources
RT_ICON
ID:0001
ID:0
RT_GROUP_CURSOR4
ID:0001
ID:0
RT_VERSION
ID:0001
ID:1033
VB6 Structure
VB Header
VB VBAProject Info
VB Object Table
VB VBAProject Info 2
VB Register Info
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
You need a premium account to access this feature.
You must be signed in to post a comment.