Loading ...

Play interactive tourEdit tour

Analysis Report Product Order 2070121_SN-WS.scr

Overview

General Information

Sample Name:Product Order 2070121_SN-WS.scr (renamed file extension from scr to exe)
Analysis ID:358442
MD5:1c6aec49b015d3ae4bee86b84bb37a42
SHA1:9cfbd68f389d4106557b7daea67bb95b8c51eea7
SHA256:e1fdbaebafc61e8a7d21913134e3c83104805f2bdb932525108da2f3c35176ee
Tags:GuLoaderscr
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
PE file contains strange resources
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: Product Order 2070121_SN-WS.exe PID: 6336JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
    Process Memory Space: Product Order 2070121_SN-WS.exe PID: 6336JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: Product Order 2070121_SN-WS.exeVirustotal: Detection: 35%Perma Link
      Source: Product Order 2070121_SN-WS.exeReversingLabs: Detection: 12%

      Compliance:

      barindex
      Uses 32bit PE filesShow sources
      Source: Product Order 2070121_SN-WS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.743508753.00000000006EA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      System Summary:

      barindex
      Potential malicious icon foundShow sources
      Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Product Order 2070121_SN-WS.exe
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403809
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403436
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403C3D
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004034CB
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004038E2
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403481
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403C87
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403899
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040355D
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040397A
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403510
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403D15
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040392B
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004039C8
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004031E0
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004035FB
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403199
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004035AB
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403A4F
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403A0D
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403229
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040363E
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004036D6
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403AD9
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403686
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403A97
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004032B6
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004032B9
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040334E
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403B6C
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040376D
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403303
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_004033E5
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403BF3
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040339B
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403BAF
      Source: Product Order 2070121_SN-WS.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.743120973.0000000000415000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameReselects1.exe vs Product Order 2070121_SN-WS.exe
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.744030937.0000000002090000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Product Order 2070121_SN-WS.exe
      Source: Product Order 2070121_SN-WS.exeBinary or memory string: OriginalFilenameReselects1.exe vs Product Order 2070121_SN-WS.exe
      Source: Product Order 2070121_SN-WS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: classification engineClassification label: mal88.rans.troj.evad.winEXE@1/0@0/0
      Source: Product Order 2070121_SN-WS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: Product Order 2070121_SN-WS.exeVirustotal: Detection: 35%
      Source: Product Order 2070121_SN-WS.exeReversingLabs: Detection: 12%

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: Process Memory Space: Product Order 2070121_SN-WS.exe PID: 6336, type: MEMORY
      Yara detected VB6 Downloader GenericShow sources
      Source: Yara matchFile source: Process Memory Space: Product Order 2070121_SN-WS.exe PID: 6336, type: MEMORY
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00409005 push cs; retf
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00403269 push cs; retf
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_0040466F push ds; retf
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_00408FF4 push cs; retf
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C3536
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeRDTSC instruction interceptor: First address: 00000000020C00EA second address: 00000000020C00EA instructions:
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.744118229.00000000020C0000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEF
      Source: Product Order 2070121_SN-WS.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeRDTSC instruction interceptor: First address: 00000000020C00EA second address: 00000000020C00EA instructions:
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeRDTSC instruction interceptor: First address: 00000000020C1F45 second address: 00000000020C1F45 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FFB20DF0C8Ah 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp ch, 00000073h 0x00000020 pop ecx 0x00000021 add edi, edx 0x00000023 jmp 00007FFB20DF0CD0h 0x00000025 dec ecx 0x00000026 cmp ecx, 00000000h 0x00000029 jne 00007FFB20DF0C20h 0x0000002b push ecx 0x0000002c call 00007FFB20DF0CFEh 0x00000031 call 00007FFB20DF0C9Ah 0x00000036 lfence 0x00000039 mov edx, dword ptr [7FFE0014h] 0x0000003f lfence 0x00000042 ret 0x00000043 mov esi, edx 0x00000045 pushad 0x00000046 rdtsc
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C4609 rdtsc
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.744118229.00000000020C0000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exef
      Source: Product Order 2070121_SN-WS.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C4609 rdtsc
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C3E13 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C3636 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C1472 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C0E88 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C3D53 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C397F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C1DEE mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\Product Order 2070121_SN-WS.exeCode function: 0_2_020C13F4 mov eax, dword ptr fs:[00000030h]
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.743695185.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.743695185.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.743695185.0000000000C70000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.743695185.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
      Source: Product Order 2070121_SN-WS.exe, 00000000.00000002.743695185.0000000000C70000.00000002.00000001.sdmpBinary or memory string: Progmanlock

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Process Injection1Input Capture1Security Software Discovery411Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsObfuscated Files or Information1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerSystem Information Discovery31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Product Order 2070121_SN-WS.exe35%VirustotalBrowse
      Product Order 2070121_SN-WS.exe13%ReversingLabsWin32.Trojan.Generic

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:31.0.0 Emerald
      Analysis ID:358442
      Start date:25.02.2021
      Start time:16:13:14
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 6m 59s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:Product Order 2070121_SN-WS.scr (renamed file extension from scr to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:27
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal88.rans.troj.evad.winEXE@1/0@0/0
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 43.7% (good quality ratio 17.3%)
      • Quality average: 24.4%
      • Quality standard deviation: 31.8%
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for sample files taking high CPU consumption
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Report size exceeded maximum capacity and may have missing disassembly code.

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      No created / dropped files found

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):5.963684213640259
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.15%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Product Order 2070121_SN-WS.exe
      File size:86016
      MD5:1c6aec49b015d3ae4bee86b84bb37a42
      SHA1:9cfbd68f389d4106557b7daea67bb95b8c51eea7
      SHA256:e1fdbaebafc61e8a7d21913134e3c83104805f2bdb932525108da2f3c35176ee
      SHA512:7748c9a652985fe0ebc938d0e005e4df308f780f1c24aa050f1de7a1d0bdcf6fd5c64eef6e964b3482d5ce5f263891e03280e708b8ce8fe76a8cd480c421e686
      SSDEEP:768:4GKC47Ovmr1ITWNFq22edVGTaExG7iTho+FW99+oeKDklyVdbTD3PtrkwXTX0fRC:5whVFq2fVKxuic9fLLxk4AfRtQ
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L.....7`................. ...0...............0....@................

      File Icon

      Icon Hash:20047c7c70f0e004

      Static PE Info

      General

      Entrypoint:0x4014bc
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x6037868D [Thu Feb 25 11:14:21 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:3a6673b23cf9b03cd6b926c02ab84460

      Entrypoint Preview

      Instruction
      push 00401778h
      call 00007FFB20570A83h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      xor byte ptr [eax], al
      add byte ptr [eax], al
      inc eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax-74h], ah
      fisttp word ptr [edx-76h]
      cmove ecx, dword ptr [edx-44h]
      inc edi
      push esp
      add al, 7Bh
      mov ebp, 0000EEFFh
      add byte ptr [eax], al
      add byte ptr [eax], al
      add dword ptr [eax], eax
      add byte ptr [eax], al
      and byte ptr [6C432220h], bh
      dec esp
      popad
      jns 00007FFB20570AF6h
      insb
      outsd
      arpl word ptr [ebx+00h], bp
      or al, byte ptr [ebx+6Ch]
      imul esp, dword ptr [ebp+6Eh], 00000000h
      dec esp
      xor dword ptr [eax], eax
      or esi, dword ptr [ebp-6E6D277Bh]
      aam 81h
      dec ebp
      test dword ptr [ecx+1492B737h], esp
      mov cl, A1h

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x125c40x28.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000xa48.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x120.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x11ad00x12000False0.453830295139data6.50011548254IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0x130000x11bc0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x150000xa480x1000False0.18896484375data2.2831350237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x159180x130data
      RT_ICON0x156300x2e8data
      RT_ICON0x155080x128GLS_BINARY_LSB_FIRST
      RT_GROUP_ICON0x154d80x30data
      RT_VERSION0x151500x388dataEnglishUnited States

      Imports

      DLLImport
      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, _adj_fpatan, __vbaLateIdCallLd, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaI2Str, __vbaFPException, __vbaInStrVar, _CIlog, __vbaNew2, __vbaR8Str, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

      Version Infos

      DescriptionData
      Translation0x0409 0x04b0
      LegalCopyrightCopyright 2016-2021 Proton Clear
      InternalNameReselects1
      FileVersion1.00
      CompanyNameProton Clear Inc.
      LegalTrademarksCopyright 2016-2021 Proton Clear
      CommentsProton Clear
      ProductNameProton Clear
      ProductVersion1.00
      FileDescriptionProtonClear
      OriginalFilenameReselects1.exe

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States

      Network Behavior

      No network behavior found

      Code Manipulations

      Statistics

      System Behavior

      General

      Start time:16:14:01
      Start date:25/02/2021
      Path:C:\Users\user\Desktop\Product Order 2070121_SN-WS.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\Product Order 2070121_SN-WS.exe'
      Imagebase:0x400000
      File size:86016 bytes
      MD5 hash:1C6AEC49B015D3AE4BEE86B84BB37A42
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >