Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6qr4g3TReL.bin

Overview

General Information

Sample Name:6qr4g3TReL.bin (renamed file extension from bin to exe)
Analysis ID:660120
MD5:2d2f0c7af61867cd84f2e419a62cef16
SHA1:e734bb114c2f47dc900d3a5a526db94f0b752ba0
SHA256:5b3d4395b0f5acd40bc20f4bf3930cbd14da3d240ad67f7ab9a65de0681e8742
Tags:exezeus2
Infos:

Detection

ZeusVM
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected ZeusVM e-Banking Trojan
Detected unpacking (overwrites its own PE header)
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Contains VNC / remote desktop functionality (version string found)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to launch a process as a different user
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Contains functionality to enumerate network shares
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
May initialize a security null descriptor
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • 6qr4g3TReL.exe (PID: 7088 cmdline: "C:\Users\user\Desktop\6qr4g3TReL.exe" MD5: 2D2F0C7AF61867CD84F2E419A62CEF16)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 6qr4g3TReL.exeVirustotal: Detection: 71%Perma Link
Source: 6qr4g3TReL.exeReversingLabs: Detection: 93%
Source: 6qr4g3TReL.exeAvira: detected
Source: 6qr4g3TReL.exeJoe Sandbox ML: detected
Source: 0.2.6qr4g3TReL.exe.400000.0.unpackAvira: Label: TR/Spy.Gen
Source: 0.0.6qr4g3TReL.exe.400000.0.unpackAvira: Label: TR/Spy.Zbot.vbb.4
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00409A27 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,

Compliance

barindex
Source: C:\Users\user\Desktop\6qr4g3TReL.exeUnpacked PE file: 0.2.6qr4g3TReL.exe.400000.0.unpack
Source: 6qr4g3TReL.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00414625 LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040DDAD FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040DE68 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: 6qr4g3TReL.exe, 6qr4g3TReL.exe, 00000000.00000002.420457127.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/webhp
Source: 6qr4g3TReL.exe, 00000000.00000002.420457127.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/webhpbcSeTcbPrivilege.exeSOFTWARE
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040A436 WaitForSingleObject,InternetReadFile,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0041B12F GetClipboardData,GlobalLock,EnterCriticalSection,LeaveCriticalSection,GlobalUnlock,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0041AFC2 EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,

E-Banking Fraud

barindex
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_004078C6 lstrcmpiA,lstrcmpiA,lstrcmpiA,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00419513 OpenDesktopW,CreateDesktopW,
Source: 6qr4g3TReL.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00414D4D InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0041A5E9 CreateMutexW,ExitWindowsEx,OpenEventW,CloseHandle,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0041A3A6 ExitWindowsEx,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00409934
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0041119E
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00401DBB
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040B394
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00409FB8 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: 6qr4g3TReL.exeVirustotal: Detection: 71%
Source: 6qr4g3TReL.exeReversingLabs: Detection: 93%
Source: C:\Users\user\Desktop\6qr4g3TReL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00409D62 GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040707D CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00406F0A CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: classification engineClassification label: mal92.bank.troj.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040EBA9 CoCreateInstance,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00409D0E CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,
Source: 6qr4g3TReL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\6qr4g3TReL.exeUnpacked PE file: 0.2.6qr4g3TReL.exe.400000.0.unpack
Source: C:\Users\user\Desktop\6qr4g3TReL.exeUnpacked PE file: 0.2.6qr4g3TReL.exe.400000.0.unpack .text:ER;.bdata:R;.data:W;.odata:R;.data:EW;.rsrc:R;.reloc:R; vs .text:ER;.data:W;.reloc:R;
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00402045 push es; iretd
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00414018 push ebp; ret
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_004026DB push cs; ret
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00402711 push cs; iretd
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_004143ED push esp; iretd
Source: 6qr4g3TReL.exeStatic PE information: section name: .bdata
Source: 6qr4g3TReL.exeStatic PE information: section name: .odata
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00413E51 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,WTSGetActiveConsoleSessionId,FreeLibrary,
Source: initial sampleStatic PE information: section name: .data entropy: 7.377212715179087
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00406765 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\6qr4g3TReL.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
Source: C:\Users\user\Desktop\6qr4g3TReL.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
Source: C:\Users\user\Desktop\6qr4g3TReL.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\6qr4g3TReL.exeAPI coverage: 1.5 %
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040DDAD FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040DE68 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00413E51 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,WTSGetActiveConsoleSessionId,FreeLibrary,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00419B3D HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,CreateEventW,GetLengthSid,GetCurrentProcessId,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_004196D9 mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040BC79 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_004070CD PFXImportCertStore,GetSystemTime,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_004087B9 GetTimeZoneInformation,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00406CAF GetVersionExW,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_00413091 GetTickCount,GetUserDefaultUILanguage,GetModuleFileNameW,GetUserNameExW,
Source: 6qr4g3TReL.exeBinary or memory string: S:(ML;;NRNWNX;;;LW)

Remote Access Functionality

barindex
Source: 6qr4g3TReL.exeString found in binary or memory: RFB 003.003
Source: 6qr4g3TReL.exeString found in binary or memory: RFB 003.003
Source: 6qr4g3TReL.exe, 00000000.00000002.420457127.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: RFB 003.003
Source: 6qr4g3TReL.exe, 00000000.00000002.420457127.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: scriptnbsp;tmp%s%08x.%s%s%08x*RFB 003.003
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040BAA8 socket,bind,closesocket,
Source: C:\Users\user\Desktop\6qr4g3TReL.exeCode function: 0_2_0040B783 socket,bind,listen,closesocket,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Valid Accounts
13
Native API
1
Create Account
1
Valid Accounts
1
Valid Accounts
11
Input Capture
1
Network Share Discovery
1
Remote Desktop Protocol
11
Input Capture
Exfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default AccountsScheduled Task/Job1
Valid Accounts
11
Access Token Manipulation
11
Access Token Manipulation
LSASS Memory2
System Time Discovery
Remote Desktop Protocol1
Archive Collected Data
Exfiltration Over Bluetooth1
Remote Access Software
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Security Software Discovery
SMB/Windows Admin Shares1
Clipboard Data
Automated Exfiltration1
Ingress Tool Transfer
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Install Root Certificate
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script22
Software Packing
LSA Secrets1
Account Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
System Information Discovery
Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
6qr4g3TReL.exe71%VirustotalBrowse
6qr4g3TReL.exe93%ReversingLabsWin32.Trojan.Zeus
6qr4g3TReL.exe100%AviraTR/Spy.Zbot.vbb.4
6qr4g3TReL.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
0.2.6qr4g3TReL.exe.400000.0.unpack100%AviraTR/Spy.GenDownload File
0.0.6qr4g3TReL.exe.400000.0.unpack100%AviraTR/Spy.Zbot.vbb.4Download File
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.google.com/webhp6qr4g3TReL.exe, 6qr4g3TReL.exe, 00000000.00000002.420457127.0000000000400000.00000040.00001000.00020000.00000000.sdmpfalse
    high
    http://www.google.com/webhpbcSeTcbPrivilege.exeSOFTWARE6qr4g3TReL.exe, 00000000.00000002.420457127.0000000000400000.00000040.00001000.00020000.00000000.sdmpfalse
      high
      No contacted IP infos
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:660120
      Start date and time: 09/07/202204:03:122022-07-09 04:03:12 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 2m 58s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:6qr4g3TReL.bin (renamed file extension from bin to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal92.bank.troj.evad.winEXE@1/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 99.4% (good quality ratio 92.7%)
      • Quality average: 82.5%
      • Quality standard deviation: 29.1%
      HCA Information:
      • Successful, ratio: 88%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, conhost.exe, backgroundTaskHost.exe
      • Excluded IPs from analysis (whitelisted): 20.82.210.154
      • Excluded domains from analysis (whitelisted): go.microsoft.com, store-images.s-microsoft.com, settings-win.data.microsoft.com, arc.trafficmanager.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.271383129337848
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • VXD Driver (31/22) 0.00%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:6qr4g3TReL.exe
      File size:120320
      MD5:2d2f0c7af61867cd84f2e419a62cef16
      SHA1:e734bb114c2f47dc900d3a5a526db94f0b752ba0
      SHA256:5b3d4395b0f5acd40bc20f4bf3930cbd14da3d240ad67f7ab9a65de0681e8742
      SHA512:82a56fd148157c9957daa001b2dc0a31720e5a452a800e38fff2fae3661abab11f3cef04bdf4575bfb29d3a925e0b57bf65d809f6c8421721bad763dfd8eebd9
      SSDEEP:3072:+Is+YKqkUGyV60eGb+DEAdYiHwKW6GGNk885qbh:+WYKqLeBddjHwrPGe88Ih
      TLSH:85C3023AC02F2D05F4507C3006EB52A8EB98FD925E1666DF5F4A500FBD16E91A9B025F
      File Content Preview:MZP.....................@...................................@...PE..L...Vm.6............................ ........@....@..........................`.......w.......................................@.......................................1.. ..................
      Icon Hash:00828e8e8686b000
      Entrypoint:0x401620
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:
      Time Stamp:0x36EA6D56 [Sat Mar 13 13:51:18 1999 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:0bf2acd23359b9e1b2b09733eb741a41
      Instruction
      mov eax, dword ptr [esp+08h]
      cmp eax, 00000000h
      je 00007FA6C8D72835h
      add eax, 04h
      call 00007FA6C8D72574h
      push 00000056h
      push 00000054h
      call 00007FA6C8D722A5h
      add esp, 08h
      sub edx, ecx
      mov dword ptr [00405052h], esi
      mov esi, dword ptr [0040500Ch]
      mov eax, ebx
      push 0040511Eh
      push 00000000h
      push 0000009Ch
      call 00007FA6C8D72985h
      call 00007FA6C8D72986h
      cmp eax, 02h
      jne 00007FA6C8D72945h
      xor edi, edi
      add eax, dword ptr [0040512Dh]
      add dword ptr [00405131h], eax
      mov dword ptr [004050DFh], edx
      mov ebx, edx
      mov eax, ebx
      add edi, 01h
      cmp edi, 00000F2Fh
      jc 00007FA6C8D72811h
      call 00007FA6C8D72507h
      xor edi, edi
      sub ecx, eax
      mov esi, esp
      xor edx, dword ptr [00405135h]
      add edx, esi
      mov esi, ebx
      mov edx, dword ptr [00405139h]
      add edi, 01h
      cmp edi, 00001094h
      jc 00007FA6C8D72813h
      add dword ptr [004050DFh], ebx
      mov eax, esi
      push 000000DDh
      push 0040513Dh
      push 00000000h
      call 00007FA6C8D72901h
      call 00007FA6C8D72544h
      xor edi, edi
      sub edx, dword ptr [0040500Ch]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x40000x4a0
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1f0000x1cc8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x210000xca.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x310b0x20.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22000x1c.text
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x2cf30x2e00False0.5534137228260869data4.46738070074491IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .bdata0x40000x1260x200False0.384765625data2.610488321447332IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x50000x1ba0x200False0.35546875data2.645869961576107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .odata0x60000x160f80x16200False0.9766949152542372data7.785801588267968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x1d0000x1aec0x1c00False0.8441685267857143data7.377212715179087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x1f0000x1cc80x1e00False0.21575520833333334data2.1308343153579132IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x210000x40ca0x200False0.431640625data3.1034497495820172IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_CURSOR0x1f2080x6d1dataEnglishUnited States
      RT_BITMAP0x1f8dc0x2d2dataEnglishUnited States
      RT_MENU0x1fbb00x256dataEnglishUnited States
      RT_DIALOG0x1fe080x2b5dataEnglishUnited States
      RT_FONT0x200c00x58adataEnglishUnited States
      RT_ACCELERATOR0x2064c0x511dataEnglishUnited States
      RT_MANIFEST0x20b600x165ASCII text, with CRLF line terminatorsEnglishUnited States
      DLLImport
      kernel32.dllExitProcess, FindResourceA, GetLastError, GetLocaleInfoA, GetSystemTime, OpenSemaphoreA, QueryPerformanceCounter
      user32.dllGetSystemMetrics, LoadStringA
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:0
      Start time:04:04:18
      Start date:09/07/2022
      Path:C:\Users\user\Desktop\6qr4g3TReL.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\6qr4g3TReL.exe"
      Imagebase:0x400000
      File size:120320 bytes
      MD5 hash:2D2F0C7AF61867CD84F2E419A62CEF16
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      No disassembly