Edit tour

Windows Analysis Report
RAPS.exe

Overview

General Information

Sample name:RAPS.exe
Analysis ID:1425795
MD5:186b2c70b01e5d04822b2280ada6e5c6
SHA1:9e52dcbc72b489db0f54b071b158de1126615c4b
SHA256:a051ccc1cfe9ff753aeaf9fde76d826750abc6b75e38a9ee89c5e0187e069d74
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Sigma detected: Suspicious Copy From or To System Directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64_ra
  • RAPS.exe (PID: 6980 cmdline: "C:\Users\user\Desktop\RAPS.exe" MD5: 186B2C70B01E5D04822B2280ADA6E5C6)
    • conhost.exe (PID: 6988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7044 cmdline: C:\Windows\system32\cmd.exe /c if exist kaps2.log copy /y kaps2.log kaps3.log > NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7060 cmdline: C:\Windows\system32\cmd.exe /c if exist kaps1.log copy /y kaps1.log kaps2.log > NUL MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7080 cmdline: C:\Windows\system32\cmd.exe /c if exist ~kaps.log ( copy /y ~kaps.log + kaps.log kaps1.log > NUL ) ELSE ( copy /y kaps.log kaps1.log > NUL ) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7096 cmdline: C:\Windows\system32\cmd.exe /c del /q ~kaps.log > NUL 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No yara matches
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c if exist kaps2.log copy /y kaps2.log kaps3.log > NUL, CommandLine: C:\Windows\system32\cmd.exe /c if exist kaps2.log copy /y kaps2.log kaps3.log > NUL, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\RAPS.exe", ParentImage: C:\Users\user\Desktop\RAPS.exe, ParentProcessId: 6980, ParentProcessName: RAPS.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c if exist kaps2.log copy /y kaps2.log kaps3.log > NUL, ProcessId: 7044, ProcessName: cmd.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: RAPS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: classification engineClassification label: clean2.winEXE@10/3@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6988:120:WilError_03
Source: RAPS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\RAPS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\user\Desktop\RAPS.exe "C:\Users\user\Desktop\RAPS.exe"
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist kaps2.log copy /y kaps2.log kaps3.log > NUL
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist kaps1.log copy /y kaps1.log kaps2.log > NUL
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist ~kaps.log ( copy /y ~kaps.log + kaps.log kaps1.log > NUL ) ELSE ( copy /y kaps.log kaps1.log > NUL )
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del /q ~kaps.log > NUL 2>&1
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist kaps2.log copy /y kaps2.log kaps3.log > NUL
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist kaps1.log copy /y kaps1.log kaps2.log > NUL
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist ~kaps.log ( copy /y ~kaps.log + kaps.log kaps1.log > NUL ) ELSE ( copy /y kaps.log kaps1.log > NUL )
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del /q ~kaps.log > NUL 2>&1
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: iphlpapi.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: pdh.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: wlanapi.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: userenv.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: wtsapi32.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: winhttp.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: profapi.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: winsta.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: powrprof.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: umpdc.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: dhcpcsvc6.dll
Source: C:\Users\user\Desktop\RAPS.exeSection loaded: dhcpcsvc.dll
Source: RAPS.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: RAPS.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: RAPS.exeStatic file information: File size 1767936 > 1048576
Source: RAPS.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x119a00
Source: RAPS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: RAPS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: RAPS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: RAPS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: RAPS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: RAPS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: RAPS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: RAPS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: RAPS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: RAPS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: RAPS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: RAPS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: RAPS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\RAPS.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\LanmanServer\Parameters
Source: C:\Users\user\Desktop\RAPS.exeWindow / User API: threadDelayed 372
Source: C:\Users\user\Desktop\RAPS.exeWindow / User API: threadDelayed 390
Source: C:\Users\user\Desktop\RAPS.exe TID: 6984Thread sleep time: -820000s >= -30000s
Source: C:\Users\user\Desktop\RAPS.exe TID: 6984Thread sleep time: -3720000s >= -30000s
Source: C:\Users\user\Desktop\RAPS.exe TID: 6984Thread sleep time: -3900000s >= -30000s
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist kaps2.log copy /y kaps2.log kaps3.log > NUL
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist kaps1.log copy /y kaps1.log kaps2.log > NUL
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c if exist ~kaps.log ( copy /y ~kaps.log + kaps.log kaps1.log > NUL ) ELSE ( copy /y kaps.log kaps1.log > NUL )
Source: C:\Users\user\Desktop\RAPS.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del /q ~kaps.log > NUL 2>&1
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Windows Service
1
Windows Service
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
11
Process Injection
11
Process Injection
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
RAPS.exe0%ReversingLabs
RAPS.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1425795
Start date and time:2024-04-14 18:17:55 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:18
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
Analysis Mode:stream
Analysis stop reason:Timeout
Sample name:RAPS.exe
Detection:CLEAN
Classification:clean2.winEXE@10/3@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
Process:C:\Users\user\Desktop\RAPS.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):101531
Entropy (8bit):5.121904756698806
Encrypted:false
SSDEEP:
MD5:A1198976BB8AB5D7946F270F2D154E7C
SHA1:7216D178E155DB9E6728FCF52E08E65365ED73BD
SHA-256:27BB603C488AA74ED06D26A89B29F3ABAE1FF44771B5C39595EFE577F25CC58A
SHA-512:19712BBE0963F6409BCBCADB478500B57F6370C3C4ED00A7B7695E4BF1900D3EC8244E949B7607B81C67A980B58D53C20C8F51D334453E549DEC3BE758E55036
Malicious:false
Reputation:unknown
Preview:[14/04/2024T18:18:23.761] C:\Users\user\Desktop\RAPS.exe - Main:[start] RUNNING AS APPLICATION [3.1122.1000.0, Jul 28 2022 @ 02:37:20] DYNAMIC_SCAN_THRESHOLD..0000000<Sun Apr 14 20:08:56 2024-0000142>~<INFO>:RAPS.exe v3.1122.1000.0, BUILD Date Jul 28 2022 02:37:20....[14/04/2024T18:18:23.905]CNotificationManagerSingleton::WorkThreadProc: waiting on m_pWorkerEvent.....CGlobalConfigContainer::InitPostSettings: RandomCsv: 1.1.1..[14/04/2024T18:18:23.985]CWlanClient::CWlanClient(): WlanOpenHandle() failed - 1062..[14/04/2024T18:18:24.1]CWifiClientContainer::CWifiClientContainer: Exception WlanOpenHandle() failed: 1062..[14/04/2024T18:18:24.1]CWifiClientContainer::CWifiClientContainer: Failed to create Wlan Client!..[14/04/2024T18:18:24.1]CWlanClient::CWlanClient(): WlanOpenHandle() failed - 1062..[14/04/2024T18:18:24.17]CWifiClientContainer::Initialize: Exception WlanOpenHandle() failed: 1062..[14/04/2024T18:18:24.17]Main[TOP loop]: No Supported Wifi Adapters.....[14/04/2024T18:18:24.17] M
Process:C:\Windows\System32\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):48
Entropy (8bit):4.553508854797679
Encrypted:false
SSDEEP:
MD5:0818F0855D4103D823F8044EAF7DB9DB
SHA1:376412F9429FE0B5496400FB7BA59396CE3E0BA9
SHA-256:240B54B13A51B0B053279FAE4D5F2428A3DACAE695504E372AD103E2E16CA8DA
SHA-512:C2C4E99C395788B648F1511D418FC756C712BE28E3528A03C966114527EE826DA0D9390C8D99ED7CD6F94A666D4AAFB5B65C171C6F6D3B5DCD60B1224913CD77
Malicious:false
Reputation:unknown
Preview:Could Not Find C:\Users\user\Desktop\~kaps.log..
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):6.170485676003678
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:RAPS.exe
File size:1'767'936 bytes
MD5:186b2c70b01e5d04822b2280ada6e5c6
SHA1:9e52dcbc72b489db0f54b071b158de1126615c4b
SHA256:a051ccc1cfe9ff753aeaf9fde76d826750abc6b75e38a9ee89c5e0187e069d74
SHA512:a508bca9a2476a6e3f1df2d265637e397e736ffa7ff48b436a831697bc7bb6be8e7bccea564aa894e730e986492345383d621ed07d0316170daefef89cf493e6
SSDEEP:49152:DQ2/RP4eAZsBnNQ7bb0uUkAZkw4QEadlV:9RxUnvU9N
TLSH:9485490577E800A4D07BC678C9A6851BE6727C450F35DADF12D1865E2F37BE18E3AB22
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.:.i.T.i.T.i.T...W.b.T...Q...T.;.W.`.T.;.P.J.T.;.Q...T...P...T...U.t.T.i.U.,.T...].Q.T.....h.T.i...h.T...V.h.T.Richi.T........
Icon Hash:3637393d3b0f4e0e
Entrypoint:0x1400bd0e4
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x62E1F6B0 [Thu Jul 28 02:38:40 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:935b686812e8d4246e2278af50aa30fb
Instruction
dec eax
sub esp, 28h
call 00007FA7AC6F234Ch
dec eax
add esp, 28h
jmp 00007FA7AC6F1C47h
int3
int3
dec eax
sub esp, 28h
dec ebp
mov eax, dword ptr [ecx+38h]
dec eax
mov ecx, edx
dec ecx
mov edx, ecx
call 00007FA7AC6F1DE2h
mov eax, 00000001h
dec eax
add esp, 28h
ret
int3
int3
int3
inc eax
push ebx
inc ebp
mov ebx, dword ptr [eax]
dec eax
mov ebx, edx
inc ecx
and ebx, FFFFFFF8h
dec esp
mov ecx, ecx
inc ecx
test byte ptr [eax], 00000004h
dec esp
mov edx, ecx
je 00007FA7AC6F1DE5h
inc ecx
mov eax, dword ptr [eax+08h]
dec ebp
arpl word ptr [eax+04h], dx
neg eax
dec esp
add edx, ecx
dec eax
arpl ax, cx
dec esp
and edx, ecx
dec ecx
arpl bx, ax
dec edx
mov edx, dword ptr [eax+edx]
dec eax
mov eax, dword ptr [ebx+10h]
mov ecx, dword ptr [eax+08h]
dec eax
mov eax, dword ptr [ebx+08h]
test byte ptr [ecx+eax+03h], 0000000Fh
je 00007FA7AC6F1DDDh
movzx eax, byte ptr [ecx+eax+03h]
and eax, FFFFFFF0h
dec esp
add ecx, eax
dec esp
xor ecx, edx
dec ecx
mov ecx, ecx
pop ebx
jmp 00007FA7AC6F1072h
int3
dec eax
mov eax, esp
dec eax
mov dword ptr [eax+08h], ebx
dec eax
mov dword ptr [eax+10h], ebp
dec eax
mov dword ptr [eax+18h], esi
dec eax
mov dword ptr [eax+20h], edi
inc ecx
push esi
dec eax
sub esp, 20h
dec ecx
mov ebx, dword ptr [ecx+38h]
dec eax
mov esi, edx
dec ebp
mov esi, eax
dec eax
mov ebp, ecx
dec ecx
mov edx, ecx
dec eax
mov ecx, esi
dec ecx
mov edi, ecx
dec esp
lea eax, dword ptr [ebx+04h]
call 00007FA7AC6F1D41h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1889500x12c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x19f0000x14f78.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1940000xa8cc.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b40000x19e4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x1619200x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x161a900x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1619900x100.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x11b0000x920.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1198c00x119a00fdbd9338121e4172e72f5431d685ae90False0.46908722397913893data6.40985298762481IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x11b0000x6f9a60x6fa00d9bae3ef86ecfd3f8e1d1751f88b6fbfFalse0.31031941139417696data4.858806239641028IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x18b0000x80a40x4e000673e32ee31545bec0307b9543f7e60dFalse0.1743289262820513DOS executable (block device driver ght (c)4.25847747080798IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x1940000xa8cc0xaa0009e3243a2da25992043be240840c242cFalse0.5033318014705882data6.06687976934415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x19f0000x14f780x15000d5fadce98df9623ef87ec7fb076a73eeFalse0.2797967819940476data3.7774732152853137IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1b40000x19e40x1a004fdcefa5c95577bf086bc4650e8c5d88False0.3460036057692308data5.4370680826027655IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x19f2500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.38423236514522824
RT_ICON0x1a17f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.43621013133208253
RT_ICON0x1a28a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6037234042553191
RT_ICON0x1a2d080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.2470424701289483
RT_STRING0x1b38400x484dataEnglishUnited States0.34342560553633217
RT_STRING0x1b3cc80x12cdataEnglishUnited States0.5133333333333333
RT_GROUP_ICON0x1b35300x3edataEnglishUnited States0.7903225806451613
RT_VERSION0x1b35700x2ccdataEnglishUnited States0.4692737430167598
RT_MANIFEST0x1b3df80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllGetCurrentProcess, GetVersionExW, GetCurrentThread, ReleaseSemaphore, WaitForMultipleObjects, CreateSemaphoreW, TerminateProcess, CreatePipe, GetFileAttributesW, GetTempPathA, GetTimeZoneInformation, FileTimeToSystemTime, FileTimeToLocalFileTime, CreateProcessW, GetSystemTimeAsFileTime, GetExitCodeProcess, CreateEventW, InitializeCriticalSectionAndSpinCount, SetEndOfFile, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, LocalFree, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, PeekConsoleInputA, GetNumberOfConsoleInputEvents, ReadConsoleW, SetFilePointerEx, GetFileSizeEx, GetFileAttributesExW, GetConsoleMode, FlushFileBuffers, GetFileType, EnumSystemLocalesW, LocalAlloc, GetSystemPowerStatus, WTSGetActiveConsoleSessionId, GetLocalTime, ConnectNamedPipe, GetOverlappedResult, ResetEvent, ReadFileEx, GlobalFree, GlobalAlloc, SetEvent, DisconnectNamedPipe, WaitForMultipleObjectsEx, WriteFileEx, CreateNamedPipeW, lstrlenW, CreateFileW, PeekNamedPipe, WriteFile, ReadFile, HeapReAlloc, HeapSize, TerminateThread, WaitForSingleObject, CloseHandle, QueryPerformanceCounter, GetCurrentProcessId, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetCommandLineA, GetStdHandle, ExitProcess, GetConsoleCP, GetModuleHandleExW, ResumeThread, QueryPerformanceFrequency, GetModuleHandleW, Sleep, GetModuleFileNameA, WideCharToMultiByte, MultiByteToWideChar, GetTickCount64, GetProcessHeap, DeleteCriticalSection, DecodePointer, HeapAlloc, RaiseException, GetLastError, InitializeCriticalSectionEx, InitializeCriticalSection, LeaveCriticalSection, EnterCriticalSection, GetEnvironmentStringsW, HeapFree, ExitThread, RtlPcToFileHeader, RtlUnwindEx, LoadLibraryW, RtlUnwind, CreateTimerQueue, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, DuplicateHandle, VirtualFree, VirtualProtect, VirtualAlloc, LoadLibraryExW, GetModuleHandleA, GetModuleFileNameW, FreeLibraryAndExitThread, FreeLibrary, GetThreadTimes, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SetThreadPriority, CreateThread, SignalObjectAndWait, InitializeSListHead, GetStartupInfoW, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, WaitForSingleObjectEx, GetCPInfo, GetLocaleInfoW, LCMapStringW, CompareStringW, EncodePointer, GetProcAddress, GetTickCount, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, SwitchToThread, SetLastError, GetCurrentThreadId, TryEnterCriticalSection, GetStringTypeW, OutputDebugStringW, IsDebuggerPresent
USER32.dllPostMessageA, EnumWindows, GetWindowTextW, GetMessageW, DefWindowProcW, CreateWindowExW, FindWindowW, LoadStringW, UpdateWindow, PostQuitMessage, SendMessageW, UnregisterSuspendResumeNotification, RegisterClassExW, ShowWindow, DispatchMessageW, RegisterSuspendResumeNotification, LoadCursorW, LoadIconW, TranslateMessage
GDI32.dllCreateSolidBrush
ADVAPI32.dllOpenSCManagerW, RegQueryValueExW, RegOpenKeyExW, RegEnumKeyExW, RegQueryInfoKeyW, RegCloseKey, EventUnregister, EventSetInformation, EventRegister, EventWriteTransfer, CreateProcessAsUserW, RegSetValueExW, RegCreateKeyExW, RegDeleteKeyValueW, GetTokenInformation, OpenThreadToken, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, CloseServiceHandle, OpenServiceW
ole32.dllCLSIDFromString, CoCreateInstance, CoUninitialize, CoInitializeEx, CoTaskMemFree, CoCreateGuid, StringFromCLSID
OLEAUT32.dllSysFreeString
IPHLPAPI.DLLFreeMibTable, GetAdaptersAddresses, GetAdaptersInfo, GetTcpTable, GetTcp6Table, GetIpForwardTable, CreateIpForwardEntry, GetIpInterfaceEntry, DeleteIpForwardEntry, InitializeIpInterfaceEntry, GetIfTable, IcmpSendEcho, IcmpCloseHandle, IcmpCreateFile, Icmp6SendEcho2, GetIpNetTable2, Icmp6CreateFile
WS2_32.dllInetNtopW, getaddrinfo, WSACleanup, WSAStartup, inet_addr
pdh.dllPdhAddCounterW, PdhCollectQueryData, PdhGetFormattedCounterValue, PdhRemoveCounter, PdhOpenQueryW, PdhCloseQuery
wlanapi.dllWlanQueryInterface, WlanGetNetworkBssList, WlanDeleteProfile, WlanGetFilterList, WlanGetInterfaceCapability, WlanScan, WlanReasonCodeToString, WlanConnect, WlanGetProfile, WlanGetAvailableNetworkList, WlanSetProfile, WlanFreeMemory, WlanRegisterNotification, WlanCloseHandle, WlanEnumInterfaces, WlanOpenHandle, WlanDisconnect
USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock
WTSAPI32.dllWTSQueryUserToken, WTSFreeMemory, WTSRegisterSessionNotification, WTSEnumerateSessionsA
WINHTTP.dllWinHttpCrackUrl, WinHttpConnect, WinHttpSetTimeouts, WinHttpSendRequest, WinHttpWriteData, WinHttpGetIEProxyConfigForCurrentUser, WinHttpReceiveResponse, WinHttpOpen, WinHttpAddRequestHeaders, WinHttpDetectAutoProxyConfigUrl, WinHttpQueryHeaders, WinHttpReadData, WinHttpOpenRequest, WinHttpSetOption, WinHttpCloseHandle, WinHttpQueryDataAvailable, WinHttpGetProxyForUrl
ntdll.dllRtlIpv6AddressToStringW, RtlCaptureContext, RtlVirtualUnwind, RtlLookupFunctionEntry
Language of compilation systemCountry where language is spokenMap
EnglishUnited States