Suspicious
Suspect

ee711515f889eadf1c8550c9e61df30d

PE Executable
|
MD5: ee711515f889eadf1c8550c9e61df30d
|
Size: 2.11 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
ee711515f889eadf1c8550c9e61df30d
Sha1
2ab2b7ee5cead4d8b8722858efb884ca50aaedba
Sha256
af245ff30c4f744d9c1b36bc6fbb927a8aeb10091d6fcb88cecf8f9853c42365
Sha384
5511a30fd371bf320e12c9185f0071b2d683d265835e5ffde676119778f680beec3d7bbc84e30f435e77929b577064de
Sha512
c78d2feeaf070ae8d65d0320ff4d36b7890fa3fac16fabaf7fea1e77908e6a415928b76c2a0544acf9d38d4aabff41093acbe952848d3323bb02f8f0864bdeda
SSDeep
49152:ABRGTpc8iYM5pF9UBB6jdLXsuuX4/cqZIiQx6lSONx:aoTFM5pXUBB6BLXTuoEXx6lSONx
TLSH
9BA52342F8C485F3C4511C331B65A7616A7DBE202F268EDBB3856B1DE9614D0EB31AF2

PeID

Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 7.0 - 8.0
Microsoft Visual C++ 8
Microsoft Visual C++ 8
Microsoft Visual C++ v6.0 DLL
VC8 -> Microsoft Corporation
File Structure
WEGfWJLfp.bat
saked
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:25
ID:25-preview.png
ID:0066
ID:25
ID:25-preview.png
RT_ICON
ID:0001
ID:25
ID:0002
ID:25
ID:0003
ID:25
ID:0004
ID:25
ID:0005
ID:25
ID:0006
ID:25
ID:0007
ID:25
ID:25-preview.png
RT_DIALOG
ID:0000
ID:25
RT_STRING
ID:0007
ID:25
ID:0008
ID:25
ID:0009
ID:25
ID:000A
ID:25
ID:000B
ID:25
ID:000C
ID:25
ID:000D
ID:25
ID:000E
ID:25
ID:000F
ID:25
ID:0010
ID:25
RT_GROUP_CURSOR4
ID:0064
ID:25
RT_MANIFEST
ID:0001
ID:25
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Overlay extracted: Overlay_e45a3a38.bin (1788976 bytes)

Info

PDB Path: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

ee711515f889eadf1c8550c9e61df30d (2.11 MB)
File Structure
WEGfWJLfp.bat
saked
7z-stream @ 0x000C6D78.7z
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.sxdata
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:1033
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
UPX0
UPX1
.rsrc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
.text
.rdata
.data
.pdata
.rsrc
Resources
RT_CURSOR
ID:0001
ID:1033
RT_DIALOG
ID:0066
ID:1037
ID:0070
ID:1037
RT_GROUP_CURSOR2
ID:0067
ID:1033
RT_VERSION
ID:0001
ID:1037
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.didat
.rsrc
.reloc
Resources
PNG
ID:0065
ID:25
ID:25-preview.png
ID:0066
ID:25
ID:25-preview.png
RT_ICON
ID:0001
ID:25
ID:0002
ID:25
ID:0003
ID:25
ID:0004
ID:25
ID:0005
ID:25
ID:0006
ID:25
ID:0007
ID:25
ID:25-preview.png
RT_DIALOG
ID:0000
ID:25
RT_STRING
ID:0007
ID:25
ID:0008
ID:25
ID:0009
ID:25
ID:000A
ID:25
ID:000B
ID:25
ID:000C
ID:25
ID:000D
ID:25
ID:000E
ID:25
ID:000F
ID:25
ID:0010
ID:25
RT_GROUP_CURSOR4
ID:0064
ID:25
RT_MANIFEST
ID:0001
ID:25
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙