Loading ...

Play interactive tourEdit tour

Analysis Report PHOTOCHLORINATION.exe

Overview

General Information

Sample Name:PHOTOCHLORINATION.exe
Analysis ID:377790
MD5:584c030ac9abd52c2347214088b1fa14
SHA1:6deb5d5b469ba5f63e937bb093281911eab7c054
SHA256:59662ea91566a6d7578243f8f9ad28d84c2908ba17be418f0a45cdd218272b0b
Tags:GuLoader
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • PHOTOCHLORINATION.exe (PID: 3000 cmdline: 'C:\Users\user\Desktop\PHOTOCHLORINATION.exe' MD5: 584C030AC9ABD52C2347214088B1FA14)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: PHOTOCHLORINATION.exe PID: 3000JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
    Process Memory Space: PHOTOCHLORINATION.exe PID: 3000JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: PHOTOCHLORINATION.exeVirustotal: Detection: 27%Perma Link
      Source: PHOTOCHLORINATION.exeReversingLabs: Detection: 10%
      Machine Learning detection for sampleShow sources
      Source: PHOTOCHLORINATION.exeJoe Sandbox ML: detected
      Source: PHOTOCHLORINATION.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00409131
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0040942D
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004094BA
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00409350
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00427AAC
      Source: PHOTOCHLORINATION.exe, 00000000.00000002.1173852011.0000000002130000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs PHOTOCHLORINATION.exe
      Source: PHOTOCHLORINATION.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: classification engineClassification label: mal84.troj.evad.winEXE@1/0@0/0
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeFile created: C:\Users\user\AppData\Local\Temp\~DF14F9078FF1501F8C.TMPJump to behavior
      Source: PHOTOCHLORINATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: PHOTOCHLORINATION.exeVirustotal: Detection: 27%
      Source: PHOTOCHLORINATION.exeReversingLabs: Detection: 10%

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: Process Memory Space: PHOTOCHLORINATION.exe PID: 3000, type: MEMORY
      Yara detected VB6 Downloader GenericShow sources
      Source: Yara matchFile source: Process Memory Space: PHOTOCHLORINATION.exe PID: 3000, type: MEMORY
      Source: PHOTOCHLORINATION.exeStatic PE information: real checksum: 0x24302 should be: 0x1df4d
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00409131 push ecx; ret
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00407C50 pushfd ; iretd
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00406497 push ebx; retf
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004078A5 pushfd ; ret
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0040A0B1 push CF58EBC2h; retn 58EBh
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0040912A push ecx; ret
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00408DC9 push ss; retf
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00408E4A pushfd ; iretd
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0040660D push ebx; retf
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00407694 pushfd ; ret
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421C71 push 39B0D224h; retf
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004208C9 push E8D18566h; retf 0055h
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00424CD1 push 38B0D224h; ret
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00423515 push 38B0D224h; ret
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00423A39 push C9D38566h; retn 0004h
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004252F9 push 39B0D224h; retf
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421A89 push 39B0D224h; retf
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004227C5 push ebx; ret
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421BF9 push 39B0D224h; retf
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422833
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004228C5
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422887
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0042294B
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422917
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421937
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004229E5
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422991
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422A61
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422A1B
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421283
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421280
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422AB5
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421F4F
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422B6B
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421F76
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422B15
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421F19
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004227EE
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004227F1
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421FA3
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00422BA7
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeRDTSC instruction interceptor: First address: 0000000000426276 second address: 0000000000426276 instructions:
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: PHOTOCHLORINATION.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: PHOTOCHLORINATION.exe, 00000000.00000002.1172940359.0000000000420000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEW
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeRDTSC instruction interceptor: First address: 0000000000426276 second address: 0000000000426276 instructions:
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00409131 rdtsc
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: PHOTOCHLORINATION.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: PHOTOCHLORINATION.exe, 00000000.00000002.1172940359.0000000000420000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exeW

      Anti Debugging:

      barindex
      Found potential dummy code loops (likely to delay analysis)Show sources
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeProcess Stats: CPU usage > 90% for more than 60s
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00409131 rdtsc
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0042688D mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00426897 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00421937 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004221C0 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004221FB mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0042327C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_0042575C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_00425FC9 mov eax, dword ptr fs:[00000030h]
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: PHOTOCHLORINATION.exe, 00000000.00000002.1173641561.0000000000CA0000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: PHOTOCHLORINATION.exe, 00000000.00000002.1173641561.0000000000CA0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: PHOTOCHLORINATION.exe, 00000000.00000002.1173641561.0000000000CA0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: PHOTOCHLORINATION.exe, 00000000.00000002.1173641561.0000000000CA0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\PHOTOCHLORINATION.exeCode function: 0_2_004263D9 cpuid

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery511Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery311Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      PHOTOCHLORINATION.exe28%VirustotalBrowse
      PHOTOCHLORINATION.exe10%ReversingLabsWin32.Backdoor.Remcos
      PHOTOCHLORINATION.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:31.0.0 Emerald
      Analysis ID:377790
      Start date:29.03.2021
      Start time:23:35:50
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 4s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:PHOTOCHLORINATION.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:1
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.troj.evad.winEXE@1/0@0/0
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 31.8% (good quality ratio 16.5%)
      • Quality average: 35.5%
      • Quality standard deviation: 37.8%
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      No created / dropped files found

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):5.51678687133476
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.15%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:PHOTOCHLORINATION.exe
      File size:86016
      MD5:584c030ac9abd52c2347214088b1fa14
      SHA1:6deb5d5b469ba5f63e937bb093281911eab7c054
      SHA256:59662ea91566a6d7578243f8f9ad28d84c2908ba17be418f0a45cdd218272b0b
      SHA512:3105eacef92279f9a6e666152c5b2ae4f7d5c1fb60ed3edd3783713fee81b486f06c69580f23c7936e425f26b63c080a4df174056ece800ca7f5263fa37061e9
      SSDEEP:768:QaMTZied1gEdEZzH9n8O9MA8f7eyGOjYkrch+rIUk/RjvMgE7D0Bq0XqhyLctUri:JeZZgMYQ9HGOPUekjMAE
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L...[..N.....................0......8........ ....@................

      File Icon

      Icon Hash:f1f8f6f0f0e4f831

      Static PE Info

      General

      Entrypoint:0x401538
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x4EC7825B [Sat Nov 19 10:18:03 2011 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:3ecd501451a806efb69c3dc3e8601427

      Entrypoint Preview

      Instruction
      push 0040CBB0h
      call 00007FA7A4D97CB3h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      xor byte ptr [eax], al
      add byte ptr [eax], al
      dec eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [esi], ch
      cmp ch, al
      dec esp
      or al, B1h
      adc eax, dword ptr [edi-7Eh]
      sti
      dec ebx
      xchg byte ptr [ebx-65h], cl
      jns 00007FA7A4D97CC2h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [ecx], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add al, cl
      jnle 00007FA7A4D97CC7h
      add eax, dword ptr [ecx+72h]
      bound esp, dword ptr [ebp+6Ah]
      jnc 00007FA7A4D97D30h
      popad
      jc 00007FA7A4D97D2Dh
      jnc 00007FA7A4D97D34h
      outsd
      insb
      imul esi, dword ptr [ecx+ebp*2+6Bh], 00000000h
      add byte ptr [eax], al
      add bh, bh
      int3
      xor dword ptr [eax], eax
      or dword ptr [edi-72h], esp
      add edi, ecx
      enter DBADh, 42h
      mov dword ptr [edx], esi
      pop edx
      aas
      lodsb
      lodsd
      cmpsd
      and ah, byte ptr [ebx]
      mov dh, 57h
      pop ebp
      push ebx
      mov word ptr [ecx], fs
      inc ecx
      mov ch, al
      enter C9ECh, B3h
      inc edx
      cmp cl, byte ptr [edi-53h]
      xor ebx, dword ptr [ecx-48EE309Ah]
      or al, 00h
      stosb
      add byte ptr [eax-2Dh], ah
      xchg eax, ebx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      outsd
      mov ch, 00h
      add bl, ah
      mov bl, 00h
      add byte ptr [eax], al
      pop es
      add byte ptr [ebx+4Bh], dl
      inc ebp
      push eax
      push ebx
      dec ecx
      push ebx
      add byte ptr [00000D01h], cl

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x116e40x28.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000x1412.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x128.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x10bdc0x11000False0.442899816176data6.14512004052IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0x120000xa500x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x130000x14120x2000False0.291137695312data3.29788287231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x13d4a0x6c8dBase III DBT, version number 0, next free block index 40
      RT_ICON0x133c20x988dBase III DBT, version number 0, next free block index 40
      RT_GROUP_ICON0x133a00x22data
      RT_VERSION0x131200x280dataGuaraniParaguay

      Imports

      DLLImport
      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaLineInputStr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaLateMemSt, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFPFix, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, __vbaObjVar, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, __vbaR8Str, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaVarDup, __vbaLateMemCallLd, _CIatan, __vbaCastObj, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

      Version Infos

      DescriptionData
      Translation0x0474 0x04b0
      InternalNamePHOTOCHLORINATION
      FileVersion3.03
      CompanyNameSanyo
      CommentsSanyo
      ProductNameSanyo
      ProductVersion3.03
      FileDescriptionSanyo
      OriginalFilenamePHOTOCHLORINATION.exe

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      GuaraniParaguay

      Network Behavior

      No network behavior found

      Code Manipulations

      Statistics

      System Behavior

      General

      Start time:23:36:38
      Start date:29/03/2021
      Path:C:\Users\user\Desktop\PHOTOCHLORINATION.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\PHOTOCHLORINATION.exe'
      Imagebase:0x400000
      File size:86016 bytes
      MD5 hash:584C030AC9ABD52C2347214088B1FA14
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >