01a5a7019e5cb56717e5f032f0da2c01

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2019-May-03 01:57:34
Debug artifacts C:\Users\PC User\Desktop\DLL UNLOAD\obj\x64\Release\DLL UNLOAD.pdb
Comments
CompanyName
FileDescription DLL UNLOAD
FileVersion 1.0.0.0
InternalName DLL UNLOAD.exe
LegalCopyright Copyright © 2018
LegalTrademarks
OriginalFilename DLL UNLOAD.exe
ProductName DLL UNLOAD
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Suspicious The PE is possibly packed. The PE only has 0 import(s).
Malicious VirusTotal score: 4/70 (Scanned on 2024-02-09 20:07:37) Cynet: Malicious (score: 100)
MaxSecure: Trojan.Malware.300983.susgen
Webroot: W32.Injector.Gen
tehtris: Generic.Malware

Hashes

MD5 01a5a7019e5cb56717e5f032f0da2c01
SHA1 72ae665ced2b1e252dedd502e0150eb61b9b40fa
SHA256 6fb0f291d96f7ad572938e9f55d411c8f385f652580d4d1eb03f41e484bfbeb7
SHA3 96cb8b74b73924265deff367905382e60c2e4dd9339bf2a1ed2a82f2fe8c4e2f
SSDeep 192:VolgzpHnuQVM4f+Sfz3BU7dJMRp+UaSNPAtLRcXOEy7ex2lz5fNgz9:6izHC4flsdI+UaSNPAbcXry7d3fNgz
Imports Hash d41d8cd98f00b204e9800998ecf8427e

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 2
TimeDateStamp 2019-May-03 01:57:34
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 48.0
SizeOfCode 0x2c00
SizeOfInitializedData 0x600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000000000 (Section: ?)
BaseOfCode 0x2000
ImageBase 0x140000000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x8000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x400000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x2000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 abd3098e3b5442318720be4c1e09a75a
SHA1 04b858c2dc12ea49be53ccb9524a738856748a31
SHA256 dc9e1cb625bbc2742167b0bf8f000c711047de5d482ad1f308d4668cc90bb34a
SHA3 d291c742d1d880964f42278852ad865d30f3627b7b2ec0df67363b3dde980de4
VirtualSize 0x2b60
VirtualAddress 0x2000
SizeOfRawData 0x2c00
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.53462

.rsrc

MD5 01f1c0b96799a37515619455f2c6d7d7
SHA1 654b28415e2758f220e490bd28b9c703c0ff2f60
SHA256 683335b9b5259b909831b10d92dfbe2bdc2d3cd17aeb6435b4fb2829518b3345
SHA3 c7686b48cf4e0685e989111b75409b49f4d475add866b3c4d2980867a8e8c616
VirtualSize 0x5bc
VirtualAddress 0x6000
SizeOfRawData 0x600
PointerToRawData 0x2e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.12099

Imports

Delayed Imports

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x32c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.29352
MD5 ba1a40d3fd4b7d69927409e6765cc3f2
SHA1 6b68c7e78380777a748b006740429bdc8f467dd9
SHA256 456b772a4c19ba8983f19076d2bffb77199b68642d75c83f7ef1d0799d196013
SHA3 e52cdd38fdf87998aa3c36b0c1dfd730a271eab650e59048d86c01c73295b486

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription DLL UNLOAD
FileVersion (#2) 1.0.0.0
InternalName DLL UNLOAD.exe
LegalCopyright Copyright © 2018
LegalTrademarks
OriginalFilename DLL UNLOAD.exe
ProductName DLL UNLOAD
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2019-May-03 01:57:34
Version 0.0
SizeofData 284
AddressOfRawData 0x4a44
PointerToRawData 0x2c44
Referenced File C:\Users\PC User\Desktop\DLL UNLOAD\obj\x64\Release\DLL UNLOAD.pdb

TLS Callbacks

Load Configuration

RICH Header

Errors