Suspicious
Suspect

f9afa244d93f1123ad330b878418d050

PE Executable
|
MD5: f9afa244d93f1123ad330b878418d050
|
Size: 496.13 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
f9afa244d93f1123ad330b878418d050
Sha1
814dbc9de8685175d30c7cde18a09b97bc2ed458
Sha256
cfe0b6c72f2eadaaeefe287d15ae6dfc1fc44341dfb763c60e447dca9ab6cdc5
Sha384
f2d36ab9c1cb3666339f97f30a5d5e8673ae0faebc398c62fde065f84920820eaf6d78d216c0f573eebd06447cd8734b
Sha512
320e9aeba239ecfc0cdb51c43a0ff88a0604981d45a2cae6391a5d33414661040959d2531d886372ff4e31f5de8e041fe8c64197a4d654d495cc35a09b8626b3
SSDeep
12288:4MrJy90wK7rbhDc+iIoeXLGG5nxDvektRBE:ByGvq+B3Xr5xDNtk
TLSH
87B4021BF9ED4071CCA4477015FA16C30A3ABA602B5497931B8FBD5B6D726B4B33122B

PeID

Microsoft Visual C++ 8
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
RT_DIALOG
ID:07D1
ID:1049
ID:07D2
ID:1049
ID:07D3
ID:1049
ID:07D4
ID:1049
ID:07D5
ID:1049
ID:07D6
ID:1049
RT_STRING
ID:003F
ID:1049
ID:004C
ID:1049
ID:004D
ID:1049
ID:0050
ID:1049
ID:0053
ID:1049
ID:0055
ID:1049
RT_RCDATA
ID:0000
ID:1033
ID:1049
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
UPX0
UPX1
.rsrc
RT_GROUP_CURSOR4
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
ID:1049
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
UPX0
UPX1
.rsrc
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

PDB Path: wextract.pdb

f9afa244d93f1123ad330b878418d050 (496.13 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.data
.idata
.rsrc
.reloc
Resources
AVI
ID:0BB9
ID:1033
RT_ICON
ID:0001
ID:1033
ID:0002
ID:1033
ID:0003
ID:1033
ID:0004
ID:1033
ID:0005
ID:1033
ID:0006
ID:1033
ID:0007
ID:1033
ID:0008
ID:1033
ID:0009
ID:1033
ID:1033-preview.png
ID:000A
ID:1033
ID:000B
ID:1033
ID:000C
ID:1033
ID:000D
ID:1033
RT_DIALOG
ID:07D1
ID:1049
ID:07D2
ID:1049
ID:07D3
ID:1049
ID:07D4
ID:1049
ID:07D5
ID:1049
ID:07D6
ID:1049
RT_STRING
ID:003F
ID:1049
ID:004C
ID:1049
ID:004D
ID:1049
ID:0050
ID:1049
ID:0053
ID:1049
ID:0055
ID:1049
RT_RCDATA
ID:0000
ID:1033
ID:1049
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
UPX0
UPX1
.rsrc
RT_GROUP_CURSOR4
ID:0BB8
ID:1033
RT_VERSION
ID:0001
ID:1033
ID:1049
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rdata
.data
.rsrc
.reloc
Resources
RT_MANIFEST
ID:0001
ID:1033
Structure
DosHeader
PE Header
Optional Header (x64)
Section Headers
UPX0
UPX1
.rsrc
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙